Performance, Volume and Security Testing
- seeks to verify the physical and logical limits to a system's capacity and
ascertain whether such limits are acceptable to meet the projected capacity of
the application's required processing.
The purpose of
Volume Testing is to find weaknesses
in the system with respect to its handling of large amounts of data, server
- Determines the breaking point or
unacceptable performance point of a system to reveal the maximum service level
it can achieve.
- Determines the response time of a system with various workloads within the
anticipated normal production range.
A load test
simulates user activity and analyzes the effect of the real-world user
environment on an application. By load testing a Web application throughout
development, a company can identify problematic parts of a Web application
before it is accessed by hundreds or thousands of users.
- Determines the behavior of a system with expanded workloads simulating
future production states such as added data and an increased amount of users.
- The primary reason for testing a system is to identify potential
vulnerabilities and subsequently repair them
Testing allows an organization to accurately assess their system’s
security posture. Also, testing, using the techniques recommended in this
report, allows an organization to view its network the same way an attacker
would, thus providing additional insight and advantage.
The following types of security testing:
- The objective of
this skill is to identify where and how the Quality Assurance professional
can control IT technologies and technical practices such as:
- Backup and
application after problems are encountered.
access to your organization’s technology assets.
customer’s confidential data is not compromised.
- Client server.
risks of distributed processing.
Processing - Refers to any of a variety of computer systems that use
more than one computer, or processor, to run an application. This
includes parallel processing, in which a single computer uses more
than one CPU to execute programs. More often, however, distributed
processing refers to local-area networks (LANs) designed so that a
single program can run simultaneously at various sites. Most
distributed processing systems contain sophisticated software that
detects idle CPUs on the network and parcels out programs to utilize
- Web based systems
development cycle time with disciplined processes.
Web-based systems integration is the
art of combining multiple systems (including Legacy systems and
proprietary software applications) into a new system that is
accessible through a Web browser.
- Brochure ware,
storefront, or a selling channel.
- Brochure ware
- A website that is little more than a corporate brochure, video, or
other corporate media.
- Storefront - The
software you use to build and manage your online store is critical to
the overall success of your e-commerce venture. Your customers will
want easy navigation of your product catalog, all the modern features
of a shopping cart system, a simple check-out process, flexible
payment options and clear confirmation that their order has been
- Brochure ware,
- A new business
strategy built around demand and trust.
- eBusiness is an
interaction with business partners, where the interaction is enabled
by information technology. This is an accurate definition, but doesn't
give us much insight into the excitement surrounding eBusiness and
- It is the
information technology available to "enable" business transactions
- A new business
There are several software
packages available that allow hackers and network administrators to dial large
blocks of phone numbers in search of available modems. This process is called
war dialing. A computer with four modems can dial 10,000 numbers in a matter of
days. Certain war dialers will even attempt some limited automatic hacking when
a modem is discovered. All will provide a report on the .discovered. numbers