Stress Testing Metrics

Metrics are basically key performance indicators. Most commonly used metrics are mentioned below: 1. Average transaction response time It is the Average time taken to perform transactions during each second of the scenario run. 2. Total transactions per second The total number of transactions that passed, the total number of transactions that failed and the … Read more

Performance testing in software testing

It is  a type of non-functional testing. Performance testing is testing that is performed, to determine how fast some aspect of a system performs under a particular workload. It can serve different purposes like it can demonstrate that the system meets performance criteria. It can compare two systems to find which performs better. Or it … Read more

Importance of Review Process

Productivity of Dev team is improved and timescales reduced because the correction of defects in early stages and work-products will help to ensure that those work-products are clear and unambiguous. Testing costs and time is reduced as there is enough time spent during the initial phase. Reduction in costs because fewer defects in the final … Read more

UK government launches information warfare network

The UK Government has launched a new approach, through a network of technical experts, to find ways to conduct information warfare.  Concepts such as false information, fake news, or information warfare are not novel, but technology and innovation have created an expressway for its dissemination. An information warfare network, called @HutEighteen, has been launched in partnership with … Read more

INTRODUCTION TO PENETRATION TESTING

NTRODUCTIONThis article provides a general introduction to the subject of penetrationtesting and provides the security professional with the background need-ed to understand this special area of security analysis. Penetration testingcan be a valuable tool for understanding and improving the security of acomputer or network. However, it can also be used to exploit systemweaknesses and attack … Read more

WHAT IS WIRELESS LAN?

The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices and homes, WLAN has become an alternative way of communication compared to wired LAN. The convenience to connect different devices is both cost effective and easily maintainable. The Wikipedia says: “Wireless LANs have become popular … Read more

Assessing Vulnerabilities

After    finding    potential    security    holes,    the    next    step    is    to    confirm    whether    they’re indeed    vulnerabilities    in    the    context    of    your    environment.    Before    you    test,    perform some    manual    searching.    You    can    research    websites    and    vulnerability    databases,    such    as these: Common    Vulnerabilities    and    Exposures    ( http://cve.mitre.org/cve ) US-CERT    Vulnerability    Notes    Database    ( www.kb.cert.org/vuls ) NIST    National    Vulnerability   … Read more

Securing Session Management

The defensive measures that web applications must take to prevent attacks on their session management mechanisms correspond to the two broad categories of vulnerability that affect those mechanisms. In order to perform session management in a secure manner, an application must generate its tokens in a robust way and must protect these tokens throughout their … Read more

Vulnerable Mapping of Tokens to Sessions

Various common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and processing of session tokens to individual users’ sessions themselves. The simplest weakness is to allow multiple valid tokens to be concurrently assigned to the same user account. In virtually every application, there is no legitimate … Read more