spirent.com
Posts Tagged "security testing"

Read about the challenges of M2M/IoT development and how you can make sure your IoT hardware and software solutions are compatible, flexible and future-proof.

Read full post 0 Comments

In the real world, how do most people create a test case? In most instances, they open the tester GUI, configure the test, debug the test, run the test, print the report, and are done. The question when we drill deeper is “Is this the most effective way for us to be performing our testing?” Let’s drill down into the problems this technique creates for organizations. Generally, many test engineers are given a test set which may include a full DUT or specific test ports on a shared DUT. The configuration of specific attributes of these ports such as routing/IP information, firewall rules, ALCs typically do not change unless they are specifically being tested. In the classic model, the user keeps rebuilding attributes of the test over and over again potentially building the same test hundreds of times.

Read full post 0 Comments

When we’re testing for provisioning scale for a device under test candidate, what is the meaningful metric to measure? Traditional metrics such as bandwidth, connections per second, or open connections are narrow focused metrics that measure specific engineering attributes of the device. For example, open connections and connections per second will give you information about table scaling and bandwidth will give you information about forwarding efficiency but neither of these metrics will put it all together and directly measure how users perceive quality over time.

Read full post 0 Comments

It’s almost daily that we hear about one company after another with a data security breach of some kind. As recently reported by The New York Times, the Korea Credit Bureau is just one of the latest victims—with credit card details stolen from almost half of all South Koreans and sold to marketing firms. Also reported, the original 30 million affected from the Target data theft is now estimated to be between 70 and 110 million people. InformationWeek is calling the recent distributed denial-of-service attack (DDos) on Cloudflare one of the largest DDoS attack ever recorded, eclipsing the Spamhaus attack of last year. And the list goes on and on…

Read full post 0 Comments

In our last blog “Preparing Yourself for a Malware Epidemic,” we discussed the various types of malware and how they spread. In this blog, we’ll discuss some questions that every network manager should ask when testing their own network for malware.

As technology improves, malware attacks are becoming more destructive and harder to detect, costing you valuable time and resources. This means you need to be more vigilant and more prepared for an attack than ever before.

Read full post 0 Comments

How do you test against security threats you don't know exist?  In a previous blog we looked at how testing with signatures can be used to reduce known security threats.  However, for unknown threats, an alternative such as fuzzing testing needs to be employed.  Fuzzing testing passes random data through network protocols, API calls, and file streams—virtually anywhere applications and devices receive inputs. One of the goals is to determine whether any of this random input can crash or hang an application, bring down a website or put a device in a compromised state.

Read full post 0 Comments

The first topic we will look at in the series of blogs on network security is Distributed Denial-of-Service (DDoS). As we’ve all seen, DDoS attacks come from a multitude of compromised systems (botnets) attacking a single website with a flood of incoming messages, thereby causing a denial of service for your users. In a severe case, a massive DDoS attack took the entire country of Myanmar offline in 2010.  Many industry pundits have stated that botnets represent the biggest threat to Internet security.

Read full post 0 Comments

It's sobering to look at network security headlines today.   One might come to the conclusion that little progress has been achieved in stopping security breaches.  The range of headlines runs the gamut from non-business-threatening attacks to politically driven attacks against some of the worlds largest companies.

At one end of the spectrum, a denial-of-service attack prevented voting at the recent Miss Hong Kong pageant...

At the other end of the spectrum, "hacktivists" made a bold political statement against the world's largest oil company...

Read full post 0 Comments

It's sobering to look at network security headlines today.   One might come to the conclusion that little progress has been achieved in stopping security breaches.  The range of headlines runs the gamut from non-business-threatening attacks to politically driven attacks against some of the worlds largest companies.

At one end of the spectrum, a denial-of-service attack prevented voting at the recent Miss Hong Kong pageant...

At the other end of the spectrum, "hacktivists" made a bold political statement against the world's largest oil company...

Read full post 0 Comments
× Spirent.com uses cookies to enhance and streamline your experience. By continuing to browse our site, you are agreeing to the use of cookies.