CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
Mobile Technology enriching Digital Travel Experience

Michael Kubasik, Executive Vice President & CIO, Travel and Transport, Inc.

Technology Keys to Building a Disruptive Networked Business

Robert Crudup, EVP & CIO, SEI Investment Company

Evolution of Technology in the Wealth Management Space

Uday Shankar, CIO, BNY Mellon Wealth Management

MOBILE APPS IN THE NEW DECADE

Bibaswan Banerjee, Director, CRM and User Analytics, Klook

How 5G+ blockchain+ IoT+ Mobile apps and devices are about to lead us to a Passport of Things

Maurice Audinet, Head of Digital Transformation, Jurlique Hong Kong Limited

DevOps - It's not about the Technology: Lessons from the Frontline

Matthew Taloni, Head of Technology - Software Engineering, Prudential Corporation Asia [LSE: PRU]

Mobile Appiphany: From Booking Your Trip to Maximizing Your Stay, the New Frontier of Mobile Apps

Michael Nuciforo, VP Mobile, Fareportal

A Crash Course in Low-Code Software: What it Is, What it Does, Why it Matters

Karen Astley, Vice President Asia-Pacific, Appian [NASDAQ: APPN]

right

THANK YOU FOR SUBSCRIBING

How to Choose an Application Security Testing Method?

CIOAdvisor Apac | Thursday, November 14, 2019
Tweet

Mobile application testing is an onerous process and choosing the right method to test the application is equally important

Fremont, CA: Organizations must secure the applications they possess under strict budget and resources. Teams in the organization must align assessment efforts to ensure the right breadth and depth of test coverage. This highly depends on effectively leveraging humans and robots. Automated security scanning tools can effectively identify common vulnerabilities systematically. However, automated scanning tools are unable to detect certain vulnerability classes and are prone to false positives. 

Automation can quickly find defects that can be uncovered via supplying a broad set of malicious data and monitoring the system response, which includes most common vulnerabilities such as XSS and SQL. These scanners are programmed to find known vulnerabilities. If the pattern is not present in the database of known vulnerabilities, then it is unable to detect it. Moreover, it is tough for automated scanning tools to identify business logic defects.

Manual security testing has the ability to focus on hot spots that are identified during threat analysis. Additionally, it can find business logic errors, but it is time-consuming, unscalable, and sometimes unreasonable for the application under test due to over scrutiny. The process of manual security testing combines handpicked tools such as automated scanning tools, customized scripts, and manually crafted data that can identify errors in the application. Regardless of the patterns, experts leverage specialized tools to unveil extra information about the system. Instead of using a tool, the human perspective can deduce more details and take the potential exploit further.

Before choosing the testing method, it is imperative to analyze software behavior to identify whether any confidentiality, integrity, or availability principles are being violated. The majority of false positives detected by automated scanners are the result of the scanner misjudging the importance of a finding within the context of that particular application.

The application of generic rules to business-specific domain applications often results in a large number of false positives or false negatives. To determine a valid defect, it is crucial to understand the specific business functionality. In summation, both manual and automated testing serves their purpose. The key is to find the optimal balance for each application to experience the highest mitigation on investment possible.

Check This Out: Top Managed Security Companies

tag

Scrutiny

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/how-to-choose-an-application-security-testing-method-nwid-1945.html