Book Image

Software Test Design

By : Simon Amey
Book Image

Software Test Design

By: Simon Amey

Overview of this book

Software Test Design details best practices for testing software applications and writing comprehensive test plans. Written by an expert with over twenty years of experience in the high-tech industry, this guide will provide you with training and practical examples to improve your testing skills. Thorough testing requires a thorough understanding of the functionality under test, informed by exploratory testing and described by a detailed functional specification. This book is divided into three sections, the first of which will describe how best to complete those tasks to start testing from a solid foundation. Armed with the feature specification, functional testing verifies the visible behavior of features by identifying equivalence partitions, boundary values, and other key test conditions. This section explores techniques such as black- and white-box testing, trying error cases, finding security weaknesses, improving the user experience, and how to maintain your product in the long term. The final section describes how best to test the limits of your application. How does it behave under failure conditions and can it recover? What is the maximum load it can sustain? And how does it respond when overloaded? By the end of this book, you will know how to write detailed test plans to improve the quality of your software applications.
Table of Contents (21 chapters)
Part 1 – Preparing to Test
Part 2 – Functional Testing
Part 3 – Non-Functional Testing
Appendix – Example Feature Specification

Running security scans

While this chapter describes some core security testing requirements, it is unusual because this area has so much shared code and common vulnerabilities that third-party companies have extensively automated it. Don’t start security testing from scratch; you will never achieve the depth and breadth of knowledge compiled by third-party tools.

Security scanners can quickly find common security issues such as these:

  • Unnecessarily open ports: Accepting inputs to services you don’t need unnecessarily increases your attack area
  • Out-of-date software and libraries: Libraries are kept up to date with the latest security fixes, so running old software leaves you vulnerable
  • Out-of-date security hash functions: Older, less secure hash functions can be compromised. meaning attackers could break encrypted communications
  • Connections that don’t require encryption: Accidentally sending messages in clear text allows eavesdropping
  • ...