The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
RFID tag
Radio frequency spectrum
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
RFID tag
Radio frequency spectrum
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
Editing
Security testing
Back to page
Edit
Edit source
View history
Talk (0)
Edit Page
Security testing
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
The edit appears to have already been undone.
Anti-spam check. Do
not
fill this in!
== Definitions == === DMCA === '''Security testing''' means {{Quote|accessing a [[computer]], [[computer system]], or [[computer network]], solely for the purpose of good faith testing, investigating, or correcting, a [[security flaw]] or [[vulnerability]], with the [[authorization]] of the owner or operator of such [[computer]], [[computer system]], or [[computer network]].<ref>17 U.S.C. Β§1201(j)(1)(A).</ref>}} === General === '''Security testing''' is {{Quote|[a] [[process]] used to determine that the [[security]] features of a [[system]] are [[implement]]ed as designed. This includes hands-on [[functional testing]], [[penetration testing]], and [[verification]].<ref>[[Department of Defense]], [[National Computer Security Center]], Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).</ref>}} {{Quote|[[testing|[t]esting]] that attempts to [[verify]] that an [[implementation]] protects [[data]] and maintains [[functionality]] as intended.<ref>[[NIST Special Publication 800-152]], at 135.</ref>}} == Overview == Such [[testing]] should be one component of an overall [[security]] program that also includes assigned [[security]] responsibilities, [[risk assessment]], system requirements, planning, [[policies]], and procedures. This [[testing]] includes hands-on [[functional testing]], [[penetration testing]], and [[verification]]. == References == <references /> == See also == <div style="{{column-count|2}}"> * [[Active security testing]] * [[Covert security testing]] * [[External security testing]] * [[Internal security testing]] * [[NIST Special Publication 800-115]] (Technical Guide to Information Security Testing and Assessment) * [[Overt security testing]] * [[Security test and evaluation]] * [[Voting system security testing]] </div> [[Category:DMCA]] [[Category:Circumvention]] [[Category:Security]] [[Category:Testing]]
Summary:
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Templates used on this page:
Template:Column-count
(
view source
)
Template:Quote
(
view source
)
Follow on IG
TikTok
Join Fan Lab