Book Image

Testing Practitioner Handbook

By : Renu Rajani
Book Image

Testing Practitioner Handbook

By: Renu Rajani

Overview of this book

The book is based on the author`s experience in leading and transforming large test engagements and architecting solutions for customer testing requirements/bids/problem areas. It targets the testing practitioner population and provides them with a single go-to place to find perspectives, practices, trends, tools, and solutions to test applications as they face the evolving digital world. This book is divided into five parts where each part explores different aspects of testing in the real world. The first module explains the various testing engagement models. You will then learn how to efficiently test code in different life cycles. The book discusses the different aspects of Quality Analysis consideration while testing social media, mobile, analytics, and the Cloud. In the last module, you will learn about futuristic technologies to test software. By the end of the book, you will understand the latest business and IT trends in digital transformation and learn the best practices to adopt for business assurance.
Table of Contents (56 chapters)
Testing Practitioner Handbook
Credits
About the Author
Acknowledgement
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
Index

What should be monitored and reported?


Both the internal and external use of security parameters require evidence and should help in stating the quantification of security factors. One needs to ensure the right terminology of security parameters. Listed are some of the key parameters around which security metrics need to be captured. It will be valuable to ensure that parameters capture two main dimensions: the severity and impact of the incidence.

Application security/vulnerability management

Application security encompasses measures throughout the code's life cycle to prevent gaps in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application.

  • Vulnerability: A weakness of the (sub)system, which can be exploited for impairing its services or affecting its assets

  • Threat: A potential for violation of security, which exists when there is an action or event that could breach security...