Open Access iconOpen Access

ARTICLE

crossmark

Analysis of Security Testing Techniques

Omer Bin Tauqeer1, Sadeeq Jan1,*, Alaa Omar Khadidos2, Adil Omar Khadidos3, Fazal Qudus Khan3, Sana Khattak1

1 National Center for Cyber Security, Department of Computer Science & IT, University of Engineering & Technology, Peshawar, 25120, Pakistan
2 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

* Corresponding Author: Sadeeq Jan. Email: email

Intelligent Automation & Soft Computing 2021, 29(1), 291-306. https://doi.org/10.32604/iasc.2021.017260

Abstract

In the past decades, a significant increase has been observed in cyber-attacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing for software applications and communication systems. A comprehensive review and in-depth analysis of the existing literature testing approaches has been performed to analyze their effectiveness and applicability under various scenarios. Further, we discuss various techniques used for conducting various security assessments. We follow the widely used method by Kitchenham and Charters for conducting a comprehensive systematic literature review process. Also, we propose a taxonomy for security testing techniques consisting of three main categories (Identification, Testing, and Reporting) and 17 subcategories consisting of specific security testing techniques (e.g., Black-box testing, risk assessment). Further, we assign a distinctive category from our taxonomy to each published paper in the security testing area, based on the material presented/discussed in the paper.

Keywords


Cite This Article

APA Style
Tauqeer, O.B., Jan, S., Khadidos, A.O., Khadidos, A.O., Khan, F.Q. et al. (2021). Analysis of security testing techniques. Intelligent Automation & Soft Computing, 29(1), 291-306. https://doi.org/10.32604/iasc.2021.017260
Vancouver Style
Tauqeer OB, Jan S, Khadidos AO, Khadidos AO, Khan FQ, Khattak S. Analysis of security testing techniques. Intell Automat Soft Comput . 2021;29(1):291-306 https://doi.org/10.32604/iasc.2021.017260
IEEE Style
O.B. Tauqeer, S. Jan, A.O. Khadidos, A.O. Khadidos, F.Q. Khan, and S. Khattak, “Analysis of Security Testing Techniques,” Intell. Automat. Soft Comput. , vol. 29, no. 1, pp. 291-306, 2021. https://doi.org/10.32604/iasc.2021.017260



cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2481

    View

  • 2168

    Download

  • 0

    Like

Share Link