The Plan and Tools for Vulnerability Testing in Information Software-Based System


Injung Kim, Younggyo Lee, Dongho Won, Journal of Information Processing Systems Vol. 1, No. 1, pp. 75-78, Dec. 2005  


Keywords: Risk Analysis, Vulnerability, Asset, Threat
Fulltext:

Abstract

Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Kim, I., Lee, ., & Won, . (2005). The Plan and Tools for Vulnerability Testing in Information Software-Based System. Journal of Information Processing Systems, 1(1), 75-78. DOI: .

[IEEE Style]
I. Kim, , , "The Plan and Tools for Vulnerability Testing in Information Software-Based System," Journal of Information Processing Systems, vol. 1, no. 1, pp. 75-78, 2005. DOI: .

[ACM Style]
Injung Kim, Younggyo Lee, and Dongho Won. 2005. The Plan and Tools for Vulnerability Testing in Information Software-Based System. Journal of Information Processing Systems, 1, 1, (2005), 75-78. DOI: .