ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Open Web Application Security Project Security Testing

Verified

Added on  2023/06/10

|17
|2709
|471
AI Summary
This article discusses the different test cases for Open Web Application Security Project (OWASP) security testing, including administrative interface, cloud web interface, mobile application, network traffic, user web interface, and local data storage. It also covers the pre-conditions, dependencies, test steps, expected results, post-conditions, actual results, and status of each test case.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Open Web Application Security Project security testing
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Table of Contents
Test Case..........................................................................................................................................2
Administrative Interface..............................................................................................................2
Cloud Web Interface....................................................................................................................4
Mobile Application......................................................................................................................6
Network traffic.............................................................................................................................9
User Web interface....................................................................................................................11
Local Data Storage....................................................................................................................13
Reference.......................................................................................................................................16
Document Page
2
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Test Case
Administrative Interface
Test Case Field Description
Test case ID: Administrative Interface #1
Test Priority: o High
Name of the Module: Computer Information System
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL
Name or Test Title: Administrator Interface security test
Description/Summary
of Test:
OWASP administration security of computing devices are
under threat. Administrative Interface of OWASP leads to
issues related to encryption and logging options. Issues
regarding two factor authentication is also taken into
consideration. Unit Testing Methodology will be used in
this test case
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Document Page
3
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Test Steps: For performing a security test case a testing expert must
be hired (Hamdan, 2015). Testing expert must create more than
one account, with several user identities and more than one role.
After creation of multiple user accounts, authentication test will
be performed. This test will perform password authentication
with the help of security questions and captcha as a log out
function. In case the servers can log in without proper
authentications, robustness of the server will be questioned and
the reason behind testing will be successful. Authentication
testing of OWASP administrative interface must be done by two
factor authentication technique (Jacobs, 2015). This kind of
testing can be performed by introducing another layer of security
with the help of pre answered questionnaires. Client who wants
to log in to the server needs to overcome two layers of security
which acts more difficult than overcoming only one layer of
security.
Test Data: Captcha that is used: CRY67@Y
Password: ILET@2013
Security Question Answer: Cristiano Ronaldo
Expected Results: Access to the portal will be denied

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Post-Condition: The portal was accessed and this leads to the
fact that the data management is processed with
highest efficiency
Actual Result: Portal was accessed
Status (Fail/Pass): Fail
Cloud Web Interface
Test Case Field Description
Test case ID: Cloud Web Interface #1
Test Priority: o High
Name of the Module: Computer Information System
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL
Name or Test Title: Cloud Web Interface security test
Description/Summary
of Test:
Integrating testing methodology will be used for testing
the robustness of the cloud web service platform. In case
Document Page
5
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
of performance testing, failure due to actions performed
by user action as cloud computing affects performance of
users
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Test Steps: For preparing a test case of OWASP regarding cloud web
interface, disruption must be checked in both manual and
automatic scaling. For testing the security proper authentication
tests must be given. This test will start with a creating multiple
applications and then try to log in to the account with vague
password and identity (Rittinghouse and Ransome, 2016). In case
applications with wrong identity logs into the cloud, it will prove
the lack of robustness of cloud platforms. Transport encryption
can be tested by trying to decrypt data that is being passed
through the channel. In case decryption of data is possible by a
vague application then it is termed to be lacking in encryption
robustness. Two factor authentication is also performed in cloud
applications. Genuine client needs to pass through 2 security
stages, leading to the fact that imposters face hindrances in
gaining access to the account. For creating a 2 factor
authentication test, the platform must be provided with a test that
initially prevents the client from accessing the data present in the
Document Page
6
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
account by a security password system (Arunkumar and
Anbuselvi, 2017). After the client passes the password stage, the
client faces another security stage in which a pre answered
questionnaire is asked and if the client answers the questionnaire
correctly gets the permission to gain access to the account. These
test cases might help in mitigating security issues present in
cloud web interface.
Test Data: Password: Password123
Security Question Answer: Myself
Expected Results: Access to the portal will be denied
Post-Condition: The portal could not be accessed and this leads to
the fact that the data management is processed
with highest efficiency
Actual Result: Portal could not be accessed
Status (Fail/Pass): Pass
Mobile Application
Test Case Field Description

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Test case ID: Mobile Application#1
Test Priority: o High
Name of the Module: Computer Information System
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL
Name or Test Title: Mobile Application security test
Description/Summary
of Test:
Integrating testing methodology will be used for testing
the robustness of the cloud web service platform. In case
of performance testing, failure due to actions performed
by user action as cloud computing affects performance of
users
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Test Steps: For preparing a test case of OWASP regarding cloud web
interface, disruption must be checked in both manual and
automatic scaling. For testing the security proper authentication
tests must be given. This test will start with a creating multiple
Document Page
8
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
applications and then try to log in to the account with vague
password and identity (Rittinghouse and Ransome, 2016). In case
applications with wrong identity logs into the cloud, it will prove
the lack of robustness of cloud platforms. Transport encryption
can be tested by trying to decrypt data that is being passed
through the channel. In case decryption of data is possible by a
vague application then it is termed to be lacking in encryption
robustness. Two factor authentication is also performed in cloud
applications. Genuine client needs to pass through 2 security
stages, leading to the fact that imposters face hindrances in
gaining access to the account. For creating a 2 factor
authentication test, the platform must be provided with a test that
initially prevents the client from accessing the data present in the
account by a security password system (Arunkumar and
Anbuselvi, 2017). After the client passes the password stage, the
client faces another security stage in which a pre answered
questionnaire is asked and if the client answers the questionnaire
correctly gets the permission to gain access to the account. These
test cases might help in mitigating security issues present in
cloud web interface.
Test Data: Password: 7eti7w6
Document Page
9
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Face detection
Finger print
Expected Results: Access to the portal will be denied
Post-Condition: The portal could not be accessed and this leads to
the fact that the data management is processed
with highest efficiency
Actual Result: Portal could not be accessed
Status (Fail/Pass): Pass
Network traffic
Test Case Field Description
Test case ID: Network traffic security#1
Test Priority: o High
Name of the Module: Computer Information System
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Name or Test Title: Network traffic security test
Description/Summary
of Test:
Integrating Testing model is used in testing vulnerabilities
related with Network traffic. During installation of new
cables, wiremap attenuation testing is done. This helps in
processing of LAN in a more efficient way. Internet
connection is also tested during connection of the
processing system. Range of network is tested, leading to
the fact internet connection that is being made is tested
with the help of Ookla
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Test Steps: This helps in tracking the speed of data which that is
flowing through the LAN in terms of OWASP. A reference speed
is initially set before testing the platform with the help of Online
Web Application System Project. In case the result of test is not
as par with the reference speed, entire process is put under test.
Range LAN provides is also put under test. A reference range is
set initially before processing of the LAN. During the test, if
LAN does not provide enough range to the computing devices,
most important thing that is to be done by introducing an OTX
layer for reducing interference of network from other computing
appliances. Protocol fuzzing is a technique that is used by
imposters to introduce faulty codes in between entire set of
codes. Test case includes regular checking of interference in the
data that is transmitted and the data that is data gets received. In
Document Page
11
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
case there is a difference in content of the process it is concluded
that fuzzing has been performed. Encryption terminologies are
maintained in order to protect the code from decryption.
Test Data: Testing data
Expected Results: Access to the portal will be denied
Post-Condition: The portal was accessed and this leads to the
fact that the data management is not processed
with highest efficiency
Actual Result: Portal could be accessed
Status (Fail/Pass): Fail
User Web interface
Test Case Field Description
Test case ID: User Web Interface#1
Test Priority: o High
Name of the Module: Computer Information System
Document Page
12
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL
Name or Test Title: User Web Interface
Description/Summary
of Test:
Integrating testing model is used in this process. Testing a
User Web Interface is very important as it includes
security related problems.
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Test Steps: To mitigate issues of Online Web Application System
Project with related to User Web Interface, checking the
robustness of User Web Interface is processed by creating
more than single accounts, and trying to log in the
account of a single client with differently set password. In
case logging in is possible, it can be concluded that
robustness of User web Interface is not very high. Setting
account lock out is one of the most important process
after a certain time as it protects data from imposters in
case of absence of the genuine clients. Password recovery

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
mechanism is also one of the most important process that
helps in maintain robustness of the User web Interface.
Online Web Application System Project testing regarding
User Web Interface is very important and the processing
must be completed with utmost concern.
Test Data: Account Lock
Differential Password
Expected Results: Access to the portal will be denied
Post-Condition: The portal could not be accessed and this leads to
the fact that the data management is processed
with highest efficiency
Actual Result: Portal could not be accessed
Status (Fail/Pass): Pass
Local Data Storage
Test Case Field Description
Test case ID: Local Data storage#1
Test Priority: o High
Name of the Module: Computer Information System
Document Page
14
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Test Designed by: PLEASE FILL
Date of test
designed:
PLEASE FILL
Test Executed by: PLEASE FILL
Date of the Test
Execution:
PLEASE FILL
Name or Test Title: Local Data Storage
Description/Summary
of Test:
Unit test models are used in testing vulnerabilities related
to Local data storage. Data stored in local networking
systems are not very secured.
Pre-condition: No pre decisive condition
Dependencies: No specific dependency
Test Steps: To check the security of the data testing the encryption
strength of data is very important. In this test, testers try
to gain access to data by illegal means. In case they gain
access to the data, it is proclaimed that proper encryption
of data is not made. Integrity is also checked with this
process. Irrelevant data is stored in vulnerable position,
leading to the fact imposters try to gain access to the data
(Perlman, Kaufman and Speciner, 2016). This helps
organizations to understand the loop holes in their
Document Page
15
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
networking system. Static encoding and decoding is
tested as well, as it acts as one of the main reason of data
losing. OWASP deals with characteristics that are
bivalent in nature leading to the fact that Local data
Storage security test case is performed with the help of
proper encryption data sets.
Test Data: Static decoding
Differential Password
Expected Results: Access to the portal will be denied
Post-Condition: The portal could not be accessed and this leads to
the fact that the data management is processed
with highest efficiency
Actual Result: Portal could not be accessed
Status (Fail/Pass): Pass

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16
OPEN WEB APPLICATION SECURITY PROJECT SECURITY TESTING
Reference
Arunkumar, R.J. and Anbuselvi, R., 2017. ENHANCEMENT OF CLOUD COMPUTING
SECURITY IN HEALTH CARE SECTOR.
Jacobs, S., 2015. Engineering information security: the application of systems engineering
concepts to achieve information assurance. John Wiley & Sons.
Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future
trends. CRC Press.
Ogata, M.A., Guttman, B. and Hastings, N.E., 2015. Public Safety Mobile Application Security
Requirements Workshop Summary (No. NIST Interagency/Internal Report (NISTIR)-8018).
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a
public world. Pearson Education India.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
1 out of 17
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]