I will upload the paper because someone did not follow exactly what is asked. I will want you to follow the instruction and make the necessarily changes. for example: How the Testing Method Solves the Challenge: A few paragraphs that describe how the application of the testing method helps to solve the challenge. The section should provide evidence of how the product solves the challenge, and why it is the best solution available. This section should use persuasive language and is essentially the marketing pitch.Conclusion: A two-paragraph summary of why the testing method is the best solution to the challenge.Links: APA formatted references to the links (must work from document), a short summary of why the link is applicable, and what type of information it refers to. Our links should substantiate each part of the document and should include links to at least two other white papers from the last two years, they may be not on the subject you are assigned but illustrate good examples of technology white papers. Also provide your search strategy (terms you looked for and the search engine(s) used)pentaration testing is my friends work please use it as a sample of how it has to be.please make sure you are working on SYSTEM testing.assingment_2.docxit355assignment2.docx20160203001323penetration_testing.docx1
Running head: Preparing a White Paper
System Testing
Draft
Figure 1: https://www.indicatorwarehouse.com/the-importance-of-testing-your-day-trading-system/
PREPARING A WHITE PAPER
Word Count: 1167
WWWWWWW
School of Business Administration
2
PREPARING A WHITE PAPER
3
Table of Contents
Abstract ………………………………………………………………………………………………………………. 4
System Testing Method: ……………………………………………………………………………………….. 4
The Challenge: …………………………………………………………………………………………………….. 6
How The System Testing Method Solve The Challenge: …………………………………………… 8
Conclusion: …………………………………………………………………………………………………………. 8
References………………………………………………………………………………..10
4
PREPARING A WHITE PAPER
Abstract
Eminence is a very precarious aspect in software products. As customers become more
and more urbane due to technology complexity, the software business on the other hand has
become tremendously competitive. The quality or standard of software may seem like a less
complex concept in literature level, though it is not forthright in practice. Due to rapid changes of
the software requirements, projects are increasingly becoming undermanned and behind the
calendar. This document gives the reader an understanding of system testing. It also allows
readers to understand the challenges that businesses could face if they do not have an efficient
integrated system. The purpose of the system test is to assess the compliance of the system with
the specified requirements. It shows how to solve the challenges that the company of the face.
The System Testing Method:
System testing is the type of test that checks the behavior of a complete and fully
integrated software product based on the software requirement specifications document (SRS).
The primary objective of this test is to assess the business / Function / Requirements of the final
user. This test is performed only after the test of integration of the system is complete when both
4
5
PREPARING A WHITE PAPER
functional & non-functional requirements are checked. In the System Test Software testers are
focused on the search for bugs/defects based on the behavior of the application software, the
design of software, and the expectation of the end user.
The software testing is done after the production of the code (Cem 2013, p. 35). The
definition of the term testing is a crucial factor to consider. However, this stage seems trivial to
some people. Testing entails an execution of system software with the intention of getting the
fact whether the software is functional. However, the process of testing may be cumbersome and
expensive in some instances. Under normal circumstances, it is impossible to test multiple
software systems and get the correct specifications. As a result, the testing procedures ought to
be well set in order to easily identify when things go wrong within the software system. Software
system is tested using two major components:
i) Integration Testing- This is done to ensure that the system and all the programs perform
as per the intended specifications of the design
ii) Functional Testing- It is done to ascertain whether the system functions according to the
5
6
PREPARING A WHITE PAPER
required specifications
During the testing procedure, the integration test is done in a top- down method. This
approach is helpful in getting the errors that arises due to module interactions. The test cases are
formed by applying the design description as the input text. Several errors noticed during
integration are as a result of inaccurate interfaces among the modules. This is because the
modules are already unit tested. Therefore, the test cases should be focused ion highlighting
these error types (Wallen 2016, p. 47).
The functional testing is usually done after the integration tests. The major emphasis in
this form of testing is to ensure that the system functions according to the Functional
Specification. In short, functional testing purposes to identify input combinations as well as
faulty conditions. Since this is not practicable, the testing must be done under minimal cost
consideration. Therefore, any form of testing must be done with proper risk management
procedures (Cem 2013, p. 38).
The Challenge:
Generally, the eminence of any software system depends on the quality of software
that provided it. Additionally, the superiority and efficiency of such a software testing is
largely dependent on quality of testing procedures applied. Practically, it may be difficult to
test software entirely (Wallen 2016, p. 56). With the system testing, many organizations
and teams will display the test of effort as enough end-to-end, continuous effort. Check the
points where the systems take contact, and if no problem is found, you can call it a ship and
success – except that the systems rarely operate, or are used, in a linear way.
6
7
PREPARING A WHITE PAPER
There exists some indispensable software system testing questions. Some of the
questions include; quality of the product (software), management of the risk, criterion for
releasing, and the surety or correctness of the testing approach. The other challenge is the
decision on when to terminate the testing processes. However, measurement may provide
a solution to some of these challenges (Cem 2013, p. 54). Nevertheless, we could get
overwhelmed once we start thinking about what is measurable. This is because anything
can actually be measured. Therefore, we have to create measurement priorities since
measuring anything is not practical.
The most common problem with testing of the system is that most of the attempts to
test the system do not recognize that people who “use” the system have a different
expectation of the system, and will differently use the “integrations” according to these
expectations and their business needs (Wallen 2016, p. 72).
Four key challenges to efficient system testing
i)
Completing the test is impossible
ii)
Testers misallocate resources because they fall from processes of the company myths
iii)
Groups of tests operate under multiple missions, often conflicting, rarely articulated
7
8
PREPARING A WHITE PAPER
iv)
Groups of tests often lack skilled programmers and a vision of good projects, which
would maintain the testers of contested programming.
How The System Testing Method Solve The Challenge:
There are a number of steps, which must be followed. First is the crucial preparation step
where planning of the system testing is done. It is crucial to note that the whole points to cover in
the test plan of the system can vary from one organization to another. Additionally, the system
testing is based project plan, test strategy & planning of the main test (Fuchs 2013, p. 200). The
second step consists of the creation of test cases. It is very similar to the drafting of cases of a
functional test. In the case of written test, you must write the test scenarios & cases of use. The
third step entails creation of test data that use to test the system. In the fourth step, we do the
execution of automated test cases. Step five involves executing the typical test cases & update
test if you use a test case for the management tool (if applicable) (Dempster 2014, p. 74). Step
number is where bug reports, an audit of bug, and tests of regression are done. Lastly, you must
repeat the tests’ life cycle but only when necessary.
Conclusion:
The software development world remains an area with less focus from the experts. This is
may be attributed to less software implementation processes in several companies. The existing
approaches to testing are inadequate compared to the rise in demand for quality software.
Therefore, the place in software testing or development must be expanded (Wallen 2016, p. 98).
The most successful companies in the world use system testing methodology. There are some
challenges that affect system testing, which are mentioned in this document. Also, there are some
8
9
PREPARING A WHITE PAPER
techniques that can solve these problems and ensure that there is a successful integrated system
in the company.
9
10
PREPARING A WHITE PAPER
References
Cem Kaner, (April, 2013). “Fundamental Challenges in Software Testing.” Pdf. (2013).
Retrieved from http://kaner.com/pdfs/FundamentalChallenges.pdf
Dempster, F. N. (2014). Synthesis of Research on Reviews and Tests. Journal of Software
Research and Testing, 48 (7), 71–76.
Fuchs, L. S. (2013) Effects of Systematic Formative Evaluation: A Meta- analysis. Exceptional
Software, 53, 199–208.
Walen Peter, (2016). “Integration testing: What are the Challenges?” Tech Target. Retrieved
from http://searchsoftwarequality.techtarget.com/answer/Integration-testing-What-arethe-challenges
10
IT355 Software Testing, Documentation, and Quality Assurance
Assignment 2: Preparing a White Paper
Prepare a white paper (at least five pages long of text) on your assigned testing type including:









Title Page
Attribution Page
Table of Contents
Abstract
Challenge
Testing Method
How the Testing Method Solves the Challenge
Conclusion
Links
Content Details
All pages must have an appropriate header and footer including your last name, date, and page
number. The paper must be submitted as a .pdf document.
There are good examples of white papers on the Internet. Search on the phrase “white paper” and
read a few. Compare how they handle their subjects. By and large, the most useful white papers
offer information at the same time that they attempt to convince you of their product’s worth.
Content Details
Title Page: The title page should be “inviting” as this is a marketing document and should
include an appropriate image and an appropriate title. It must also include whether the document
is draft or final.
Attribution Page: This page should be the technical aspects of the paper including your name,
your credentials, the Marymount logo, word count (excluding the title, attribution, ToC and
links), the date of writing, and the Honor Pledge.
Table of Contents: The TOC should be auto generated and exactly match the section headers.
Abstract: A one- or two-paragraph description of what the white paper is about. Simply tell the
reader what the purpose of the paper is. Customers frequently read only the abstract and
conclusion of white papers, so provide material that gives them a good reason to read the details.
Challenge: A few paragraphs covering the challenge that the testing method is designed to assist
with. The section should include background on the software development challenge and use
examples of what the challenge is, e.g., a software failure example. The statement should be
straightforward and succinct: avoid jargon, complex sentence structure, and technical terms.
Testing Method: A few paragraphs that describe the testing method and how it works. It should
include at least one image. This is not the place to describe how the testing method solves the
challenge; the section should be oriented so that the reader will be able to understand the testing
method itself.
1
How the Testing Method Solves the Challenge: A few paragraphs that describe how the
application of the testing method helps to solve the challenge. The section should provide
evidence of how the product solves the challenge, and why it is the best solution available. This
section should use persuasive language and is essentially the marketing pitch.
Conclusion: A two-paragraph summary of why the testing method is the best solution to the
challenge.
Links: APA formatted references to the links (must work from document), a short summary of
why the link is applicable, and what type of information it refers to. Our links should substantiate
each part of the document and should include links to at least two other white papers from the
last two years, they may be not on the subject you are assigned but illustrate good examples of
technology white papers. Also provide your search strategy (terms you looked for and the search
engine(s) used)
Techniques Assigned
System testing
2
Penetration Testing
Abeer Alhaidar
IT 355 Draft
February 2, 2015
“On my honor, I have neither given nor received aid on this assignment.”
Figure 1: http://www.2-sec.com/wp-content/uploads/2014/06/choosing-penetration-tester.png
February 2, 2015
Alhaidar
Table of Contents
Abstract ………………………………………………………………………………………………………………………. 3
The Challenge: …………………………………………………………………………………………………………… 4
Penetration Testing Method: …………………………………………………………………………………… 5
White Box Penetration Testing: ………………………………………………………………………………………. 5
White Box Testing Advantages:………………………………………………………………………………………………….6
White Box Testing Disadvantages:…………………………………………………………………………………………….6
Black Box Penetration Testing: ……………………………………………………………………………………….. 6
Black Box Testing Advantages:…………………………………………………………………………………………………..7
Black Box Testing Disadvantages: ……………………………………………………………………………………………..7
How The Penetration Testing Method Solve The Challenge: ……………………………… 8
Conclusion: …………………………………………………………………………………………………………………. 9
Links …………………………………………………………………………………………………………………………. 10
Author ………………………………………………………………………………………………………………………. 11
2
February 2, 2015
Alhaidar
Abstract
This document allows readers to understand penetration testing. Also, allow
readers to understand the challenges that companies could face if they do not have
good protection. Penetration testing helps companies to save their valuable
information and save them. Also, it shows how to solve challenges that the
company’s face.
3
February 2, 2015
Alhaidar
The Challenge:
There are some situations were penetrations testing is important to use. There are
some challenges that might face the companies and organizations anything from the
use of passwords, within bugs in web application through to firewalls with sensitive
port open.
The challenge that the company face is saving their information. These information
could be the company’s assets, data, human, or even physical security. Trying to
save companies from attackers that would take advantage of vulnerabilities spots in
their system. Citibank is one of the companies that failed to protect its customers.
Vladimir Levin was able to get customer’s codes and passwords, which allowed him
to transfer money into criminal accounts. Levin was able to get into victims’
accounts many times over a period of time (Goodchild, 2012).
There are many things that can go wrong with the penetration testing, such as
outages, applications problems, lack of communication, and some technical issues.
The most common technical issues that a company could face is unavailable system
or application. The can be caused be overwhelming network traffic scanning like
testing tools.
Another type of issues that could occur during penetration testing is account
lockout, which is caused by log in authentication in certain account. Other technical
problems may occur from coding, which lead to unavailable system.
There are some managerial issues that a company could face. One of the issues is
lack of communication between software engineers and organizations. This kind of
problems could delay the business’s project.
4
February 2, 2015
Alhaidar
Penetration Testing Method:
Penetration testing method is a very common technique that has been used to test
network security and to protect company’s information. This method focuses on
identifying vulnerability in the application or software during testing or validation.
The penetration testing run in an application to find security vulnerabilities without
knowing the application itself. This method can be fast and inexpensive, and
requires a lower skill set than source code evaluation. The idea behind the it is that
the tester should follow a pre-scripted design throughout the test. This method has
two methods under it, which is white box penetration testing and black box
penetration testing (Kang, n.d).
White Box Penetration Testing:
The white box penetration testing is also known as clear box testing, structural
testing, and glass box testing (Beizer, 1990). It is a software testing method in which
the internal structure, designed, and implementations of the item being tested in
know to the tester. This method tests past the user interface and the essentials of a
system. This method has the visibility of the code, and can write test cases based on
the code.
A software engineer uses the white box testing to design test cases that implement
independent paths within a unit. Another technique is to implement rational
decisions on both their true and false side, and to execute loops within their
operational limits (Williams, 2006).
Example of a white box testing is when a tester studies and analysis the
implementation of a webpage to determine all authorized validations, and
unauthorized inputs.
5
February 2, 2015
Alhaidar
White Box Testing Advantages:

It does not require knowledge in programming and implementation.

Testing can be begun at an early stage.
White Box Testing Disadvantages:

Test script can be difficult to implement if it changed often.

Tests can be very difficult.
Black Box Penetration Testing:
The black box testing is also known as behavioral testing, data driven, or
input/output-driven testing (The Art of Software Testing, . It is a software testing
method in which the internal structure, design, and implementation of the item
being tested is not known to the tester. A software engineer does not need a source
code; they just need to put the inputs and what comes out of the box.
Figure 2: Black Box Testing. (2010, December 19). Retrieved from

Black Box Testing

The black box testing method tends to find errors, such as interface errors, errors in
data structure, performance or behavior errors, missing and incorrect functions.
Example of a black box testing is when a tester tests or analyze the essential
structure of a website, tests the webpages by using a browser, which provides
inputs, and then verify the outputs against the outcome.
6
February 2, 2015
Alhaidar
Black Box Testing Advantages:

Tests can be done from a user’s point of view, and help exposing the
differences in the requirements.

Testers need to know programming languages that have been used in
application or software, such as C++ programming.
Black Box Testing Disadvantages:

To find all errors, testers need to use all valid inputs and all possible inputs.

There are no clear requirements, which is white box testing.

Tests sometimes can be redundant if the software design has been tested
before.
The penetration test is intended for organizations, containing their “Internet,
internal, external, and dial-up”, and there is important type of attack before
implementing the test and document approach (Kang, n.d).
High level, in this level there are three types of approaches for penetration
testing, a zero knowledge test, a full knowledge test, and a partial knowledge test. In
a zero knowledge attack has no information about the attack, which starts with
information gathering.
Partial level, this kind of
test has the information that
motivated attackers to take the
information. This test is
provided in “documents as
policy and network topology
documents, asset inventory, and
Figure 3: Window of Exposure
other valuable information”
(Kang, n.d).
The Full knowledge attack, this is intended to simulate an attacker who has
close knowledge of target organization’s system like the employee.
7
February 2, 2015
Alhaidar
How The Penetration Testing Method Solve The Challenge:
To solve the network problem, networking team sees the traffic and try to fix it by
watching the scanning speed when the network is being tested. In many cases,
testers need to find the malicious data to resolve the unavailability. They must
review all files in the application to eliminate the damage, and they should write it in
application’s final report (Shackleford,n.d).
To resolve the account, which is caused by log in authenticated in certain account., is
to solve it with three different ways. First, he tester needs to remove the
authentication access. Then, tester needs to limit frequency of log in with
systematized tools. Finally, they company needs to change the user account lockout
settings during the test (Shackleford,n.d).
The best way to handle the communication issue is to ask several questions until the
point being clarified. The organization, software engineers and customer should sit
together to discuss the issues. Another problem is writing the report, which
sometimes it could not be clear enough to know the problem (Shackleford,n.d).
8
February 2, 2015
Alhaidar
Conclusion:
The most successful companies in the world use penetration-testing methodology
such as payment card industry data security, and RANDA Corporation. There are
some challenges that effect penetration testing, which is mentioned in this
document. Also, there are some techniques that can solve these problems and
prevent attackers from getting into the organization’s system.
9
February 2, 2015
Alhaidar
Links
Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved from
http://www.csoonline.com/article/2131745/social-engineering/10-hacks-thatmade-headlines.html
This link provides some examples of companies that did not use penetration testing.
This link provides the most ten hacks that made headlines.
Williams, L. (2006). White-Box Testing. White-Box Testing. Retrieved from
http://agile.csc.ncsu.edu/SEMaterials/WhiteBox.pdf
This link is existing white paper, which is about White box testing technique. It
explains what is the white box testing, and it shows examples. It also describes test
cases that white box operates. In addition, it compares between white box testing
and black box testing.
Beizer, B. (1990). Software Testing Techniques. Boston, International Thompson
Computer Press.
The author defined the penetration testing and their techniques.
Shackleford, D. (n.d.). How to do penetration testing: Overcoming problems and
concerns. Retrieved from http://searchitchannel.techtarget.com/tip/How-to-dopenetration-testing-Overcoming-problems-and-concerns
This link discus how to do the penetration testing, and what kind of problem that
testers could face and how to solve these concerns.
Kang, B. (n.d.). Effictive Penetration Testing Methodology. (Journal of Security
Engineering. Retrieved from
http://www.sersc.org/journals/JSE/vol5_no5_2008/8.pdf
Kang provides important information about penetration testing methodology and
its definition. Also, he talks about how penetration testing is effective to the most
organizations.
10
February 2, 2015
Alhaidar
Author
Abeer Alhaidar is a junior at Marymount University, Arlington, Virginia. She is from
Saudi Arabia, and her major is Information Technology, Information System
specialty.
School of Business Administration
11

Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.