Black Box Testing

25th March 2020 | Cybrary Black Box Testing


Black Box Testing is a method of software testing that examines the functionality of an application without peering into its internal software structures (which is known as White Box Testing). This method of testing can be applied to virtually every level of software testing: unit, integration, system and acceptance. Black Box Testing is a form of penetration testing

Test cases are built around specifications, requirements and what the application is supposed to do. Test cases are generally derived from external descriptions of the software, including specifications, requirements and design parameters. Although the tests used are primarily functional in nature, non-functional tests may also be used. The test designer selects both valid and invalid inputs and determines the correct output, often with the help of a test oracle or a previous result that is known to be good, without any knowledge of the test device’s internal structure.

Source: CNSSI 4009-2015, Practical Test Design: Selection of Traditional and Automated Test Design Techniques

Additional Reading: Penetration Testing for WordPress Websites

Related Terms: Penetration Testing, White Box Testing

What does this mean for an SMB?

Black box testing is something that can be used by any organization to test out their applications. This type of testing should be a part of any strong software development program. It’s always better for an ethical hacker to find a critical vulnerability in your software systems than a malicious hacker exploiting it to gain system or network access.Penetration testing can be pricey, but it can save your company money in the long-term by reducing the likelihood of a costly data security breach. 

To learn about the difference between Black Box and White Box Testing, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more
Your WiFi Might Be Watching You… Sort Of

Your WiFi Might Be Watching You… Sort Of

As smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...

Read more