User Acceptance Testing , Usability Testing
and Security Testing
This article will present you with a complete idea about User Acceptance Testing , Usability Testing and Security Testing
We will learn below topics in this article
User Acceptance Testing
- UAT is a process of verifying that a solution works for the user.
- Last phase of the software testing process.
- It is formal testing conducted to determine whether a system satisfies its acceptance criteria
- Actual users test the software to make sure it can handle required tasks in real- world scenarios, according to specifications.
- The objective of UAT is to assess if the system can support day-to-day business and user scenarios and ensure the system is sufficient and correct for business usage
- The primary objective of UAT is to demonstrate that you can run your business using the system – it is fit for purpose.
What makes a good UAT tester?
Background: Good all-round understanding of the business and experience in business operations.
Skills: A good communicator at all levels, written and oral. Good understanding of IT systems
Attitude: An analytical mind, able to think around issues to find a solution and not easily put off.
Types of UAT Testing
- Alpha & Beta Testing
- Contract Acceptance Testing
- Regulation Acceptance Testing
- Operational Acceptance Testing
Alpha & Beta Testing
Alpha Testing It is performed by the testers who are internal employees of the developer’s organisation.
Beta Testing, also known as “field testing”, takes place in the customer’s environment and involves some extensive testing by a group of customers who use the system in their environment.
Usability is a measure of how easy it is to use something.
How easy will the use of the software be for a typical user to understand, learn, and operate
ISO Definition (9241-11) for Usability:
“…the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.”
Usability testing is performed to evaluate a product by testing it on users.
Test users will try to complete typical tasks while observers watch, listen and takes notes.
The idea is to place users in front of of the software under test and watch how these users try to use it
- Identify any usability problems
- Collect quantitative data on participants’ performance
- Determine participant’s satisfaction with the product
- It is a process to determine that an information system protects data and maintains functionality.
- Validate whether there is any information leakage in the software
- Validate the potential loopholes and weaknesses of the system.
- It prevent unauthorised access to the resources and data
What it Covers?
Top Security Risks
- SQL Injections
- Cross Site Scripting
- Broken Authentication and Session Management
- Insecure Direct Object References
- Security Misconfiguration
- Insecure Cryptographic Storage
- Failure to Restrict URL Access
- Insufficient Transport Layer Protection
- Invalidated Redirects and Forwards