Posts

Showing posts from December, 2021

Scalability Testing and Its attributes

  Scalability Testing   Scalability Testing is a non-functional test methodology in which an application’s performance is measured in terms of its ability to scale up or scale down the number of user requests or other such performance measure attributes. Scalability testing can be performed at a hardware, software or database level.     Advantages of Scalability Testing : Let’s discuss why a company may be better off conducting scalability tests after all. Firstly, for trying to add users to a system while oblivious of its capabilities under varying loads can prove a perilous endeavour. Upon systems failure, stakeholder confidence can wane, along with any hope of rising again. Secondly, you save a lot of money by setting reasonable growth rates that ideally pay for themselves. Lastly, even when selling a company or facing foreclosure, reducing resources while cutting costs can be a controlled event. And this potentially saves the reputations of everyone with the ailing bus

Most vulnerable Software security Threat

    Security testing is performed to figure out the security flaws and vulnerabilities in software. The rise in online transactions and advancing technology makes security testing an inevitable part of the softwaredevelopment process. This is the best way to determine potential threats in the software when performed regularly. Following are the most vulnerable threats that can be detected early with the help of software testing:   Cross-site scripting:  XSS attacks inject client-side malicious scripts into a website and use the website as a distribution method. such vulnerabilities require the user to initiate some type of interaction through social engineering or visiting a specific page.   Sensitive data exposure: Confidential data disclosure is one of the mostcommon vulnerabilities . It consists of compromising data that should have been protected.   Injection: It leads to data loss, corruption, or exposure to unauthorized parties, loss of accountability, access denial, or