Introduction to Nanjing hanhaiyuan Security Testing (2)

Source: Internet
Author: User

3. Security Testing Method

Nanjing hanhaiyuan Information Technology Co., Ltd. defines the security testing method as follows:

By analyzing system assets and external environments, you can analyze security requirements and propose security functions that meet security requirements.

By analyzing permission objects and data streams between permission objects, we can analyze threats on data streams (for specific permission and capability breakthroughs or a general possibility ), improve security functions and propose security policies to mitigate threats.

Ø combined with functions on data streams, data forms and security experience can further refine threats on data streams into vulnerability forms, and propose specific software security implementation principles.

Performs comprehensive security tests on software based on security functions, security policies, and security implementation principles.

4. Security Requirement Analysis

Ø system and associated Component Analysis: first, define the boundaries of the system and external components, and then analyze the next part.

Ø external data channels: Analysis System and external related components or data channels accessible to other users.

User Permissions and access methods: Analyze users (including anonymous users or unauthorized users) that may access the system in various ways, as well as normal permissions and capability constraints.

Asset and asset distribution analysis: analyzes the attributes, values, and importance of information assets protected by the system. These assets are stored or transmitted to external components, users, and data channels. Or the value and damage of these assets are dependent on external components, users, and data channels. These Distribution Information determine the security protection level for external components, data channels, and users with different permissions, and potentially target external components, in addition to the system itself, data tunnel and other security attack methods for users with different permissions.

Security standards and requirements: Security is a kind of cost, and it is impossible to pursue absolute security. It must be based on the attributes and values of protected assets and the external environment, to define the security standards and requirements of the system, and to determine the real security vulnerabilities. low security levels, many low security level security vulnerabilities cannot become security vulnerabilities, for example, a non-confidential system is used only to display advertising information to the public and does not provide other access means. The security vulnerabilities of host operating system information leakage can be ignored. However, for systems with high confidentiality requirements, it may become a security vulnerability. Based on the above information, we can define system security standards and requirements. The security vulnerabilities of the system are verified and confirmed based on the standards.

Security Function Definition: defines the system's security functions, coverage, implementation intensity, and other indicators based on security standards and requirements and common security functions, this allows you to analyze system security vulnerabilities from the perspective of security functions.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.