İstanbul evden eve nakliyat Beylikd¨¹z¨¹ evden eve nakliyat Tuzla evden eve nakliyat
Checklist for Specifying Software Confidentiality and Availability Acceptance Criteria
Delicious Bookmark this on Delicious
software testing genius

Checklist for Specifying Software Confidentiality and Availability Acceptance Criteria

Welcome to “Software Testing Genius”. Subscribe to my RSS feed for latest content on Software Testing.

Checklist for Specifying Software Confidentiality and Availability Acceptance Criteria

The confidentiality acceptance criteria refer to the requirement that the data must be protected from unauthorized disclosure and the availability acceptance criteria to the requirement that the data must be protected from a "Denial Of Service" (DoS) to authorized users.

Different types of possible confidentiality and availability acceptance criteria are as follows:

Sr.

 Check Point

Yes/No

1.

size=2 face=Arial>

No unauthorized access to the system is permitted, that is, user authentication is performed.

 

2.

Files and other data are protected from unauthorized access.

 

3.

The system is protected against virus, worm, and bot attacks.

 

4.

Tools are available for detecting attacks.

 

5.

There is support against DoS attack.

 

6.

Privacy in communication is achieved by using encryption.

 

7.

All the customer data must be stored in a secure place in accordance with the policies of customer right, such as confidentiality.

 

Understanding of Worms & Bots:

a) A worm is defined as a software component that is capable of, under its own means, infecting a computer system in an automated fashion. On the other hand, a virus spreads rapidly to a large number of computers. However, it cannot do so with its own capability; it spreads using the assistance of another program.

b) A bot is a software agent. A bot interacts with other network services intended for people as if it were a person. One typical use of bots is to gather information. Another more malicious use for bots is the coordination and operation of an automated attack on networked computers, such as a distributed DoS attack.

Download Many More Checklists for Testers & Developers

Download Several Checklists for QA Managers & Team Leads

Download Several Testing Templates - Prepared By Experts

Study Material - ISTQB Certification Exam

Study Material - HP QTP & QC Certification Exam


Study Material - IBM RFT Certification Exam

Study Material - HP LoadRunner Certification Exams for All Modules

What Successful Testers say about the Quality of this website

If you want to keep track of further articles on Software Testing,
I suggest you to subscribe my
RSS feed
.

You can also Subscribe by E-mail
and get All New articles delivered directly to your Inbox.

Get your Absolutely Free Copy of Several MS PowerPoint Presentations & E-Books related to ISTQB, HP Load Runner, IBM RFT, HP QTP & QC Certification Exams, prepared by Popular Writers & Trainers, by writing to: Software.testing.genius@gmail.com

Full Study Material for Popular ISTQB Certification Exams:

Largest Database of Sample Papers - 1000+ Unique Questions for ISTQB Foundation Exam

ISTQB Foundation Exam - Full Crash Course for Download

ISTQB Advanced CTAL Test Analysts Exam - Full Crash Course for Download


ISTQB Advanced CTAL Test Manager Exam - Full Crash Course for Download


Most Popular Topics in Demand:

Practical Roadmap to QTP Certification

Practical Roadmap to CSTE Certification

Consolidated Study Material - Testing & QA

Rehearsal of QTP in 1 Hr. -  Interview Questions

 

Comments :

comments ↓


Leave Your Comments: (*) Marked Fields are Mandatory

You can apply basic formatting to the text

Name *
 
Email Address *
 
Website
 
Speak your mind
characters
sex hikayeleri