A SYSTEMATIC BROAD REVIEW ON SOFTWARE SECURITY TESTING IN DIFFERENT WAYS
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 11)Publication Date: 2020-11-30
Authors : Suman;
Page : 77-97
Keywords : Software; Penetration Testing; attack; vulnerability assessment; network; wireless medium;
Abstract
In this modern era, mostly all wireless software applications are hacked and injected because of several harmful activities. Henceforth, different frameworks were developed to measure the security level in software systems. Especially, the penetration testing (PT) model is mostly worn by all applications to make the attack vulnerability assessment. To secure the system, initially the behaviour of attacks should be analysed and that is trained in specific agent or software module. Based on the trained activities the specific verification system can predict the present malicious activities. Furthermore, the verification agent or system should be automated to find the harmful activities in any time. Also, the PT is utilized in both hardware and software gadgets, it is processed based on the support of software functions. In other case, the Machine Learning (ML) and Reinforcement Learning (RL) model is functioned to process the attack behaviour in software systems. Moreover, in this review the usage of PT is elaborated in dissimilar ways for different applications. Subsequently, the performance of PT framework is differed based on its each software or applications.
Other Latest Articles
- Management of Multiple Sclerosis and Effectiveness of Ozanimod in Relapsing Multiple Sclerosis
- Pharmaceutical and Analytical Study of Manjishtadi Arka
- Analytical Study of Loha Bhasma and Lohaguggulu
- In-home Recovery of a Hospital Borne Non-Severe COVID-19: A Case Report of an Ear, Nose and Throat Specialist of Bangladesh
- Pharmaceutical Preparation of Agnikumāra Rasa; A Herbo-mineral Preparation
Last modified: 2020-12-05 22:58:17