Mobile Testing in a Fast Paced World



Similar documents
automated acceptance testing of mobile apps

Pentests more than just using the proper tools

Pentests more than just using the proper tools

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA

From Traditional Functional Testing to Enabling Continuous Quality in Mobile App Development

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

HP Application Lifecycle Management

Sonata s Product Quality Assurance Services

Workday Mobile Security FAQ

Software Quality Testing Course Material

Manual for Android 1.5

Simple Mobile Application & Browser Testing

SAST, DAST and Vulnerability Assessments, = 4

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

DevOps for CA Plex Automated Testing

SHARPCLOUD SECURITY STATEMENT

Mobile and BYOD Strategy

Middleware- Driven Mobile Applications

Network Test Labs (NTL) Software Testing Services for igaming

HP Application Security Center

Enterprise SSO Manager (E-SSO-M)

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Introducing. automated functional testing of mobile apps. Karl Krukow, CTO, LessPainful GotoAMS, May, 2012

<Insert Picture Here> When to Automate Your Testing (and When Not To)

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Automated testing for Mobility New age applications require New age Mobility solutions

Kaseya IT Automation Framework

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Efficient Mobile Testing Georg Thurner Mike Nemeth, September 18, Copyright 2014, Tricentis GmbH. All Rights Reserved. 1

Security and Vulnerability Testing How critical it is?

Strategic Information Security. Attacking and Defending Web Services

Benefits of Test Automation for Agile Testing

Beyond passwords: Protect the mobile enterprise with smarter security solutions

MANUAL TESTING. (Complete Package) We are ready to serve Latest Testing Trends, Are you ready to learn.?? New Batches Info

Sample Exam Foundation Level Syllabus. Mobile Tester

DEVELOPING SECURE SOFTWARE

An Introduction to. Metrics. used during. Software Development

Cognizant Mobility Testing Lab. The faster, easier, more cost-effective way to test enterprise mobile apps.

Creating a Virtual Lab for Data Science

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Mobile Test Automation Framework

Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Six Common Factors to Consider When selecting a CMS

Accelerating Business Value by

Software Requirements Specification

Automation Testing in Mobile Applications Swati Hajela

zenterprise The Ideal Platform For Smarter Computing Developing Hybrid Applications For zenterprise

Bridging the Gap Between Acceptance Criteria and Definition of Done

ManageEngine IT360. Professional Edition Installation Guide.

Latest Trends in Testing. Ajay K Chhokra

DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group

Bringing Value to the Organization with Performance Testing

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

The Top Web Application Attacks: Are you vulnerable?

5 Secrets to a Successful Mobile Application Testing Strategy

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi,

NCTA Cloud Architecture

Security Testing and Vulnerability Management Process. e-governance

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

Web Application Penetration Testing

An Open Source SCADA Toolkit

Levels of Software Testing. Functional Testing

Agenda. Success Stories with OpenShift. 11:15-11:45 am. OpenShift Tech Overview 9:40-10:30 am. Red Hat Mobile on OpenShift 10:45-11:15 am

Pearl Echo Installation Checklist

SaaS-Based Employee Benefits Enrollment System

Performing a data mining tool evaluation

PICKPOCKETING MWALLETS. A guide to looting mobile financial services

Continuously Improve Mobile App Quality: IBM Mobile Quality Assurance

Total Enterprise Mobility. Norbert Elek

Cognizant Mobility Testing Lab A state of the art Integrated platform for Mobility QA

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Web application security: automated scanning versus manual penetration testing.

Enterprise Mobile Application Development: Native or Hybrid?

ISTQB Certified Tester. Foundation Level. Sample Exam 1

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

locuz.com Professional Services Security Audit Services

ISSECO Syllabus Public Version v1.0

XpoLog Center Suite Log Management & Analysis platform

Enabling Continuous Delivery by Leveraging the Deployment Pipeline

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Service Virtualization

FREQUENTLY ASKED QUESTIONS

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Developing in the Cloud Environment. Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology

Moving your site in the cloud?

Lee Barnes, CTO Utopia Solutions. Utopia Solutions

ios Testing Tools David Lindner Director of Mobile and IoT Security

Codeless Test Automation for Web Apps

Transcription:

Mobile Testing in a Fast Paced World Shaminder Rai VP, Product Development at MBA Focus Session: <ID>

Strategies Risk Based Testing Give me time to test in 10 easy steps! Mobile Security Testing Give me your information! Mobile App Automation Testing Give me the object id s! 22-23 Oct 2015 2015 Joint Technical Communities Conference 2

What is Risk Based Testing? Improves Transparency: Testing estimates and budgeting Helps your project Decision Framework Quality, Architecture, Schedule, Cost, Scope Collaboration between IT and Stakeholders Reduction in test execution time and cost Provides a greater assessment of risk and achieved quality 22-23 Oct 2015 2015 Joint Technical Communities Conference 3

Risk Items Defect Trends Requirements Hardware Software Architecture Release Testing Development Framework 22-23 Oct 2015 2015 Joint Technical Communities Conference 4

Step 1: The Collection Validating Requirements and Collecting Inputs Static Testing: Documentation, Requirements, WSDL Stakeholder Inputs: Business Impact, ROI, Number of Users Requirements Inputs: Use Cases, Stories, Content Matrix Architecture Inputs: System Diagrams, Process Flows 22-23 Oct 2015 2015 Joint Technical Communities Conference 5

Step 2: The Risk Assess the Risk Risk Score = Business Criticality * Failure Probability What can be assigned a risk score? Functional Requirements Features, Story Cards, Use Cases Non Functional Requirements Environments, Hardware, Software, Resources 22-23 Oct 2015 2015 Joint Technical Communities Conference 6

Step 3: The Business Inputs Business Criticality ROI Frequency of use Number of Users High Visibility 22-23 Oct 2015 2015 Joint Technical Communities Conference 7

Step 4: The Failure Inputs Failure Probability Change Rate Software Maturity Defect Rate Complexity 22-23 Oct 2015 2015 Joint Technical Communities Conference 8

Step 5: The Failure Failure Probability ( 1 High Failure -> 4 -Low Failure) Requireme nt/test Case ID Additional Factors/ Application Type Change Rate (Software/App Impact) Software Maturity Defect Rate # of GUI/ Mainframe Screen Elements Login 1 Login New Feature Immature High More Than X Failure Probability Score 1 Login 2 Responsive Website Changed Feature Middle Medium Between X-X 2 Reset Password 1 Web App Customer Satisfaction Unchanged Feature Mature Low Only X 3 Payment 1 Ease of Use New Feature Immature High More Than X 1 22-23 Oct 2015 2015 Joint Technical Communities Conference 9

Step 6: The Business Business Criticality( 1 Most Critical -> 4 -Least Critical) Requireme nt/test Case ID Additional Factors/ Application Type Type of Process Business Impact Frequenc y of Use (Views) Number of Users (Visitors) Business Criticalit y Score Login Login Calculatio n Validation Legal Very Often Many/High 1 Reset Password Responsive Website Data Change Revenue Often Some/Mediu m 2 Payment Web App Customer Satisfaction Display Customer s Rarely/ Very Rarely Few/ Low 3 22-23 Oct 2015 2015 Joint Technical Communities Conference 10

Step 7: The Matrix 22-23 Oct 2015 2015 Joint Technical Communities Conference 11

Step 8: The Planning Test Planning Test high and medium risk items first Evaluate the Regression coverage Provide a visual representation of the test strategy Always keep a risk based approach in your back pocket Cross reference your automation suite Enough time to run all tests regardless of the approach? 22-23 Oct 2015 2015 Joint Technical Communities Conference 12

Step 9: The Execution OS, Browser, Device Utilize analytics to drive the final piece to the puzzle Trends Usage Distribution across teams Device in hand Utilize the cloud Utilize your peers 22-23 Oct 2015 2015 Joint Technical Communities Conference 13

Step 10: Rinse and Repeat This is a living document Anticipate and Adapt Re-evaluate scores based on development Increased complexity and defects compared to the initial assessment. 22-23 Oct 2015 2015 Joint Technical Communities Conference 14

Mobile Security Protect your customers information! Protect your organization! Meet compliance expectations! Stay one step ahead of attackers! Native vs Hybrid 22-23 Oct 2015 2015 Joint Technical Communities Conference 15

Techniques Network Sniffing App Cache SQL Injection Cross Site Scripting Authentication storage Remember my password PIN 22-23 Oct 2015 2015 Joint Technical Communities Conference 16

Techniques Source Code Scanning Device Permissions Expose Binaries Binaries are just zip files, extract them and start searching! 22-23 Oct 2015 2015 Joint Technical Communities Conference 17

Mobile App Automation Ruby + Cucumber + Calabash 22-23 Oct 2015 2015 Joint Technical Communities Conference 18

Mobile App Automation Live Demo 22-23 Oct 2015 2015 Joint Technical Communities Conference 19

Questions? 22-23 Oct 2015 2015 Joint Technical Communities Conference 20