Sunday, October 13, 2013
What are two fundamental cryptography principles?
Posted by
Sunflower
at
10/13/2013 06:00:00 AM
0
comments
Labels: attacks, Authenticate, Cryptography, Encrypt, Encryption, Errors, Fundamental, Host, Information, Integrity, Intruder, Messages, Principles, Recipient, Redundancy, System, update, Valid
![]() | Subscribe by Email |
|
Tuesday, June 19, 2012
What are different characteristics of build verification test?
- Smoke testing
- Build acceptance testing or
BAT
- Build acceptance
- Build validation
Few basics of Build Verification Tests
- Build verification tests are
a sub set of tests that are used for the verification of the main
functionalities.
- Some build verification tests
are created on a daily basis and some builds are daily tested and if those
builds fail the build verification test, they are rejected and returned
back to their developer for making the fixes and when the fixes have been
done, a new build is released and is gain subjected to the build
verification test.
- The build verification test
has an advantage that it saves the precious efforts of the testing team
that are required for setting up a test and testing a build whenever there
is a break in the major functionality of the build.
- The test cases of the build
verification test should be designed very carefully so that they provide the
maximum possible coverage to the basic functionality of the build.
- A typical build verification test is run
for 30 minutes maximum and not then this limit.
- The build verification
testing can also be considered as a type of regression testing that is
done on each and every build that is new.
Aim of Build Verification Test
- Whether or not all the files
have been included in the release or not?
- Whether all the files are in
their proper format or not?
- Whether all the file versions
and languages have been included or not?
- Whether the appropriate flags
have been associated with the file or not?
Posted by
Sunflower
at
6/19/2012 11:45:00 PM
0
comments
Labels: Aim, Application, Basics, Build Acceptance, Build Verification Test, Builds, Efforts, Functionality, Integrity, Modules, Smoke Testing, Software System, Test cases, Tester, Testing, Tests, Verification
![]() | Subscribe by Email |
|
Friday, December 23, 2011
What are different characteristics of security testing?
Security testing as its name suggests can be defined as a process to determine that whether a software or information system or application is capable of protecting data and keeping it secure.
It also determines that the software or the information system keeps the functionality of the system intact and as intended.
Security testing needs to cover up six important concepts. They have been discussed below in detail:
1. Confidentiality
- It can be defined as a measure of security which seeks to provide protection against the disclosure information or data to the third parties or any unauthorized parties other than the authorized parties or individuals.
- This is not the only way of ensuring security of the information.
2. Integrity
- This is a security measure intended to inform the information or data receiver about whether the information or data which is being provided is correct and fully legal.
- Most often, same underlying techniques are used for both confidentially and integrity aspects of security.
- There is a basic difference between integrity and confidentiality and that is: for integral security, additional information is also provided.
- This additional information usually forms the basis of not only encoding of the whole communication data but also forms the basis for an algorithmic check.
3. Authentication
- This security measure involves the confirmation of the identity of a particular person.
- It ensures that a packed product contains exactly what its packaging and labeling claims to be.
- The process of authentication is also used to trace the origins of a software system, application or an artifact.
- The process of authentication plays a big role in determining that a computer software system or application is a trusted one or not.
4. Authorization
- The process of authorization is an important security measure.
- It verifies the identity of the receiver of that particular service.
- It can be defined as a process for determining that a person who has requested for some service is allowed and is eligible to receive that service or to carry out some operation.
- The best example of authorization security measure is given by access control.
5. Availability
- Availability security measure assures that that the communication services and information will be always ready for use whenever they are needed.
- This security measure ensures that the required information is always available to the authorized people when they are in need of it.
6. Non- Repudiation
- It basically falls under the category of digital security measures.
- Non- repudiation security measure confirms that the data, information and messages are transferred and received by the people or parties claiming to have sent the data, information or messages.
- The security measure like non- repudiation offers a way to guarantee that the person or the party who had sent the message, later cannot deny sending the message and the recipient also cannot deny having received the message if any issue is raised.
Security testing as a term has a number of different meanings and cannot be explained in just one way. Security taxonomy provides a better way to under stand all these concepts.
- Discovery
- Vulnerability scan
- Vulnerability assessment
- Security assessment
- Penetration test
- Security audit
- Security review
Posted by
Sunflower
at
12/23/2011 06:20:00 PM
0
comments
Labels: Application, Authentication, Authorization, Availability, Bugs, Concepts, Confidentiality, Errors, Faults, Functionality, Information, Integrity, Issues, Non- Repudiation, Security, Security Testing
![]() | Subscribe by Email |
|