INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.8, No.3, May. 2018

A Bug Tracking Tool for Efficient Penetration Testing

Full Text (PDF, 1051KB), PP.14-20


Views:38   Downloads:0

Author(s)

Kavita Pandey

Index Terms

Bug;Tracker;Testing;Penetration;Collaboration;Software

Abstract

A bug tracking system or defect tracking system is a software application that keeps track of reported software bugs in software development projects. A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system that looks for security weaknesses. The use of the above two paradigms is very famous in the software development industry. Many researches have managed to expose some problems like manual testing, report generation, etc which the developers might face if these are not used properly. There is a plethora of software’s that offer different kinds of solutions to the problems but somehow they lack one thing or the other. The objective here is to address these problems where the solution is using the bug tracking systems and penetration testing in an architectural manner. This would be done by using an already existing solution and then improvising upon it.

Cite This Paper

Kavita Pandey,"A Bug Tracking Tool for Efficient Penetration Testing", International Journal of Education and Management Engineering(IJEME), Vol.8, No.3, pp.14-20, 2018.DOI: 10.5815/ijeme.2018.03.02

Reference

[1]Khulood Salem Albeladi, M. Rizwan Jameel Qureshi, "Improvement of Component Integration Testing Technique", IJITCS, vol.5, no.8, pp.109-122, 2013. DOI: 10.5815/ijitcs.2013.08.11

[2]Mahmood H., Sirshar M., “A Case Study of Web Based Application by Analyzing Performance of a Testing tool”, I.J. Education and Management Engineering, Vol. 4, pp. 51-58, 2017.

[3]Abhinandan H. Patil, Neena Goveas, Krishnan Rangarajan, "Regression Test Suite Prioritization using Residual Test Coverage Algorithm and Statistical Techniques", International Journal of Education and Management Engineering(IJEME), Vol.6, No.5, pp.32-39, 2016.DOI: 10.5815/ijeme.2016.05.04

[4]Mohd. Anjum, Md. Asraful Haque, Nesar Ahmad, “Analysis and Ranking of Software Reliability Models based on weighted criteria value”, vol. 2, pp. 1-14, 2013.

[5]Tang Hong, Fan Guo-ling, "Based on The Research and Application of Tengen Software in Architectural Design Teaching Process", IJEME, vol.1, no.5, pp.26-31, 2011.

[6]A.S. Syed Fiaz, N. Devi, S. Aarthi, "Bug Tracking and Reporting System" in International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-3, Issue-1, March 2013.

[7]Zhang Gang, Wang Xiaolin, "Conformity Degree Analysis on Software Engineering Program and Professional Norms", IJEME, vol.3, no.2, pp.72-76, 2013.

[8]Mansour A. Alharbi, “Writing a Penetration Testing Report”, April 6th 2010.

[9]Kanaklata and Shweta Sharma, "Survey and Study of various Bug Tracking and Logging Toolkits" in International Journal of Computer Applications (0975–8887)Volume 116–No.12, April 2015.

[10]Sandeep Singh, "Analysis of Bug Tracking Tools" in International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013, ISSN 2229-5518.

[11]Suraj S. Mandalik, "Penetration Testing: An Art of Securing the System (Using Kali Linux)" in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 10, October 2015, ISSN: 2277 128X

[12]Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution

[13]Parosproxy - SecTools Top Network Security Tools.