Security Testing Design

From Computer Science Wiki
Revision as of 12:16, 3 January 2023 by Bmackenty (talk | contribs) (Created page with "'''Students must be able to describe the purpose and importance of international standards in Information Security and describe advantages of compliance for stakeholders and o...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Students must be able to describe the purpose and importance of international standards in Information Security and describe advantages of compliance for stakeholders and organisations.

International standards in information security provide a common set of guidelines and best practices for protecting and securing information and systems. These standards are developed by international organizations such as the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and they provide a framework for organizations to follow in order to ensure that their information and systems are secure.

The purpose of these standards is to help organizations protect their information assets and prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information. They can also help to ensure that information is handled and processed in a consistent and secure manner, which can help to prevent data breaches and other security incidents.

There are several advantages to compliance with these standards for stakeholders and organizations:

Improved security: Compliance with international standards can help organizations to improve the security of their information and systems, which can reduce the risk of data breaches and other security incidents. This can help to protect the organization's reputation and reduce the impact of any security incidents that do occur.

Increased customer trust: Customers and clients may be more likely to trust an organization that demonstrates compliance with international standards, as it shows that the organization is taking steps to protect their information and systems.

Enhanced business opportunities: Many organizations require their partners and suppliers to demonstrate compliance with international standards in order to do business with them. Therefore, compliance with these standards can help organizations to expand their business opportunities and access new markets.

Improved efficiency: Compliance with international standards can help organizations to streamline their processes and improve their overall efficiency, as it can help to ensure that information is handled and processed in a consistent and secure manner.

Overall, compliance with international standards in information security is important for stakeholders and organizations as it can help to improve the security of their information and systems, increase customer trust, enhance business opportunities, and improve efficiency.


Students must be able to explain the importance of a “Rules of Engagement” document, the importance of consent before planning a testing strategy, and the purpose of “codes of ethics” in the security testing process.

A "Rules of Engagement" document is a set of guidelines that outline the boundaries and limitations of a security testing engagement. It is important because it helps to ensure that the testing is conducted in a legal and ethical manner, and that any vulnerabilities or issues discovered during the testing are properly disclosed and addressed.

Consent is important in the security testing process because it ensures that the parties involved are aware of and agree to the testing that is being conducted. This is especially important when testing systems that contain sensitive or confidential information, as unauthorized access or testing of these systems could potentially have negative consequences.

Codes of ethics are guidelines that outline the ethical principles and values that should guide the behavior of individuals or organizations in a particular field. In the context of security testing, codes of ethics can help to ensure that testing is conducted in a responsible and professional manner, and that the interests of all parties involved are taken into account.


Students must be able to compare Black Box Testing, Grey Box Testing, and White Box Testing in relation to analysing an organisation’s security.

Black box testing is a type of security testing in which the tester has no knowledge of the internal workings of the system being tested. The tester only has access to the inputs and outputs of the system, and is not able to see the internal processes or code that generates the outputs. Black box testing is often used to test the functionality of a system, and can be used to identify vulnerabilities or weaknesses in the system.

Grey box testing is a type of security testing in which the tester has partial knowledge of the internal workings of the system being tested. The tester may have access to some internal documentation or may be able to see some of the code, but does not have a complete understanding of the system. Grey box testing can be used to identify vulnerabilities or weaknesses in the system that might not be apparent from the outside.

White box testing is a type of security testing in which the tester has complete knowledge of the internal workings of the system being tested. The tester has access to all of the code and documentation, and is able to see all of the internal processes and data flows. White box testing is often used to identify vulnerabilities or weaknesses in the system that are not visible from the outside, and can be used to test the security of the system at a deeper level.

In terms of analysing an organization's security, black box testing may be used to identify vulnerabilities or weaknesses in the organization's systems and infrastructure that are visible from the outside. Grey box testing may be used to identify vulnerabilities or weaknesses that are not visible from the outside, but that may be discovered through partial knowledge of the internal workings of the system. White box testing may be used to identify vulnerabilities or weaknesses that are not visible from the outside, and that can only be discovered through complete knowledge of the internal workings of the system.