International Journal of Science and Technological Research http://jstr.online/index.php/journal en-US International Journal of Science and Technological Research 2815-052X Recognizing SAST's (Static Application Security Testing) Principles and How It Functions Cons and Benefits http://jstr.online/index.php/journal/article/view/7 <p>The Static Application Security Testing (SAST) technique is used to examine the source code, byte code, assembly code, etc. to look for vulnerabilities that could endanger the security of the software that is currently being developed. IT is one of the automation testing methods that examines code flaws without actually running the test code. It is a type of white box testing technique that is carried out prior to code compilation. This is advantageous because all bugs found during testing can be fixed before the code is compiled, saving time and resources. It functions as a tool that is used throughout the software development life cycle with the goal of finding bugs while the software is being developed in the development environment. It is well-liked by programmers because it enables programmers to find almost all significant vulnerabilities by examining their own code before it is compiled. By doing this, the developers will be able to fix any bugs and improve the code's effectiveness to guard against vulnerabilities. The benefits and drawbacks of the SAST technique, as well as its working mechanism, will all be covered in the paper.</p> Piyush Sharma Copyright (c) 2022 2022-06-30 2022-06-30 2 1 01 04 Analysis of Dynamic Application Security Testing and A Comparison of Its Benefits to SAST http://jstr.online/index.php/journal/article/view/8 <p>By simulating attacks on the applications, DAST is a technique for dynamic application security testing that is used to identify weaknesses in web-based applications. The goal of this type of approach is to find application errors by reviewing the application from the outside in. To do this, the developers will act like a malicious intruder and launch various attacks against the application to see if they can break the code or not. On this basis, the programmers can identify the application's and the code's weak points and use stronger, more complex algorithms that are difficult for an attacker to defeat. In this manner, the code that is created will be effective and offer adequate security for web-based applications. After the DAST scan is finished, the results will be compared to what was anticipated, and if there are any discrepancies, the vulnerabilities will be found and fixed. It is one of the black box testing techniques which is used to evaluate the application from attacker’s view point without bothering about the source code or architecture of the application or software. Another advantage of DAST is to identify the configuration errors, etc and also find out the vulnerabilities against the SQL injection and cross scripting related errors.</p> Vikash Soni Copyright (c) 2022 2022-06-30 2022-06-30 2 1 05 08 Auditing the Agile Improvement in Programming Advancement and Understanding its Extension in Further Developing Programming Advancement Cycle http://jstr.online/index.php/journal/article/view/9 <p>Agile strategy is a cycle that is used in project management or software development that enables organisations to deliver products to customers more quickly, more effectively, and with better execution. Lithe advancement is focused on providing solutions in a steady manner, which means that it is focused on turning a few requirements into useful programming and then giving it to the client for criticism before repeating the cycle to achieve customer satisfaction. The benefit of using this method is that it is a gradual model, so if any advancements need to be made, they can be made successfully without requiring a lot of effort.</p> Dr. Sunita Chaudhary Copyright (c) 2022 2022-06-30 2022-06-30 2 1 09 13