You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actio
Instructions:
You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment. *This is based off a part of the Lab for the Week*
- This assignment is going to make use of the documents, lab report format, etc from the Lab this week.
- In a Lab Report file, create a vulnerability assessment report based on the OWASP documents, two of the key documents are attached below, and your analysis of all the issues researched, again use your experience from the Lab for this assignment.
- Make sure to cover these items:
- Executive summary (include a general overview of the security state of the DVWA)
- Summary of testing methods/tools used
- Summary of findings (include all issues researched in this lab)
- Recommendations (map the researched issues to recommendations outlined by the OWASP and Open SAMM models; cite your work properly)
- Write an 3-4-page paper addressing the above items.
Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements:
- 3-4 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.
- Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!
1
4.0Testing Guide
Project Leaders: Matteo Meucci and Andrew Muller
Creative Commons (CC) Attribution Share-Alike Free version at http://www.owasp.org
2
The Open Web Application Security Project (OWASP) is a worldwide free and open com- munity focused on improving the security of application software. Our mission is to make application security “visible”, so that people and organizations can make informed decisions about application security risks. Every one is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work.
THE ICONS BELOW REPRESENT WHAT OTHER VERSIONS ARE AVAILABLE IN PRINT FOR THIS BOOK TITLE.
ALPHA: “Alpha Quality” book content is a working draft. Content is very rough and in development until the next level of publishing.
BETA: “Beta Quality” book content is the next highest level. Content is still in development until the next publishing.
RELEASE: “Release Quality” book content is the highest level of quality in a book title’s lifecycle, and is a final product.
To Share – to copy, distribute and transmit the work
Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work).
Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same, similar or a compatible license.
To Remix – to adapt the work
YOU ARE FREE:
UNDER THE FOLLOWING CONDITIONS:
ALPHA BETA RELEASE
Project Leaders: Matteo Meucci and Andrew Muller
Foreword by Eoin Keary
Frontispiece About the OWASP Testing Guide Project About The Open Web Application Security Project
3 – 4
5 – 6
Testing Guide Foreword – Table of contents
0 1
Introduction The OWASP Testing Project Principles of Testing Testing Techniques Explained Deriving Security Test Requirements Security Tests Integrated in Development and Testing Workflows Security Test Data Analysis and Reporting
7 – 21 2
The OWASP Testing Framework Overview Phase 1: Before Development Begins Phase 2: During Definition and Design Phase 3: During Development Phase 4: During Deployment Phase 5: Maintenance and Operations A Typical SDLC Testing Workflow
22 – 24 3
Web Application Security Testing Introduction and Objectives Testing Checklist Information Gathering Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) Fingerprint Web Server (OTG-INFO-002) Review Webserver Metafiles for Information Leakage (OTG-INFO-003) Enumerate Applications on Webserver (OTG-INFO-004) Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) Identify application entry points (OTG-INFO-006) Map execution paths through application (OTG-INFO-007) Fingerprint Web Application Framework (OTG-INFO-008) Fingerprint Web Application (OTG-INFO-009) Map Application Architecture (OTG-INFO-010) Configuration and Deployment Management Testing Test Network/Infrastructure Configuration (OTG-CONFIG-001) Test Application Platform Configuration (OTG-CONFIG-002)
25 – 207 4
Testing Guide Foreword – Table of contents
Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) Test HTTP Methods (OTG-CONFIG-006) Test HTTP Strict Transport Security (OTG-CONFIG-007) Test RIA cross domain policy (OTG-CONFIG-008) Identity Management Testing Test Role Definitions (OTG-IDENT-001) Test User Registration Process (OTG-IDENT-002) Test Account Provisioning Process (OTG-IDENT-003) Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) Testing for Weak or unenforced username policy (OTG-IDENT-005) Authentication Testing Testing for Credentials Transported over an Encrypted Channel (OTG-AUTHN-001) Testing for default credentials (OTG-AUTHN-002) Testing for Weak lock out mechanism (OTG-AUTHN-003) Testing for bypassing authentication schema (OTG-AUTHN-004) Test remember password functionality (OTG-AUTHN-005) Testing for Browser cache weakness (OTG-AUTHN-006) Testing for Weak password policy (OTG-AUTHN-007) Testing for Weak security question/answer (OTG-AUTHN-008) Testing for weak password change or reset functionalities (OTG-AUTHN-009) Testing for Weaker authentication in alternative channel (OTG-AUTHN-010) Authorization Testing Testing Directory traversal/file include (OTG-AUTHZ-001) Testing for bypassing authorization schema (OTG-AUTHZ-002) Testing for Privilege Escalation (OTG-AUTHZ-003) Testing for Insecure Direct Object References (OTG-AUTHZ-004) Session Management Testing Testing for Bypassing Session Management Schema (OTG-SESS-001) Testing for Cookies attributes (OTG-SESS-002) Testing for Session Fixation (OTG-SESS-003) Testing for Exposed Session Variables (OTG-SESS-004) Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005) Testing for logout functionality (OTG-SESS-006) Test Session Timeout (OTG-SESS-007) Testing for Session puzzling (OTG-SESS-008) Input Validation Testing Testing for Reflected Cross Site Scripting (OTG-INPVAL-001) Testing for Stored Cross Site Scripting (OTG-INPVAL-002) Testing for HTTP Verb Tampering (OTG-INPVAL-003) Testing for HTTP Parameter pollution (OTG-INPVAL-004) Testing for SQL Injection (OTG-INPVAL-005)
Oracle Testing MySQL Testing SQL Server Testing Testing PostgreSQL (from OWASP BSP) MS Access Testing
3
Testing Guide Foreword – Table of contents
Testing for NoSQL injection Testing for LDAP Injection (OTG-INPVAL-006) Testing for ORM Injection (OTG-INPVAL-007) Testing for XML Injection (OTG-INPVAL-008) Testing for SSI Injection (OTG-INPVAL-009) Testing for XPath Injection (OTG-INPVAL-010) IMAP/SMTP Injection (OTG-INPVAL-011) Testing for Code Injection (OTG-INPVAL-012)
Testing for Local File Inclusion Testing for Remote File Inclusion Testing for Command Injection (OTG-INPVAL-013) Testing for Buffer overflow (OTG-INPVAL-014) Testing for Heap overflow Testing for Stack overflow Testing for Format string Testing for incubated vulnerabilities (OTG-INPVAL-015) Testing for HTTP Splitting/Smuggling (OTG-INPVAL-016)
Testing for Error Handling Analysis of Error Codes (OTG-ERR-001) Analysis of Stack Traces (OTG-ERR-002) Testing for weak Cryptography Testing for Weak SSL/TLS Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-001) Testing for Padding Oracle (OTG-CRYPST-002) Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003) Business Logic Testing Test Business Logic Data Validation (OTG-BUSLOGIC-001) Test Ability to Forge Requests (OTG-BUSLOGIC-002) Test Integrity Checks (OTG-BUSLOGIC-003) Test for Process Timing (OTG-BUSLOGIC-004) Test Number of Times a Function Can be Used Limits (OTG-BUSLOGIC-005) Testing for the Circumvention of Work Flows (OTG-BUSLOGIC-006) Test Defenses Against Application Mis-use (OTG-BUSLOGIC-007) Test Upload of Unexpected File Types (OTG-BUSLOGIC-008) Test Upload of Malicious Files (OTG-BUSLOGIC-009) Client Side Testing Testing for DOM based Cross Site Scripting (OTG-CLIENT-001) Testing for JavaScript Execution (OTG-CLIENT-002) Testing for HTML Injection (OTG-CLIENT-003) Testing for Client Side URL Redirect (OTG-CLIENT-004) Testing for CSS Injection (OTG-CLIENT-005) Testing for Client Side Resource Manipulation (OTG-CLIENT-006) Test Cross Origin Resource Sharing (OTG-CLIENT-007) Testing for Cross Site Flashing (OTG-CLIENT-008) Testing for Clickjacking (OTG-CLIENT-009) Testing WebSockets (OTG-CLIENT-010) Test Web Messaging (OTG-CLIENT-011) Test Local Storage (OTG-CLIENT-012)
4
Testing Guide Foreword – Table of contents
Reporting Appendix A: Testing Tools Black Box Testing Tools Appendix B: Suggested Reading Whitepapers Books Useful Websites Appendix C: Fuzz Vectors Fuzz Categories Appendix D: Encoded Injection Input Encoding Output Encoding
208 – 222 5
5
The problem of insecure software is perhaps the most important technical challenge of our time. The dramatic rise of web applications enabling business, social networking etc has only compounded the requirements to establish a robust approach to writing and securing our Internet, Web Applications and Data.
0 Testing Guide Foreword
Testing Guide Foreword – By Eoin Keary
Foreword by Eoin Keary, OWASP Global Board
The problem of insecure software is perhaps the most important technical challenge of our time. The dramatic rise of web appli- cations enabling business, social networking etc has only com- pounded the requirements to establish a robust approach to writ- ing and securing our Internet, Web Applications and Data.
At The Open Web Application Security Project (OWASP), we’re trying to make the world a place where insecure software is the anomaly, not the norm. The OWASP Testing Guide has an import- ant role to play in solving this serious issue. It is vitally important that our approach to testing software for security issues is based on the principles of engineering and science. We need a consis- tent, repeatable and defined approach to testing web applications. A world without some minimal standards in terms of engineering and technology is a world in chaos.
It goes without saying that you can’t build a secure application without performing security testing on it. Testing is part of a wider approach to building a secure system. Many software develop- ment organizations do not include security testing as part of their standard software development process. What is even worse is that many security vendors deliver testing with varying degrees of quality and rigor.
Security testing, by itself, isn’t a particularly good stand alone measure of how secure an application is, because there are an in- finite number of ways that an attacker might be able to make an application break, and it simply isn’t possible to test them all. We can’t hack ourselves secure and we only have a limited time to test and defend where an attacker does not have such constraints.
In conjunction with other OWASP projects such as the Code review Guide, the Development Guide and tools such as OWASP ZAP, this is a great start towards building and maintaining secure applica- tions. The Development Guide will show your project how to archi- tect and build a secure application, the Code Review Guide will tell you how to verify the security of your application’s source code, and this Testing Guide will show you how to verify the security of your running application. I highly recommend using these guides as part of your application security initiatives.
Why OWASP?
Creating a guide like this is a huge undertaking, requiring the ex- pertise of hundreds of people around the world. There are many different ways to test for security flaws and this guide captures the consensus of the leading experts on how to perform this test- ing quickly, accurately, and efficiently. OWASP gives like minded security folks the ability to work together and form a leading prac- tice approach to a security problem.
The importance of having this guide available in a completely free and open way is important for the foundations mission. It gives anyone the ability to understand the techniques used to test for common security issues. Security should not be a black art or closed secret that only a few can practice. It should be open to all and not exclusive to security practitioners but also QA, Developers
6
Testing Guide Foreword – By Eoin Keary
and Technical Managers. The project to build this guide keeps this expertise in the hands of the people who need it – you, me and anyone that is involved in building software.
This guide must make its way into the hands of developers and software testers. There are not nearly enough application security experts in the world to make any significant dent in the overall problem. The initial responsibility for application security must fall on the shoulders of the developers, they write the code. It shouldn’t be a surprise that developers aren’t producing secure code if they’re not testing for it or consider the types of bugs which introduce vulnerability.
Keeping this information up to date is a critical aspect of this guide project. By adopting the wiki approach, the OWASP community can evolve and expand the information in this guide to keep pace with the fast moving application security threat landscape.
This Guide is a great testament to the passion and energy our members and project volunteers have for this subject. It shall cer- tainly help change the world a line of code at a time.
Tailoring and Prioritizing
You should adopt this guide in your organization. You may need to tailor the information to match your organization’s technologies, processes, and organizational structure.
In general there are several different roles within organizations that may use this guide:
• Developers should use this guide to ensure that they are produc- ing secure code. These tests should be a part of normal code and unit testing procedures.
• Software testers and QA should use this guide to expand the set of test cases they apply to applications. Catching these vulnerabil- ities early saves considerable time and effort later.
• Security specialists should use this guide in combination with other techniques as one way to verify that no security holes have been missed in an application.
• Project Managers should consider the reason this guide exists and that security issues are manifested via bugs in code and de- sign.
The most important thing to remember when performing security testing is to continuously re-prioritize. There are an infinite num- ber of possible ways that an application could fail, and organiza- tions always have limited testing time and resources. Be sure time and resources are spent wisely. Try to focus on the security holes that are a real risk to your business. Try to contextualize risk in terms of the application and its use cases.
This guide is best viewed as a set of techniques that you can use to find different types of security holes. But not all the techniques are equally important. Try to avoid using the guide as a checklist, new vulnerabilities are always manifesting and no guide can be an exhaustive list of “things to test for”, but rather a great place to start.
The Role of Automated Tools
There are a number of companies selling automated security anal- ysis and testing tools. Remember the limitations of these tools so that you can use them for what they’re good at. As Michael Howard put it at the 2006 OWASP AppSec Conference in Seattle, “Tools do not make software secure! They help scale the process and help enforce policy.”
Most importantly, these tools are generic – meaning that they are not designed for your custom code, but for applications in general. That means that while they can find some generic problems, they do not have enough knowledge of your application to allow them to detect most flaws. In my experience, the most serious security issues are the ones that are not generic, but deeply intertwined in your business logic and custom application design.
These tools can also be seductive, since they do find lots of poten- tial issues. While running the tools doesn’t take much time, each one of the potential problems takes time to investigate and ver- ify. If the goal is to find and eliminate the most serious flaws as quickly as possible, consider whether your time is best spent with automated tools or with the techniques described in this guide. Still, these tools are certainly part of a well-balanced application security program. Used wisely, they can support your overall pro- cesses to produce more secure code.
Call to Action
If you’re building, designing or testing software, I strongly encour- age you to get familiar with the security testing guidance in this document. It is a great road map for testing the most common issues facing applications today, but it is not exhaustive. If you find errors, please add a note to the discussion page or make the change yourself. You’ll be helping thousands of others who use this guide.
Please consider joining us as an individual or corporate member so that we can continue to produce materials like this testing guide and all the other great projects at OWASP.
Thank you to all the past and future contributors to this guide, your work will help to make applications worldwide more secure.
Eoin Keary, OWASP Board Member, April 19, 2013
7
Testing Guide Frontispiece
“Open and collaborative knowledge: that is the OWASP way.” With V4 we realized a new guide that will be the standard de-facto guide to perform Web Application Penetration Testing
1 “Open and collaborative knowledge: that is the OWASP way.” With V4 we realized a new guide that will be the standard de-fac- to guide to perform Web Application Penetration Testing. – Matteo Meucci
OWASP thanks the many authors, reviewers, and editors for their hard work in bringing this guide to where it is today. If you have any comments or suggestions on the Testing Guide, please e-mail the
Testing Guide mail list:
Or drop an e-mail to the project leaders: Andrew Muller and Matteo Meucci
Version 4.0 The OWASP Testing Guide version 4 improves on version 3 in three ways:
[1] This version of the Testing Guide integrates with the two other flagship OWASP documentation products: the Developers Guide and the Code Review Guide. To achieve this we aligned the testing cate- gories and test numbering with those in other OWASP products. The aim of the Testing and Code Review Guides is to evaluate the security controls described by the Developers Guide.
[2] All chapters have been improved and test cases expanded to 87 (64 test cases in v3) including the introduction of four new chapters and controls: • Identity Management Testing • Error Handling • Cryptography • Client Side Testing
[3] This version of the Testing Guide encourages the community not to simply accept the test cases outlined in this guide. We encourage security testers to integrate with other software testers and devise test cases specific to the target application. As we find test cases that have wider applicability we encourage the security testing community to share them and contribute them to the Testing Guide. This will con- tinue to build the application security body of knowledge and allow the development of the Testing Guide to be an iterative rather than monolithic process.
Copyright and License Copyright (c) 2014 The OWASP Foundation. This document is released under the Creative Commons 2.5 License. Please read and understand the license and copyright conditions.
Testing Guide Frontispiece
http://lists.owasp.org/mailman/listinfo/owasp-testing
Revision History The Testing Guide v4 will be released in 2014. The Testing guide orig- inated in 2003 with Dan Cuthbert as one of the original editors. It was handed over to Eoin Keary in 2005 and transformed into a wiki. Mat- teo Meucci has taken on the Testing guide and is now the lead of the OWASP Testing Guide Project. From 2012 Andrew Muller co-leader- ship the project with Matteo Meucci.
2014 • “OWASP Testing Guide”, Version 4.0
15th September, 2008 • “OWASP Testing Guide”, Version 3.0
December 25, 2006 • “OWASP Testing Guide”, Version 2.0
July 14, 2004 • “OWASP Web Application Penetration Checklist”, Version 1.1
December 2004 • “The OWASP Testing Guide”, Version 1.0
Project Leaders
Andrew Muller
Matteo Meucci
Andrew Muller: OWASP Testing Guide Lead since 2013.
Matteo Meucci: OWASP Testing Guide Lead since 2007.
Eoin Keary: OWASP Testing Guide 2005-2007 Lead.
Daniel Cuthbert: OWASP Testing Guide 2003-2005 Lead.
8
Testing Guide Frontispiece
v4 Authors • Matteo Meucci • Pavol Luptak • Marco Morana • Giorgio Fedon • Stefano Di Paola • Gianrico Ingrosso • Giuseppe Bonfà • Andrew Muller • Robert Winkel • Roberto Suggi Liverani • Robert Smith • Tripurari Rai
v3 Authors • Anurag Agarwwal • Daniele Bellucci • Ariel Coronel • Stefano Di Paola • Giorgio Fedon • Adam Goodman • Christian Heinrich • Kevin Horvath • Gianrico Ingrosso • Roberto Suggi Liverani • Kuza55
v2 Authors • Vicente Aguilera • Mauro Bregolin • Tom Brennan • Gary Burns • Luca Carettoni • Dan Cornell • Mark Curphey • Daniel Cuthbert • Sebastien Deleersnyder • Stephen DeVries
v2 Reviewers • Vicente Aguilera • Marco Belotti • Mauro Bregolin • Marco Cova • Daniel Cuthbert • Paul Davies • Stefano Di Paola • Matteo G.P. Flora • Simona Forti • Darrell Groundy
v3 Reviewers • Marco Cova • Kevin Fuller • Matteo Meucci • Nam Nguyen • Rick Mitchell
v4 Reviewers • Davide Danelon • Andrea Rosignoli • Irene Abezgauz • Lode Vanstechelman • Sebastien Gioria • Yiannis Pavlosoglou • Aditya Balapure
• Thomas Ryan • Tim Bertels • Cecil Su • Aung KhAnt • Norbert Szetei • Michael Boman • Wagner Elias • Kevin Horvat • Tom Brennan • Tomas Zatko • Juan Galiana Lara • Sumit Siddharth
• Mike Hryekewicz • Simon Bennetts • Ray Schippers • Raul Siles • Jayanta Karmakar • Brad Causey • Vicente Aguilera • Ismael Gonçalves • David Fern • Tom Eston • Kevin Horvath • Rick Mitchell
• Eduardo Castellanos • Simone Onofri • Harword Sheen • Amro AlOlaqi • Suhas Desai • Ryan Dewhurst • Zaki Akhmad • Davide Danelon • Alexander Antukh • Thomas Kalamaris • Alexander Vavousis • Christian Heinrich
• Babu Arokiadas • Rob Barnes • Ben Walther • Anant Shrivastava • Colin Watson • Luca Carettoni • Eoin Keary • Jeff Williams • Juan Manuel Bahamonde • Thomas Skora • Irene Abezgauz • Hugo Costa
• Pavol Luptak • Ferruh Mavituna • Marco Mella • Matteo Meucci • Marco Morana • Antonio Parata • Cecil Su • Harish Skanda Sureddy • Mark Roxberry • Andrew Van der Stock
• Stefano Di Paola • David Endler • Giorgio Fedon • Javier Fernández-Sanguino • Glyn Geoghegan • Stan Guzik • Madhura Halasgikar • Eoin Keary • David Litchfield • Andrea Lombardini
• Ralph M. Los • Claudio Merloni • Matteo Meucci • Marco Morana • Laura Nunez • Gunter Ollmann • Antonio Parata • Yiannis Pavlosoglou • Carlo Pelliccioni • Harinath Pudipeddi
• Alberto Revelli • Mark Roxberry • Tom Ryan • Anush Shetty • Larry Shields • Dafydd Studdard • Andrew van der Stock • Ariel Waissbein • Jeff Williams • Tushar Vartak
• Eoin Keary • James Kist • Katie McDowell • Marco Mella • Matteo Meucci • Syed Mohamed • Antonio Parata • Alberto Revelli • Mark Roxberry • Dave Wichers
Trademarks • Java, Java Web Server, and JSP are registered trademarks
of Sun Microsystems, Inc. • Merriam-Webster is a trademark of Merriam-Webster, Inc. • Microsoft is a registered trademark of Microsoft Corporation. • Octave is a service mark of Carnegie Mellon University. • VeriSign and Thawte are registered trademarks
of VeriSign, Inc. • Visa is a registered trademark of VISA USA. • OWASP is a registered trademark of the OWASP Foundation
All other products and company names may be trademarks of their respective owners. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark.
9
Testing Guide Introduction
11
The OWASP Testing Project has been in development for many years. The aim of the project is to help people understand the what, why, when, where, and how of testing web applications.
2 Writing the Testing Guide has proven to be a difficult task. It was a challenge to obtain consensus and develop content that allowed peo- ple to apply the concepts described in the guide, while also enabling them to work in their own environment and culture. It was also a chal- lenge to change the focus of web application testing from penetration testing to testing integrated in the software development life cycle.
However, the group is very satisfied with the results of the project. Many industry experts and security professionals, some of whom are responsible for software security at some of the largest companies in the world, are validating the testing framework. This framework helps organizations test their web applications in order to build reliable and secure software. The framework does not simply highlighting areas of weakness, although the latter is certainly a by product of many of the OWASP guides and checklists. As such, hard decisions had top be made about the appropriateness of certain testing techniques and technologies. The group fully understands that not everyone will agree upon all of these decisions. However, OWASP is able to take the high ground and change culture over time through awareness and ed- ucation based on consensus and experience.
The rest of this guide is organized as follows: This introduction cov- ers the pre-requisites of testing web applications and the scope of testing. It also covers the principles of successful testing and testing techniques. Chapter 3 presents the OWASP Testing Framework and explains its techniques and tasks in relation to the various phases of the software development life cycle. Chapter 4 covers how to test for specific vulnerabilities (e.g., SQL Injection) by code inspection and pen- etration testing.
Measuring Security: the Economics of Insecure Software A basic tenet of software engineering is that you can’t control what you can’t measure [1]. Security testing is no different. Unfortunately, measuring security is a notoriously difficult process. This topic will not be covered in detail here, as it would take a guide on its own (for an introduction, see [2]).
One aspect that should be emphasized is that security measure- ments are about both the specific technical issues (e.g., how prevalent a certain vulnerability is) and how these issues affect the economics of software. Most technical people will at least understand the basic issues, or they may have a deeper understanding of the vulnerabilities. Sadly, few are able to translate that technical knowledge into mone- tary terms and quantify the potential cost of vulnerabilities to the ap- plication owner’s business. Until this happens, CIOs will not be able to develop an accurate return on security investment and, subsequently, assign appropriate budgets for software security. While estimating the cost of insecure software may appear a daunt- ing task, there has been a significant amount of work in this direction.
The OWASP Testing Project
For example, in June 2002, the US National Institute of Standards (NIST) published a survey on the cost of insecure software to the US economy due to inadequate software testing [3]. Interestingly, they estimate that a better testing infrastructure would save more than a third of these costs, or about $22 billion a year. More recently, the links between economics and security have been studied by academic re- searchers. See [4] for more information about some of these efforts.
While estimating the cost of insecure software may appear a daunt- ing task, there has been a significant amount of work in this direction. For example, in June 2002, the US National Institute of Standards (NIST) published a survey on the cost of insecure software to the US economy due to inadequate software testing [3]. Interestingly, they estimate that a better testing infrastructure would save more than a third of these costs, or about $22 billion a year. More recently, the links between economics and security have been studied by academic re- searchers. See [4] fo
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
