Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

You have been hired as a security professional for your company. You are to crea

ID: 3866350 • Letter: Y

Question

You have been hired as a security professional for your company. You are to create and implement a white box informal database security testing schedule for the organization. Create a paper that addresses the following:
1. Create a table that includes a rotating schedule for the 12 months of security testing. Include columns that identify time estimations for each test listed.
2. Create a planning and preparation checklist common to all security tests as a whole.
3. Identify any special planning and preparation needed for each test.
4. Identify the scope for each test and identify any special considerations that need to be addressed.
5. Create a list of at least five testing activities for each audit.
6. Provide recommendations for securing the database that is the unique oracle.
7. Provide recommendations for securing the database that is unique to MySQL.
8. Provide recommendations for securing the database that is unique to SQL Server.

Explanation / Answer

White box testing

It is the testing of internal segments of application( like here database application ) that is coding segment and infrastructure. It's main purpose to strengthen the security.

Rotating schedule for 2 months is as follows:

Jan

Feb

March

April

May

Total 99 day

25

20

24

15

15

It determines how many lines of code are being tested.

Statement coverage

Function Coverage

Functioncal coverage

Branch coverage

Decision Coverage

S. No Testing Type Month Time estimation(in days) Description 1 Code Average Testing

Jan

Feb

March

April

May

Total 99 day

25

20

24

15

15

It determines how many lines of code are being tested.

Statement coverage

Function Coverage

Functioncal coverage

Branch coverage

Decision Coverage

2 Security misconfiguration testing June and Iuly 50 This is done when safeguard for the application is assembled incorrectly. This is done due to the unauthorized access occurs on default account 3 XSSS testing August and September 56 This test is perform to find whether the attacker uses the application to send malicious code which is stored in the server 4 Insecure direct object testing October 18 This is done when direct object reference occurs when a developer leaks a reference to an interior implementationobjects like database key without authentication 5 Penetration testing November and December 45 This is the testing of computer network, system and application to find vulnerabilities
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote