|
The portion of security testing in which the evaluators attempt to
circumvent the security features of a system. The evaluators may be assumed
to use all system design and implementation documentation, that may include
listings of system source code, manuals, and circuit diagrams. The
evaluators work under the same constraints applied to ordinary users.
Texas State Library and Archives Commision
|
Similar Articles
Software Testing Items
Security Items
Test Techniques Items
Selected Books
Hack Attacks Testing
Hack I.T. - Security Through Penetration Testing
Introducing Software Testing
Testing Web Security
|