Software Security Testing (Essay Sample)
Write a 1-2 page summary of one of the following papers available
in the References folder on eLearning.
Select any paper. Identify two or three key points made by the
authors in your summary.
12-point font, double-spaced, Word document (or pdf).
N. Antunes and M. Vieira, “Penetration Testing for Web
Services,” IEEE Computer, February 2014.
B. Arkin, S. Stender, and G. McGraw, “Software Penetration
Testing,” IEEE Security & Privacy, January/February 2005.
M. Dunn and L. Merkle, "Overview of Software Security Issues
in Direct-Recording Electronic Voting Machines," Proceedings
of the 13th International Conference on Cyber Warfare and
Security, National Defense University, Washington, DC, March
G. Klees, A. Ruef, B. Cooper, S. Wei, and M. Hicks,
“Evaluating Fuzz Testing,” Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communications
Security, Toronto, Canada, October 2018
B. Potter and G. McGraw, “Software Security Testing,” IEEE
Security & Privacy, September/October 2004.
H.H. Thompson, “Why Security Testing Is Hard,” IEEE
Security & Privacy, July/August 2003.
G. Tian-Yang, S. Yin-sheng, and F. You-yuan, “Research on
Software Security Testing,” World Academy of Science,
Engineering, and Technology, Vol. 70, 2010.
“Software Security Testing” Summary
Software security has grown to be one of the essential aspects of the world of computer technology. "Software Security Testing” by Potter Bruce and Gary McGraw highlights several vital aspects surrounding software security testing. According to Potter and McGraw (81), security testing has grown beyond the confines of network port scanning to probing software behavior. Furthermore, they highlight that probing software behavior exists as a critical element of system behavior. Consequently, the paper also mentions that testing software security is often highly misunderstood. There are several key points covered in the paper regarding software security testing.
- Advantages and Disadvantages of Cloud Computing in ERPDescription: Cloud computing is a collection of computer services such as server hosting, data storage, networking, etc. People or companies have on-demand access to common cloud resources. The term "cloud" refers to information and data that is ...2 pages/≈550 words| 2 Sources | MLA | IT & Computer Science | Essay |
- Digital Forensics and Laws Against CybercrimesDescription: In a growing digital era characterized by increased use of digital technology and the internet, continued abuse and misuse of these systems have been experienced. This has led to the introduction of digital forensic concepts and laws against cybercrimes. This essay seeks to offer an in-depth analysis of two...4 pages/≈1100 words| 4 Sources | MLA | IT & Computer Science | Essay |
- The Hackers and World-wide ComputerDescription: The word-wide computer network has grown tremendously in recent decades, and its increasingly being used across multiple sectors and for the construction of online communities. Computer communication through private networks and the ...2 pages/≈550 words| 5 Sources | MLA | IT & Computer Science | Essay |