Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
1 Source
Level:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Software Security Testing (Essay Sample)

Instructions:

Write a 1-2 page summary of one of the following papers available
in the References folder on eLearning.
Select any paper. Identify two or three key points made by the
authors in your summary.
12-point font, double-spaced, Word document (or pdf).
Candidate Papers
 N. Antunes and M. Vieira, “Penetration Testing for Web
Services,” IEEE Computer, February 2014.
 B. Arkin, S. Stender, and G. McGraw, “Software Penetration
Testing,” IEEE Security & Privacy, January/February 2005.
 M. Dunn and L. Merkle, "Overview of Software Security Issues
in Direct-Recording Electronic Voting Machines," Proceedings
of the 13th International Conference on Cyber Warfare and
Security, National Defense University, Washington, DC, March
2018.
 G. Klees, A. Ruef, B. Cooper, S. Wei, and M. Hicks,
“Evaluating Fuzz Testing,” Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communications
Security, Toronto, Canada, October 2018
 B. Potter and G. McGraw, “Software Security Testing,” IEEE
Security & Privacy, September/October 2004.
 H.H. Thompson, “Why Security Testing Is Hard,” IEEE
Security & Privacy, July/August 2003.
 G. Tian-Yang, S. Yin-sheng, and F. You-yuan, “Research on
Software Security Testing,” World Academy of Science,
Engineering, and Technology, Vol. 70, 2010.

source..
Content:

Name
Instructor
Course
Date
“Software Security Testing” Summary
Software security has grown to be one of the essential aspects of the world of computer technology. "Software Security Testing” by Potter Bruce and Gary McGraw highlights several vital aspects surrounding software security testing. According to Potter and McGraw (81), security testing has grown beyond the confines of network port scanning to probing software behavior. Furthermore, they highlight that probing software behavior exists as a critical element of system behavior. Consequently, the paper also mentions that testing software security is often highly misunderstood. There are several key points covered in the paper regarding software security testing.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Advantages and Disadvantages of Cloud Computing in ERP
    Description: Cloud computing is a collection of computer services such as server hosting, data storage, networking, etc. People or companies have on-demand access to common cloud resources. The term "cloud" refers to information and data that is ...
    2 pages/≈550 words| 2 Sources | MLA | IT & Computer Science | Essay |
  • Digital Forensics and Laws Against Cybercrimes
    Description: In a growing digital era characterized by increased use of digital technology and the internet, continued abuse and misuse of these systems have been experienced. This has led to the introduction of digital forensic concepts and laws against cybercrimes. This essay seeks to offer an in-depth analysis of two...
    4 pages/≈1100 words| 4 Sources | MLA | IT & Computer Science | Essay |
  • The Hackers and World-wide Computer
    Description: The word-wide computer network has grown tremendously in recent decades, and its increasingly being used across multiple sectors and for the construction of online communities. Computer communication through private networks and the ...
    2 pages/≈550 words| 5 Sources | MLA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!