CISSP For Dummies

It’s not enough to build an access control environment without testing it to see how it performs and behaves. In many cases, access control is the only barrier between outsiders and sensitive information. A great example is online banking: The only thing protecting your bank account information is your userid and password. Don’t you want to be sure that the bank’s access control mechanism is working properly to protect your precious information from outsiders?

Computer systems contain information, which, in many cases, must only be accessible to authorized persons. However, weaknesses or vulnerabilities in the software may permit those without the necessary credentials to also access this information.

Why test?

Penetration and vulnerability testing should be performed on these systems to ensure that they don’t possess any of these vulnerabilities or weaknesses that could permit unauthorized persons to view or alter information. Penetration testing, or pen testing, can be carried out manually, but more often than not, automated tools can be used to quickly and easily identify most weaknesses in a system or its software applications.

Some of the terms that you’ll need to know include

Numerous open-source and commercial scanning tools are available, each designed to identify vulnerabilities in software applications, database management systems, operating systems, and network devices.

When and how to test

Most experts agree that systems must be tested for vulnerabilities before they are placed into production use. This principle is especially true for systems that will be accessed through the Internet. If you don’t test an Internet-facing system, it could be exploited and “owned” faster than you can say “vulnerability testing.”

Software that is accessed over the Internet or company networks should also be tested for vulnerabilities as part of the functional testing performed prior to the release of new versions. This additional testing can help to prevent any serious weaknesses from ever seeing the light of day (or the dark side of the Internet).

Organizations should adopt a software development life cycle (SDLC) process to govern any software development or integration activities. Software vulnerability testing should be a formal part of the SDLC.

 Cross-Reference   Read more about the software development life cycle in Chapter 7.

Категории