Software Testing
Log Management System
Threat Assessment Modeling
Logs
Testing
100

Software security analysis using automated tools.

Do not analyze either the source code or the

compiled application. Eg. Buffer overflow

Static Testing

100

Analyze daily operations and review possible attacks to

apply countermeasures.

OPSEC process

100

Evaluate threats against applications or operating

systems.

STRIDE

100

Network traffic capture

Network Flow

100

Test externally without testing internal structure

Black-box testing

200

Analyze and test using running environment. Use

to test software provided by third parties where no

access to software code. Eg. cross-site scripting,

SQL injection

Dynamic Testing

200

Testing of network security in view of a hacker.

Pen-test

200

Use of false identity to gain access to system identity.

Can use IP/ MAC address, usernames, wireless network

SSIDs.

Spoofing

200

Events related to hardware device login and access

Audit logging

200

Test code in run time

Dynamic Testing

300

Type of dynamic testing which use specific inputs

to detect flaws under stress/load. Eg. input invalid

parameters to test

Fuzz Testing

300

Check any port or port range open in a computer.

Port scanner

300

Cause unauthorized modifications of data in transit or in storage. Results in violation of integrity as well as availability.

Tampering

300

Should synchronize across entire network to have correct and consistent time in logs and device traffic flows.

Network Time Protocol (NTP)

300

Detailed testing by accessing code and internal structure

White-box testing

400

Transfer of data and control between program

interfaces.

Integration Level Testing

400

Verify software meets security requirements.

Operational assurance

400

Deny an action or activity carried out by an attacker.

Repudiation

400

Device event message log standard

Syslog

400

Common Vulnerability and Exposures dictionary

CVE

500

Verify system has all the required specifications

and functions.

System Level Testing

500

Processes running in internal protected ring.

Supervisor mode

500

Attack result in increase the level privileges for a limited user account.

Elevation of privilege

500

Errors, Warnings, Information, Success Audits, Failure

Event types

500

Test using two or more components together

Integration Testing

M
e
n
u