@Arunthomas115
www.linkedin.com/in/arun1105
Security Testing is deemed successful when the below attributes of an application are intact
Authentication - Is the person / package being truthful about their identity?
Authorization - Is the package/person allowed to do this operation?
Availability - Will this service do me good any time of the day?
Confidentiality - Is the service and information safe from unauthorized prying eyes?
Integrity - Does the service provide only the correct information to the user?
Non-Repudiation - Did the communication happen between two legitimate users?
The goal is to make sure that the system/ application does not have any loopholes/vulnerabilities/system fallbacks.
OWASP testing guide
PCI Penetration testing guide
Penetration Testing Execution Standard(PTES)
NIST 800-115
Penetration Testing Framework
Information Systems Security Assessment Framework (ISSAF)
Open Source Security Testing Methodology Manual (“OSSTMM”)
The Open Web Application Security Project (OWASP) is a great resource for software security professionals.
https://goo.gl/E6HCCC
Misconception - IoT Security is != Device Security.
Hardware
Web/Mobile Interface
Communication Channel
Webapplication security Issues - OWASP Top 10 WebAppSec
Mobile Application Security Issues - OWASP Top 10 MobileAppsec
https://www.owasp.org/index.php/Top_10_2013-Top_10
https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10