Cyber Security Testing - Tescom Singapore Software Systems Testing
page-template,page-template-full_width,page-template-full_width-php,page,page-id-16093,bridge-core-1.0.4,qode-listing-2.0.1,ajax_fade,page_not_loaded,,qode_grid_1200,footer_responsive_adv,qode-theme-ver-18.0.9,qode-theme-bridge,disabled_footer_bottom,qode_header_in_grid,wpb-js-composer js-comp-ver-5.7,vc_responsive

Cyber Security Testing

A type of software testing activities that intends to uncover the vulnerabilities of the system and to determine that its data and resources are protected from misuse, compromise, information theft and potential cyber security attacks.
Security Configuration Review

Security hardening review is performed to ascertain that the system is configured and hardened appropriately based on the security design of the system.

Vulnerability Assessment (VA)

Is to assess the security holes (vulnerabilities) in an application, operating systems, network and communications systems and infrastructure.

Penetration Test (PT)

Is the process that exploits the vulnerabilities to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat.

Dynamic Application Security Test (DAST)

A black-box security testing activity in which the application is tested from the outside without login information to analyze a web-based application and identify potential security vulnerabilities.

Static Application Security Test (SAST)

A white-box security testing activity to analyze the source codes of the application, identify and exploit all application and code vulnerabilities.

Source Code Review

A process to conduct a systematic examination of the computer program code to find and remove vulnerabilities.

Security Risk Assessment

Allows an organization to view the application portfolio holistically from attacker’s perspective and an integral part of an organization's risks management process. Risk assessment identifies, assess and implement key security controls in the application. It also focuses on preventing application security defects and vulnerabilities.

Policy and Process Compliance Review

Manual review of the current documentation relevant to industry ICT security policies, guidelines and standards and interview with the personnel before the system commissioning.

We are an international professional services firm providing software quality assurance and testing expertise.

This is a category of Black box testing, geared to functional requirements of an application, performed by the testing team.