.Net Application Testing By Sam Nasr August 24, 2004.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Making the System Operational
Software Testing Strategies
Testing Workflow Purpose
Test process essentials Riitta Viitamäki,
Overview of Am.Net Developed using Microsoft.Net. development tools and third party.Net based development products A “Windows Forms” application – web.
Ch-11 Project Execution and Termination. System Testing This involves two different phases with two different outputs First phase is system test planning.
HI-TEC 2011 SQL Injection. Client’s Browser HTTP or HTTPS Web Server Apache or IIS HTML Forms CGI Scripts Database SQL Server or Oracle or MySQL ODBC.
1 SOFTWARE TESTING Przygotował: Marcin Lubawski. 2 Testing Process AnalyseDesignMaintainBuildTestInstal Software testing strategies Verification Validation.
Synera The Software That Thinks Like You Do Synera Technical Presentation.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Abirami Poonkundran 2/22/10.  Goal  Introduction  Testing Methods  Testing Scope  My Focus  Current Progress  Explanation of Tools  Things to.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 10: Collect and Analyze Performance Data.
Illinois Institute of Technology
1 Testing. 2 About Testing  The reason the program is in testing is that it probably doesn’t work!  We test to find bugs before our users and hope that.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Automated Testing Nathan Weiss April 23, Overview History of Testing Advantages to Automated Testing Types of Automated Testing Automated Testing.
Chapter 11: Testing The dynamic verification of the behavior of a program on a finite set of test cases, suitable selected from the usually infinite execution.
BY RAJESWARI S SOFTWARE TESTING. INTRODUCTION Software testing is the process of testing the software product. Effective software testing will contribute.
MSF Testing Introduction Functional Testing Performance Testing.
Choose and Book Installing Security Broker (IA) client.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
TESTING STRATEGY Requires a focus because there are many possible test areas and different types of testing available for each one of those areas. Because.
WINDOWS SERVICES. Introduction You often need programs that run continuously in the background Examples: – servers –Print spooler You often need.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Testing. What is Testing? Definition: exercising a program under controlled conditions and verifying the results Purpose is to detect program defects.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
CPIS 357 Software Quality & Testing
FROM CONTROL SOFTWARE TO CONTROL SYSTEMS Wojciech Kurek.
Implementation - Deployment Methods of deployment –User PC –Network shared (workstation install) –Terminal server –Web Deployment (ActiveX) (Note: this.
FCS - AAO - DM COMPE/SE/ISE 492 Senior Project 2 System/Software Test Documentation (STD) System/Software Test Documentation (STD)
 CS 5380 Software Engineering Chapter 8 Testing.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
Testing Basics of Testing Presented by: Vijay.C.G – Glister Tech.
Software Development Software Testing. Testing Definitions There are many tests going under various names. The following is a general list to get a feel.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
Computer Emergency Notification System (CENS)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
MANUAL TESTING KS SESSION PRESENTED BY 26/11/015 VISHAL KUMAR.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
1 Phase Testing. Janice Regan, For each group of units Overview of Implementation phase Create Class Skeletons Define Implementation Plan (+ determine.
Testing Method For Web Application System By Fang Xuefen SRA Key Technology Lab. Inc. Tokyo, Japan.
Software Test Plan Why do you need a test plan? –Provides a road map –Provides a feasibility check of: Resources/Cost Schedule Goal What is a test plan?
Testing and Evolution CSCI 201L Jeffrey Miller, Ph.D. HTTP :// WWW - SCF. USC. EDU /~ CSCI 201 USC CSCI 201L.
CIS-NG CASREP Information System Next Generation Shawn Baugh Amy Ramirez Amy Lee Alex Sanin Sam Avanessians.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
Review of IT General Controls
Group 18: Chris Hood Brett Poche
SQL Server Security & Intrusion Prevention
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
# 66.
Chapter 7: Identifying Advanced Attacks
Current Generation Hypervisor Type 1 Type 2.
Managing the Project Lifecycle
Testing More In CS430.
AUDACIOUS: USER DRIVEN ACCESS CONTROL WITH UNMODIFIED OPERATING SYSTEM
Software Quality Assurance
Introduction of Week 3 Assignment Discussion
Important Software Performance Testing That Ensure High Quality Solutions.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
ILogic What’s New.
Our Process CMSC 345, Version 1/04.
Presentation transcript:

.Net Application Testing By Sam Nasr August 24, 2004

Types Of Testing Functionality Testing Functionality Testing 1. Unit 2. System Integration 3. Regression 4. Performance 5. Customer Acceptance Security Testing Security Testing

Why Test? credibility, credibility, credibility credibility, credibility, credibility For every 1,000 lines of code, 8 bugs go undetected. For every 1,000 lines of code, 8 bugs go undetected. Improve customer relations. Improve customer relations.

Why Test? Phase Cost of Error Removal Definition$1 High Level Design $2 Low Level Design $5 Code$10 Unit Test $15 Integration Test $22 System Test $50 Post-Delivery$100+

Black Box Testing The concept of testing where the tester knows nothing about the process being tested. The concept of testing where the tester knows nothing about the process being tested.

Unit Testing Performed by the developer, prior to delivering code to testers. Performed by the developer, prior to delivering code to testers. Using unit test cases targeting the new code. Using unit test cases targeting the new code.

System Integration Testing Used to determine how well code interfaces with other code in a given system. Used to determine how well code interfaces with other code in a given system. Performed by testers, after unit testing. Performed by testers, after unit testing.

Regression Testing Ensuring new code didnt break existing functionality. Ensuring new code didnt break existing functionality. Performed by testers, after unit testing. Performed by testers, after unit testing.

Performance Testing Testing for adequate reponse time under heavy traffic. Testing for adequate reponse time under heavy traffic. All system limitations must be defined. All system limitations must be defined. Performed by testers, after unit testing. Performed by testers, after unit testing.

Customer Acceptance Testing Performed as a formal turnover to a customer. Performed as a formal turnover to a customer. Can also be considered as post- implementation testing. Can also be considered as post- implementation testing.

Security Testing Ensuring data cannot be maliciously manipulated. Ensuring data cannot be maliciously manipulated. Ensuring user cannot bypass critical sections of the application. Ensuring user cannot bypass critical sections of the application. Test for parameter checking with browser JAVA Script enabled AND disabled. Test for parameter checking with browser JAVA Script enabled AND disabled. Test for safeguards against hacker attacks (i.e. SQL Injection, XSS, One-Click, etc.) Test for safeguards against hacker attacks (i.e. SQL Injection, XSS, One-Click, etc.) Utilize services such as HackerSafe.com Utilize services such as HackerSafe.comHackerSafe.com

Creating Test Plans Use Functional Requirements as a guide. Use Functional Requirements as a guide. Test for all types of data: numeric, alpha, and alpha-numeric Test for all types of data: numeric, alpha, and alpha-numeric Test for all ranges: 0-9, negative, decimals, etc. Test for all ranges: 0-9, negative, decimals, etc. If using date/time stamp, test for mid- night/time-zone cross over. If using date/time stamp, test for mid- night/time-zone cross over. Take nothing for granted! Take nothing for granted!

Testing Environment Testing Environment should be identical to the production environment in every way. –Hardware (memory, CPU(s), etc.); CPUs are especially important when testing a threaded process. – Software (OS, SPs, drivers, IE/IIS versions). –Application (copy of production DB, data files, etc.)

Testing Tips Define Testing turnover procedures (turnover schedule, file structure, registry layout, etc.) Define Testing turnover procedures (turnover schedule, file structure, registry layout, etc.) Define parties responsibe for approving different types of testing. Define parties responsibe for approving different types of testing. Test for memory cleanup when process is completed or aborted. Test for memory cleanup when process is completed or aborted.

Testing Tips Always test processes after implemented in production to ensure all files and settings are implemented correctly. Always test processes after implemented in production to ensure all files and settings are implemented correctly. Create dummy data that will test the process end- end, but not interfere with production data. Create dummy data that will test the process end- end, but not interfere with production data. Identify invalid part numbers, invoice numbers, etc and use them for testing. Identify invalid part numbers, invoice numbers, etc and use them for testing.

Testing Tips Are error messages meaningful to a developer and non-developer? Are error messages meaningful to a developer and non-developer? Are log files meaningful to a developer and non-developer? Are log files meaningful to a developer and non-developer? Test for broken network connections, DB disconnects, and File Not Found conditions Test for broken network connections, DB disconnects, and File Not Found conditions

Automated Test Tools Mercury ( Mercury ( Empirix ( Empirix ( Segue Software ( Segue Software (

Automated Test Tools N-Unit N-Unit Microsoft Application Center Test (ACT) Microsoft Application Center Test (ACT) Custom Made Testing Tools Custom Made Testing Tools

More Info… Effective Software Testing Effective Software Testing by Elfriede Dustin How to Break Software How to Break Software by James Whittaker Northern Ohio Software Quality Assusrance Association ( Northern Ohio Software Quality Assusrance Association (