- . More common Security vulnerabilities:
1, the back door, the programmer in order to facilitate their own maintenance, will leave some back door, but easy to become an attack vulnerability.
2, in the source code will have the website address omission, will be exploited by hackers, bypassing the firewall, directly attack the background.
3, exceptions, we write the program, inevitably some of the potential loopholes, but also easy to be targeted.
- Several security service modes and features:
Software Security Services |
|
Position |
|
Mobile Provisioning |
Network / Internet |
Firewall |
Host |
The security provided Service |
Code scanning |
Block Mobile communication, Simulation Dynamic Testing |
Network Penetration Testing |
Host penetration test |
Whether you can remotely Remote control |
Yes, in the Hong Kong generation Code scanning |
No, it has to be on site. |
Yes, it can be from incense Port remote |
No, it must be in the present Field |
Benefit |
Most cost-effective |
|
|
|
For mobile apps, the most effective way to ensure security is to scan and review the app's source code.
How do you do it? Customers provide source code, we use automated tools to scan, it will give a corresponding report, the content of the report is not all right, sometimes the machine identified problems are not problems. As a result, our engineers will scan the
Out of the results to identify: which is correct?
When these are done, we prioritize the defects and form a report to the customer. Then the customer needs to have multiple rounds of discussion with the developer: Do you agree with the results in this report?
Why is it more effective to use code to find a problem than a dynamic test? As with the concept of common software testing, it is better to find out the depth and breadth of the problem from the scanned source code than the dynamic test.
and dynamic testing to test the interaction between an APP and the server, because a lot of loopholes hidden in code, they are very covert, usually to a certain time, a condition, will be touched. This cannot be measured with dynamic testing, but it can be easily found with code scans or reviews.
L Fee:
Code scanning, first of all according to the size of the customer code, the number of rounds required to carry out the estimate, the cost will be root
According to this generation. Scan the code, according to this to determine filtering, sub-priority, make a report to the customer to confirm the discussion, in with the developer
Communication will take more time (see if the communication is smooth). For example: The bank's customer, the code is about 500,000 lines of scale, we use 5 to 6 days of time, to help him complete this kind of service.
If it is inconvenient to provide the entire source code, you can provide critical code for scanning. Because it is a scanner, it can be used without all the code.
Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.
Software Security Services