© Crown Copyright (2000) Module 2.3 Functional Testing.

Slides:



Advertisements
Similar presentations
© Crown Copyright (2000) Module 2.6 Vulnerability Analysis.
Advertisements

© Crown Copyright (2000) Module 2.4 Development Environment.
© Crown Copyright (2000) Module 3.1 Evaluation Process.
Security Requirements
© Crown Copyright (2000) Module 2.0 Introduction to Module 2.
© Crown Copyright (2000) Module 2.5 Operational Environment.
Module 1 Evaluation Overview © Crown Copyright (2000)
© Crown Copyright (2000) Module 3.2 Evaluation Management.
© Crown Copyright (2000) Module 2.7 Penetration Testing.
© Crown Copyright (2000) Module 2.2 Development Representations.
SADC Course in Statistics Introduction to Statistical Inference (Session 03)
Software Quality Assurance Plan
Chapter 12 Prototyping and Testing Design of Biomedical Devices and Systems By Paul H. King Richard C. Fries.
ISO 9001:2000 Documentation Requirements
Software Quality Assurance Plan
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
The Open Source Security Myth — And How to Make it A Reality Michael Davis Dynamic Security Concepts, Incorporated Track 3, 1300 Sunday, 1 August 2004.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Software Testing and Quality Assurance
Research Methods for Business Students
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by.
WM Software Process & Quality Generic Processes - Slide #1  P. Sorenson SPiCE Reference Model - how to read Chapter 5 Capability Levels (process.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Prepared by Long Island Quality Associates, Inc. ISO 9001:2000 Documentation Requirements Based on ISO/TC 176/SC 2 March 2001.
A Review.  Introduction Paragraph   An opening sentence that introduces the topic of your opinion piece  3 sentences (minimum), which describes the.
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
Introduction to Software Quality Assurance (SQA)
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
CHAPTER 8 Estimating with Confidence
Audit Evidence 1 Presented by Mr John Chung, FCA Partner KPMG Member of Audit Practice Review Panel at the Financial Reporting Council 12 September 2012.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Background. History TCSEC Issues non-standard inflexible not scalable.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Unit Testing 101 Black Box v. White Box. Definition of V&V Verification - is the product correct Validation - is it the correct product.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
S15: Supervision and review. Objective of supervision and review  To ensure that the audit is done efficiently and effectively so that the audit opinion.
Chapter 3: Authentication, Authorization, and Accounting
Software Testing and Quality Assurance Software Quality Assurance 1.
Quality Control Review The Institute of Chartered Accountants of India.
1 Common Evaluation Methodology for IT Security Part 2: Evaluation Methodology chapter 5-8 Marie Elisabeth Gaup Moe 06/12/04.
5 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 5 Audit Responsibilities and Objectives.
Physical Inventory Why? 1 Barbara A. Finnegan, CPPM CF.
1 Chapter 9: Introduction to Inference. 2 Thumbtack Activity Toss your thumbtack in the air and record whether it lands either point up (U) or point down.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.
TM8104 IT Security EvaluationAutumn Evaluation - the Main Road to IT Security Assurance CC Part 3.
Software Engineering Chapter 6 Software requirements Ku-Yaw Chang Assistant Professor Department of Computer Science and Information.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Chapter 9 Substantive Procedures and the Financial Statement Audit Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons.
HNDIT23082 Lecture 09:Software Testing. Validations and Verification Validation and verification ( V & V ) is the name given to the checking and analysis.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
21 Copyright © 2008, Oracle. All rights reserved. Enabling Usage Tracking.
Web-site Design Strategy.  Task 4  To achieve P6 learners need to produce a plan showing what actions they would take to launch a small website.  The.
Page 1 The statutory framework for financial oversight Select Committee on Finance, 13 April 2010 Annexure B.
Unit 2 Computer Systems. The aim of this unit is to enable learners to:  Understand the components of computer systems and  Develop the skills needed.
PMIS Introduction to Sunflower Release 2.9 New Features And Custom Enhancements Training Presentation US Department of Health and Human Services.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Accounting Information Systems: A Business Process Approach
P802.1CF Information Model Structure
Lecture 09:Software Testing
Շարժական գույքի հետ կապված ապահովված գործարքների ռեժիմը Իրավական ներկայացում ________________ Ջեյմի Բոուման Երևան, Հայաստան 2013թ. նոյեմբեր.
Chapter 29: Program Security
DEPLOYING SECURITY CONFIGURATION
Evaluation.
Report of Japanese Test Phase <Cyber Security>
OWASP Application Security Verification Standard
Presentation transcript:

© Crown Copyright (2000) Module 2.3 Functional Testing

You Are Here M2.1 Security Requirements M2.2 Development Representations M2.3 Functional Testing M2.4 Development Environment M2.5 Operational Environment M2.6 Vulnerability Analysis M2.7 Penetration Testing M2.8 Assurance Maintenance/Composition MODULE 2 - ASSURANCE

Introduction What is Functional Testing ? –Why do we do it ? Developer testing –coverage and depth Evaluator testing –corroboration of developer testing –additional testing

What is Functional Testing ? Testing the Security Functions Confidence in design and refinement Proving the developers tests To collect ideas for Penetration Testing

Developers Test Evidence Test Plans and Specifications Test Programs Expected and Actual results

Test Coverage and Depth Covering the security functions Demonstrate that the TOE operates in accordance with the design Levels of testing and demonstration of coverage –direct –indirect

Different types of testing Repeating developers tests –sampling of tests Additional tests to ensure security functionality fully covered using different –interfaces –inputs –configuration parameters

ITSEC Requirements

CC Requirements

Typical Functional Test Form

Evaluation Reporting Record and justify sampling strategy Justify strategy for additional testing Record results of tests and conclusions Provide test configuration details

Summary Confidence that the security functions behave as specified –coverage and depth –corroboration of developer tests –additional tests Understanding before Penetration testing

Further Reading ITSEC evaluation UK SP 05 Part III, Chapter 7 CC evaluation CC Part 3, Sections and 13 CEM Part 2, Chapters 5-8 (ATE sections)

Exercise - 1 Only an administrator with the appropriate authorisation shall be able to: create new user accounts delete, disable or enable existing user accounts. Identify test cases to provide adequate coverage of the above security function

Exercise - 2 Identify test cases to cover all statements all branches AB C TRUEFALSE y z TRUE