Knowledge

Interactive application security testing

Source 📝

175: 27:
method that detects software vulnerabilities by interaction with the program coupled with observation and sensors. The tool was launched by several application security companies. It is distinct from
216: 83: 130: 67: 209: 32: 28: 155: 240: 190: 202: 235: 57: 120: 8: 182: 126: 63: 59:(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 101: 24: 186: 55: 229: 147: 36: 174: 84:"OWASP DevSecOps Guideline - v-0.2 | OWASP Foundation" 56:
Mike Chapple; James Michael Stewart; Darril Gibson (2021).
102:"What is IAST: Interactive Application Security Testing" 148:"SAST vs. DAST: Application Security Testing Explained" 227: 31:, which does not interact with the program, and 210: 145: 118: 217: 203: 125:. John Wiley & Sons. pp. 140–. 122:Alice and Bob Learn Application Security 112: 17:Interactive application security testing 228: 39:. It may be considered a mix of both. 169: 33:dynamic application security testing 35:, which considers the program as a 29:static application security testing 13: 14: 252: 173: 158:from the original on 2022-07-20. 146:Aaron Walker (August 14, 2019). 139: 94: 76: 49: 1: 42: 189:. You can help Knowledge by 7: 106:www.softwaretestinghelp.com 10: 257: 168: 62:. John Wiley & Sons. 241:Computer security stubs 119:Tanya Janca (2020). 198: 197: 183:computer security 132:978-1-119-68735-1 69:978-1-119-78624-5 248: 236:Security testing 219: 212: 205: 177: 170: 160: 159: 143: 137: 136: 116: 110: 109: 98: 92: 91: 80: 74: 73: 53: 25:security testing 19:(abbreviated as 256: 255: 251: 250: 249: 247: 246: 245: 226: 225: 224: 223: 166: 164: 163: 144: 140: 133: 117: 113: 100: 99: 95: 82: 81: 77: 70: 54: 50: 45: 12: 11: 5: 254: 244: 243: 238: 222: 221: 214: 207: 199: 196: 195: 178: 162: 161: 138: 131: 111: 93: 75: 68: 47: 46: 44: 41: 9: 6: 4: 3: 2: 253: 242: 239: 237: 234: 233: 231: 220: 215: 213: 208: 206: 201: 200: 194: 192: 188: 185:article is a 184: 179: 176: 172: 171: 167: 157: 153: 149: 142: 134: 128: 124: 123: 115: 107: 103: 97: 89: 85: 79: 71: 65: 61: 60: 52: 48: 40: 38: 34: 30: 26: 22: 18: 191:expanding it 180: 165: 151: 141: 121: 114: 105: 96: 87: 78: 58: 51: 20: 16: 15: 230:Categories 152:www.g2.com 43:References 88:Owasp.org 37:black box 156:Archived 23:) is a 129:  66:  181:This 187:stub 127:ISBN 64:ISBN 21:IAST 232:: 154:. 150:. 104:. 86:. 218:e 211:t 204:v 193:. 135:. 108:. 90:. 72:.

Index

security testing
static application security testing
dynamic application security testing
black box
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
ISBN
978-1-119-78624-5
"OWASP DevSecOps Guideline - v-0.2 | OWASP Foundation"
"What is IAST: Interactive Application Security Testing"
Alice and Bob Learn Application Security
ISBN
978-1-119-68735-1
"SAST vs. DAST: Application Security Testing Explained"
Archived
Stub icon
computer security
stub
expanding it
v
t
e
Categories
Security testing
Computer security stubs

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.