Page 111 - SOFTWARE TESTING & QUALITY ASSURANCE
P. 111

Software Testing and Quality Assurance




                          7.3   Summary
                          •   Product  documentation provides users the information about the product specifications. This
                              helps the users to know about the product and its features. Thus, it enables the customers to use
                              the product easily.
                          •   The tester performs documentation testing to check for any errors in the document. Since
                              documentation errors will not only convey incorrect or wrong information to the users it will also
                              bring down the reputation of the company.
                          •   The various software components of documentation are Packaging Text and Graphics, Marketing
                              Material, Ads and Other Inserts, Warranty/Registration, End User License Agreement, Labels and
                              Stickers, Installation and Setup instructions, User's Manual, Online Help, Tutorials, Wizards, and
                              Computer Based Training (CBT), Samples, Examples, and Templates, and Error Messages.

                          •   Documentation testing helps to improve the usability and reliability of a software product. It also
                              helps the organization to reduce the product support cost.
                          •   Security testing is the most important aspect of software testing. This enables the tester to find the
                              system's vulnerability to security risks.
                          •   Security threat modeling helps to analyze the system in a structured way, so as to find the threats
                              that the system faces with respect to security. This model not only detects the threats, but it also
                              documents the threats found and rates them based on the severity of the threat.
                          •   Buffer overrun is one of the most popular bugs that the hackers use to attack the system. It is a
                              major security threat for any software product.
                          •   The usages of safe string function have enabled the developers to overcome the problem of buffer
                              overrun. The tester has to make sure that the  developers  use these functions to develop their
                              programs.

                          •   Testers must test the software for any latent data available in it, since this data can cause issues
                              related to software security.
                          7.4   Keywords

                          Crypto System:  Any computer system that involves cryptography is called  as crypto system.
                          Cryptography is an art of studying hidden, coded, or encrypted information.
                          Unicode: Binary codes that are used to represent text or script characters in computer programming
                          languages.

                          Virus: A computer program that can copy itself and infect a computer.
                          Vulnerability: Susceptibility to attack.
                          Warranty:  A written assurance that some product or service will be provided or will  meet certain
                          specifications.
                          7.5   Self Assessment

                           1.   State whether the following statements are true or false.
                               (a)  Documentation meets its objective only if it provides necessary and complete information
                                    to the end users or customers.
                               (b)  The details of the license will sometimes be printed on the envelope or package of software
                                    CD.
                               (c)   Today, many organizations provide the entire information about a product using printed
                                    manuals.
                               (d)  Threat modeling is a highly structured and organized approach of threat correction.





                          104                     LOVELY PROFESSIONAL UNIVERSITY
   106   107   108   109   110   111   112   113   114   115   116