Proposing SQL Statement Coverage Metrics: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 26: | Line 26: | ||
=== 2.1 Testing for Security === | === 2.1 Testing for Security === | ||
Web applications are inherently insecure <sup>[[#scottSharp|[4]]]</sup> and web applications’ attackers look the same as any other customer to the server <sup>[[#Ogren|[5]]]</sup>. Developers should, but typically do not, focus on building security into web applications <sup>[[# | Web applications are inherently insecure <sup>[[#scottSharp|[4]]]</sup> and web applications’ attackers look the same as any other customer to the server <sup>[[#Ogren|[5]]]</sup>. Developers should, but typically do not, focus on building security into web applications <sup>[[#mcgraw|[6]]]</sup>. Security has been added to the list of web application quality criteria <sup>[[#offutt|[7]]]</sup> and the result is that companies have begun to incorporate security testing (including input validation testing) into their development methodologies <sup>[[#brenner|[8]]]</sup>. Security testing is contrasted from traditional testing, as illustrated by Figure 2: Functional vs. Security Testing, adapted from <sup>[[#thompson|[9]]]</sup>. | ||
[[File:Sess-figure-2.png|thumb|'''Figure 2. Intended vs. Actual Behavior, (adapted from <sup>[[#thompson|[9]]]</sup>)''']] | [[File:Sess-figure-2.png|thumb|'''Figure 2. Intended vs. Actual Behavior, (adapted from <sup>[[#thompson|[9]]]</sup>)''']] | ||