Security

Articles

Using the Principles of the CIA Triad to Implement Software Security

If you're starting or improving a security program for your software, you probably have questions about the requirements that define security. Data need to be complete and trustworthy, and also accessible on demand, but only to the right people. The CIA triad defines three principles—confidentiality, integrity, and availability—that help you focus on the right security priorities.

Sylvia Killinen's picture Sylvia Killinen
How to Talk about Security Testing without Scaring People

When it came to security testing, Sylvia Killinen noted that her company's most frequent difficulty wasn't the testing itself. Instead, it was the communication that provided problems, in part because of the words used to explain what would be performed. If you take care with how you describe your process, you may get more support while executing tests and repairing systems.

Sylvia Killinen's picture Sylvia Killinen
The Star Wars Death Star—from a Tester’s Perspective

In the movie Star Wars: Episode IV—A New Hope, the Death Star was designed to be the perfect weapon, with enough firepower to destroy a thousand star systems. Yet a small, ragtag group was able to blow it up. If only Emperor Palpatine had consulted with testers, all of the Death Star’s vulnerabilities could have been found and addressed!

Michael Mak's picture Michael Mak
Test Attacks to Break Mobile Devices Book Review: Software Test Attacks to Break Mobile and Embedded Devices

Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams.

Michael Sowers's picture Michael Sowers

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.