Performance, Volume and Security Testing

Primary tabs


Volume Testing
- seeks to verify the physical and logical limits to a system's capacity and
ascertain whether such limits are acceptable to meet the projected capacity of
the application's required processing.

The purpose of
Volume Testing is to find weaknesses

in the system with respect to its handling of large amounts of data, server
requests, etc.


Stress Testing
Determines the breaking point or
unacceptable performance point of a system to reveal the maximum service level
it can achieve.


Load Testing

Determines the response time of a system with various workloads within the
anticipated normal production range.

A load test
simulates user activity and analyzes the effect of the real-world user
environment on an application. By load testing a Web application throughout
development, a company can identify problematic parts of a Web application
before it is accessed by hundreds or thousands of users.


Scalability Testing
- Determines the behavior of a system with expanded workloads simulating
future production states such as added data and an increased amount of users.


Security Testing
- The primary reason for testing a system is to identify potential
vulnerabilities and subsequently repair them

Testing allows an organization to accurately assess their system’s
security posture.  Also, testing, using the techniques recommended in this
report, allows an organization to view its network the same way an attacker
would, thus providing additional insight and advantage.

The following types of security testing:

Network Mapping

Vulnerability Scanning

Penetration Testing

      1. The objective of
        this skill is to identify where and how the Quality Assurance professional
        can control IT technologies and technical practices such as:


        1. Backup and
          1. Restart
            application after problems are encountered.


        1. Security
          1. Protecting
            access to your organization’s technology assets.


        1. Privacy
          1.  Ensuring
            customer’s confidential data is not compromised.


        1. Client server.
          1. Identifying
            risks of distributed processing.
          2. Distributed
            Processing - Refers to any of a variety of computer systems that use
            more than one computer, or processor, to run an application. This
            includes parallel processing, in which a single computer uses more
            than one CPU to execute programs. More often, however, distributed
            processing refers to local-area networks (LANs) designed so that a
            single program can run simultaneously at various sites. Most
            distributed processing systems contain sophisticated software that
            detects idle CPUs on the network and parcels out programs to utilize


        1. Web based systems
          1. Reducing
            development cycle time with disciplined processes.

          2. Web-based systems integration is the
            art of combining multiple systems (including Legacy systems and
            proprietary software applications) into a new system that is
            accessible through a Web browser.


        1. E-Commerce.
          1. Brochure ware,
            storefront, or a selling channel.
          2. Brochure ware
            - A website that is little more than a corporate brochure, video, or
            other corporate media.
          3. Storefront - The
            software you use to build and manage your online store is critical to
            the overall success of your e-commerce venture. Your customers will
            want easy navigation of your product catalog, all the modern features
            of a shopping cart system, a simple check-out process, flexible
            payment options and clear confirmation that their order has been


        1. E-Business.
          1. A new business
            strategy built around demand and trust.
          2. eBusiness is an
            interaction with business partners, where the interaction is enabled
            by information technology. This is an accurate definition, but doesn't
            give us much insight into the excitement surrounding eBusiness and
          3. It is the
            information technology available to "enable" business transactions

Integrity Checkers

Virus Detection

War Dialing

There are several software 
packages available that allow hackers and network administrators to dial large
blocks of phone numbers in search of available modems.  This process is called
war dialing.  A computer with four modems can dial 10,000 numbers in a matter of
days.  Certain war dialers will even attempt some limited automatic hacking when
a modem is discovered.  All will provide a report on the .discovered. numbers
with modems.