Use real world experience to support your views, as appropriate. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification.
Describe how security testing differs from ordinary functionality testing. What
artifacts (such as documents) would each produce? What results would each
produce? How would you protect programs from malicous code, what should you look for?
Make sure to cite at least one reference using APA guidelines. Wikipedia, blogs and about.com are not credible sources. You should be using scholarly articles found in the Library Databases.
Minimum 250 words