parent
e734563996
commit
a5afac7d6d
31 changed files with 51 additions and 55 deletions
@ -1,3 +1,7 @@ |
||||
# Sanity Testing |
||||
|
||||
Sanity testing is a kind of Software Testing performed after receiving a software build, with minor changes in code, or functionality, to ascertain that the bugs have been fixed and no further issues are introduced due to these changes. The goal is to determine that the proposed functionality works roughly as expected. If sanity test fails, the build is rejected to save the time and costs involved in a more rigorous testing. |
||||
Sanity testing is a kind of Software Testing performed after receiving a software build, with minor changes in code, or functionality, to ascertain that the bugs have been fixed and no further issues are introduced due to these changes. The goal is to determine that the proposed functionality works roughly as expected. If sanity test fails, the build is rejected to save the time and costs involved in a more rigorous testing. |
||||
|
||||
Visit the following resources to learn more: |
||||
|
||||
- [@article@What is Sanity Testing?](https://www.browserstack.com/guide/sanity-testing#:~:text=Sanity%20Testing%20or%20Surface%20Level,working%20properly%20without%20any%20bugs.) |
@ -1,21 +1,14 @@ |
||||
# Vulnerability Scanning |
||||
|
||||
Vulnerability scanning identifies hosts and host attributes |
||||
(e.g., operating systems, applications, open ports), but it also attempts to identify vulnerabilities rather |
||||
than relying on human interpretation of the scanning results. Many vulnerability scanners are equipped to |
||||
accept results from network discovery and network port and service identification, which reduces the |
||||
amount of work needed for vulnerability scanning. |
||||
Vulnerability scanning identifies hosts and host attributes (e.g., operating systems, applications, open ports), but it also attempts to identify vulnerabilities rather than relying on human interpretation of the scanning results. Many vulnerability scanners are equipped to accept results from network discovery and network port and service identification, which reduces the amount of work needed for vulnerability scanning. |
||||
|
||||
Also, some scanners can perform their own network |
||||
discovery and network port and service identification. Vulnerability scanning can help identify outdated |
||||
software versions, missing patches, and misconfigurations, and validate compliance with or deviations |
||||
from an organization’s security policy. |
||||
Also, some scanners can perform their own network discovery and network port and service identification. Vulnerability scanning can help identify outdated |
||||
software versions, missing patches, and misconfigurations, and validate compliance with or deviations from an organization’s security policy. |
||||
|
||||
This is done by identifying the operating systems and major |
||||
software applications running on the hosts and matching them with information on known vulnerabilities |
||||
This is done by identifying the operating systems and major software applications running on the hosts and matching them with information on known vulnerabilities |
||||
stored in the scanners’ vulnerability databases. |
||||
|
||||
Visit the following resources to learn more: |
||||
|
||||
- [@article@NIST Website](https://csrc.nist.gov/glossary/term/vulnerability_scanning) |
||||
- [@official@NIST Website](https://csrc.nist.gov/glossary/term/vulnerability_scanning) |
||||
- [@feed@Explore top posts about Vulnerability](https://app.daily.dev/tags/vulnerability?ref=roadmapsh) |
||||
|
Loading…
Reference in new issue