Mobile Testing in a Fast Paced World Shaminder Rai VP, Product Development at MBA Focus Session: <ID>
Strategies Risk Based Testing Give me time to test in 10 easy steps! Mobile Security Testing Give me your information! Mobile App Automation Testing Give me the object id s! 22-23 Oct 2015 2015 Joint Technical Communities Conference 2
What is Risk Based Testing? Improves Transparency: Testing estimates and budgeting Helps your project Decision Framework Quality, Architecture, Schedule, Cost, Scope Collaboration between IT and Stakeholders Reduction in test execution time and cost Provides a greater assessment of risk and achieved quality 22-23 Oct 2015 2015 Joint Technical Communities Conference 3
Risk Items Defect Trends Requirements Hardware Software Architecture Release Testing Development Framework 22-23 Oct 2015 2015 Joint Technical Communities Conference 4
Step 1: The Collection Validating Requirements and Collecting Inputs Static Testing: Documentation, Requirements, WSDL Stakeholder Inputs: Business Impact, ROI, Number of Users Requirements Inputs: Use Cases, Stories, Content Matrix Architecture Inputs: System Diagrams, Process Flows 22-23 Oct 2015 2015 Joint Technical Communities Conference 5
Step 2: The Risk Assess the Risk Risk Score = Business Criticality * Failure Probability What can be assigned a risk score? Functional Requirements Features, Story Cards, Use Cases Non Functional Requirements Environments, Hardware, Software, Resources 22-23 Oct 2015 2015 Joint Technical Communities Conference 6
Step 3: The Business Inputs Business Criticality ROI Frequency of use Number of Users High Visibility 22-23 Oct 2015 2015 Joint Technical Communities Conference 7
Step 4: The Failure Inputs Failure Probability Change Rate Software Maturity Defect Rate Complexity 22-23 Oct 2015 2015 Joint Technical Communities Conference 8
Step 5: The Failure Failure Probability ( 1 High Failure -> 4 -Low Failure) Requireme nt/test Case ID Additional Factors/ Application Type Change Rate (Software/App Impact) Software Maturity Defect Rate # of GUI/ Mainframe Screen Elements Login 1 Login New Feature Immature High More Than X Failure Probability Score 1 Login 2 Responsive Website Changed Feature Middle Medium Between X-X 2 Reset Password 1 Web App Customer Satisfaction Unchanged Feature Mature Low Only X 3 Payment 1 Ease of Use New Feature Immature High More Than X 1 22-23 Oct 2015 2015 Joint Technical Communities Conference 9
Step 6: The Business Business Criticality( 1 Most Critical -> 4 -Least Critical) Requireme nt/test Case ID Additional Factors/ Application Type Type of Process Business Impact Frequenc y of Use (Views) Number of Users (Visitors) Business Criticalit y Score Login Login Calculatio n Validation Legal Very Often Many/High 1 Reset Password Responsive Website Data Change Revenue Often Some/Mediu m 2 Payment Web App Customer Satisfaction Display Customer s Rarely/ Very Rarely Few/ Low 3 22-23 Oct 2015 2015 Joint Technical Communities Conference 10
Step 7: The Matrix 22-23 Oct 2015 2015 Joint Technical Communities Conference 11
Step 8: The Planning Test Planning Test high and medium risk items first Evaluate the Regression coverage Provide a visual representation of the test strategy Always keep a risk based approach in your back pocket Cross reference your automation suite Enough time to run all tests regardless of the approach? 22-23 Oct 2015 2015 Joint Technical Communities Conference 12
Step 9: The Execution OS, Browser, Device Utilize analytics to drive the final piece to the puzzle Trends Usage Distribution across teams Device in hand Utilize the cloud Utilize your peers 22-23 Oct 2015 2015 Joint Technical Communities Conference 13
Step 10: Rinse and Repeat This is a living document Anticipate and Adapt Re-evaluate scores based on development Increased complexity and defects compared to the initial assessment. 22-23 Oct 2015 2015 Joint Technical Communities Conference 14
Mobile Security Protect your customers information! Protect your organization! Meet compliance expectations! Stay one step ahead of attackers! Native vs Hybrid 22-23 Oct 2015 2015 Joint Technical Communities Conference 15
Techniques Network Sniffing App Cache SQL Injection Cross Site Scripting Authentication storage Remember my password PIN 22-23 Oct 2015 2015 Joint Technical Communities Conference 16
Techniques Source Code Scanning Device Permissions Expose Binaries Binaries are just zip files, extract them and start searching! 22-23 Oct 2015 2015 Joint Technical Communities Conference 17
Mobile App Automation Ruby + Cucumber + Calabash 22-23 Oct 2015 2015 Joint Technical Communities Conference 18
Mobile App Automation Live Demo 22-23 Oct 2015 2015 Joint Technical Communities Conference 19
Questions? 22-23 Oct 2015 2015 Joint Technical Communities Conference 20