Web Testing Home

Web Testing Articles

Web Testing Links

Web Testing Books

Web Testing Tools

Web Testing Keywords

Web Testing

Testing Web Security

See more Amazon Details

Contents Listing

Acknowledgments.
Foreword.
Preface.
Part One An Introduction to the Book.
Chapter 1 Introduction.
The Goals of This Book.
The Approach of This Book.
How This Book Is Organized.
Terminology Used in This Book.
Hackers, Crackers, Script Kiddies, and Disgruntled Insiders.
Testing Vocabulary.
Who Should Read This Book?
Summary.
Part Two Planning the Testing Effort.
Chapter 2 Test Planning.
Requirements.
Clarifying Requirements.
Security Policies.
The Anatomy of a Test Plan.
Test Plan Identifier.
Introduction.
Project Scope.
Change Control Process.
Features to Be Tested.
Features Not to Be Tested.
Approach.
Pass/Fail Criteria.
Suspension Criteria and Resumption Requirements.
Test Deliverables.
Environmental Needs.
Configuration Management.
Responsibilities.
Staffing and Training Needs.
Schedule.
Project Closure.
Planning Risks and Contingencies.
Issues.
Assumptions.
Constraints and Dependencies.
Acronyms and Definitions.
References.
Approvals.
Master Test Plan (MTP).
Summary.
Part Three Test Design.
Chapter 3 Network Security.
Scoping Approach.
Scoping Examples.
Hotel Chain.
Furniture Manufacturer.
Accounting Firm.
Search Engine.
The Test Lab.
Suspension Criteria.
Device Inventory.
Network Topology.
Device Accessibility.
Validating Network Design.
Network Design Reviews.
Network Design Inspections.
Verifying Device Inventory.
Physical Location.
Unauthorized Devices.
Network Addresses.
Verifying Network Topology.
Network Connections.
Device Accessibility.
Supplemental Network Security.
Network Address Corruption.
Secure LAN Communications.
Wireless Segments.
Denial-of-Service (DoS) Attacks.
Summary.
Chapter 4 System Software Security.
Security Certifications.
Patching.
Hardening.
Masking.
Services.
Directories and Files.
UserIDs and Passwords.
Manual Guessing of UserIDs and Passwords.
Automated Guessing of UserIDs and Passwords.
Gaining Information via Social Engineering.
Disgruntled Employees Committing Illicit Acts.
User Groups.
Summary.
Chapter 5 Client-Side Application Security.
Application Attack Points.
Client Identification and Authentication.
Relying upon What the User Knows: The Knows-Something.
Approach.
Relying upon What the User Has: The Has-Something Approach.
Relying upon What the User Is: The Biometrics Approach.
User Permissions.
Functional Restrictions.
Data Restrictions.
Functional and Data Cross-Related Restrictions.
Testing for Illicit Navigation.
HTTP Header Analysis.
HTTP Header Expiration.
Client-Side Application Code.
Session IDs.
Navigational Tools.
Client-Side Data.
Cookies.
Hidden Fields.
URLs.
Local Data Files.
Windows Registry.
Secure Client Transmissions.
Digital Certificates.
Encryption Strength.
Mixing Encrypted and Nonencrypted Content.
Avoiding Encryption Bottlenecks.
Mobile Application Code.
ActiveX Controls.
Java Applets.
Client-Side Scripts.
Detecting Trojan Horse Mobile Code.
Client Security.
Firewalls.
Browser Security Settings.
Client Adaptive Code.
Client Sniffing.
Summary.
Chapter 6 Server-Side Application Security.
Common Gateway Interface (CGI).
Language Options.
Input Data.
Permissions and Directories.
Scalability.
Third-Party CGI Scripts.
Server Side Includes (SSIs).
Dynamic Code.
Viewing the Template.
Single Point of Failure.
System Commands.
Demonstration Scripts.
Helpful Error Messages.
Application Code.
Compileable Source Code.
Noncompileable Source Code.
Copyrights.
Helpful Error Messages.
Old Versions.
Input Data.
Invalid Data Types.
Invalid Ranges.
Buffer Overflows.
Escape Characters.
Server-Side Data.
Data Filenames.
Data Tripwires.
Data Vaults.
WORMs.
Data Encryption.
Data Deception.
Data Islands.
Distributed Copies.
Fragmented Data.
Database Management System (DBMS) Enforced Constraints.
Filtered Indexes.
Application-Level Intruder Detection.
Summary.
Chapter 7 Sneak Attacks: Guarding against the Less-Thought-of Security Threats.
Combating Social Engineers.
Tricks by Telephone.
Tricks by Email.
Tricks by Traditional Mail.
Tricks in Person.
Thwarting Dumpster Divers.
Proper Disposal of Paper.
Cleaning Up Brainstorms.
Proper Disposal of Electronic Hardware.
Defending against Inside Accomplices.
Preventative Measures and Deterrents.
Detective Measures.
Corrective and Prosecutive Measures.
Preventing Physical Attacks.
Securing a Facility.
Securing Hardware.
Securing Software.
Securing Data.
Planning against Mother Nature.
Guarding against Sabotage.
Summary.
Chapter 8 Intruder Confusion, Detection, and Response.
Intruder Confusion.
Dynamic Defenses.
Deceptive Defenses.
Honey Pots.
Evaluating Intruder Confusion.
Intrusion Detection.
Intrusion Detection Systems (IDSs).
Audit Trails.
Tripwires and Checksum.
Malware.
Monitoring.
Intrusion Response.
Confirmation of Intrusion.
Damage Containment.
Damage Assessment and Forensics.
Damage Control and Recovery.
System Salvage and Restoration.
Notification.
Retaliation and Prosecution.
Policy Review.
Summary.
Part Four Test Implementation.
Chapter 9 Assessment and Penetration Options.
Staffing Options.
Do It Yourself (DIY).
Outsourcing.
Combination of In-House and Outsourced Testing.
Tools for Testing.
Manual Approach.
Automated Approach.
Tool Evaluation.
Summary.
Chapter 10 Risk Analysis.
Recycling.
Asset Audit.
Fault Trees and Attack Trees.
Gap Analysis.
Test Priority.
Device Inventory.
Threats.
Business Impact.
Risk Likelihood.
Calculating Relative Criticality.
Identify and Assign Candidate Tests.
Priority Modifiers.
Test Schedule.
Failure Mode, Effects, and Criticality Analysis (FMECA).
Summary.
Epilogue.
Part Five Appendixes.
Appendix A An Overview of Network Protocols, Addresses, and Devices.
Network Protocols.
Application Layer.
Presentation Layer.
Session Layer.
Transport Layer.
Network Layer.
Data Link Layer.
Physical Layer.
Security-Minded Network Protocols.
Network Addresses.
Dynamic IP Addresses.
Private IP Addresses.
Multiple IP Addresses.
IP-less Devices.
Misdirecting Host Names.
Network Devices.
Repeater.
Hub.
Bridge.
Gateway.
Switch (Switching Hub).
Router.
Brouter.
Network Controller.
Load Balancer.
Servers.
Firewalls.
Firewall Types.
Firewall Configurations.
Appendix B SANS Institute Top 20 Critical Internet Security Vulnerabilities.
Appendix C Test-Deliverable Templates.
Template Test Status/Summary Report.
Template Test Incident Report.
Template Test Log.
Additional Resources.
Books.
Computer Forensics.
Configuration Management.
Disaster Recovery.
Internet Law .
Miscellaneous.
Network Design.
Risk Analysis.
Security.
Software Engineering.
Testing (General).
Testing (Web).
Web Sites.

Google
Web www.riskmanagement.force9.co.uk

Contents
View a contents listing.

Short
Short Description.


Keyword Pages
crackers
DOS attacks
hackers
penetration testing
risk
script kiddies
security
security testing
software testing
test automation
test execution
test management
test planning
test tools
testing software
vulnerabilities
web application

Keyword Bestsellers

crackers

DOS attacks

hackers

penetration testing

risk

script kiddies

security testing

software testing

test automation

test execution

test management

test planning

test tools

testing software

vulnerabilities

web application

security

Web Testing Bestsellers
The bestselling books on Amazon.

Articles

Virus Types

test case

Test Tools

Web Performance Tuning

verification

Visit our site of the month Load Testing at loadtesting.force9.co.uk
Visit our site of the month Load Testing at loadtesting.force9.co.uk