Title: 3 Characteristics of Well Protected Data
13 Characteristics of Well Protected Data
2In general, software products are meant for
processing, storing and exchange of data.
Different programs process different kinds of
data for different purposes.
3At present security of user data have become one
of the main requirements to an application.
Security standards are very high for e-commerce,
banking and other programs dealing with sensitive
business and personal data.
41. Every user has access and is able to edit only
the data that he or she is entitled to utilize.
2. All the sensitive data are stored in an
encrypted form.
One Can Say That Data are Properly Protected If
53. All the sensitive data are transferred between
the server and client machine, the system
modules, other software products, etc. in an
encrypted form, via protected channels.
One Can Say That Data are Properly Protected If
6Data protection is one of the main points
during security testing of a software product.
Test engineers have to find out whether the
mentioned conditions are met.
7Besides, it is necessary to check whether the
data are not corrupted or lost during coding,
decoding and transitions. One should make sure
that sensitive information does not appear in a
readable form anywhere, for example, in the
browser address line.
8Manual and automated testing is applied for
checking data protection. This part of software
testing must be carried out thoroughly otherwise
the application users and owners may face serious
problems.
9Thank You