Sunday, June 9, 2019

Agile software development Assignment Example | Topics and Well Written Essays - 2000 words

Agile softw are development - Assignment ExampleTo begin with, the state of m some(prenominal) operate environments of software systems is such that any vulnerability is likely to attract exploits (Paul, 2012). This calls for software quizzers that are focused, diligent and thorough to ensure that the delivered software products do harbor any vulnerability. Just like the software testers, taxis constantly make efforts to induce their hacking skills updated. With such an effort, the hackers increase their ability to identify and exploit newer system vulnerabilities. Thus, testing like a hacker doer that a software tester assumes the role of a hacker to be better placed in identifying the security hitches of a system.Secondly, hackers hold up the main intention of doing what other people have not been able to do and this is why they able to discover system vulnerabilities. To counteract such intentions, testers have to think outside the box about the possible system weakness that attackers and hackers can find attractive. Nothing would be as paining as a tester carrying out a vulnerability assessment only for someone to come after him to find something that he failed to identify. Furthermore, the focus, time and effort spent in a testing activity will dictate the success level of a software project (Khurana, 2009). Based on these facts, testing like a hacker means that a software tester in his effort to eliminate system weaknesses might need to go beyond the testing scope undertake in the Test Plan.Finally, the exploitation is known to be a mission for circumventing the security controls of a system by launching an exploit. In the software world, exploits are bugs or issues within the software code that allow hackers to execute or launch payloads against the target software system (P, 2013). Payload here refers to a means of having the target machine turned into a puppet and forcing it to make our wishes. The payloads have the danger of altering the intend ed software

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.