ETG

123456789101112131415
Across
  1. 3. Testing performed in order to enhanced and improve the functional and performance capabilities of the application
  2. 5. A testing phase where the tester tries to ‘break’ the system by randomly trying the system’s functionality
  3. 8. The relationship between test cases and requirements is shown with the help of a document
  4. 10. A weakness that makes the system susceptible to attack or damage.
  5. 11. A very common form of attack involves causing a particular program to interpret data crafted in such a way as to cause an unanticipated change of control.
  6. 13. The process involves reviewing the complete product to ensure that it is structurally sound and that the standards and requirements have been met
  7. 15. Unsafe coding practices results in costly vulnerabilities in application software that leads to theft of sensitive data.
Down
  1. 1. The assurance that information is accurate, complete and valid, and has not been altered by an unauthorized action.
  2. 2. A set of controls that grant or deny a user, or other entity, access to a system resource.
  3. 4. Testing determines that the data taken from the front end of the application is stored in correct place and in correct manner in the database.
  4. 6. Testing tests the software with a motive to check that the application do not crashes if we increase the stress on the application by increasing the large number of user working on the application
  5. 7. Error condition hiding another error condition
  6. 9. Type of testing in which software elements, hardware elements, or both are combined all at once into a component or an overall system, rather than in stages.
  7. 12. ----------is a collection of software and test data required to test the application by running it in different testing condition like stress, load, data- driven, and monitoring its behavior and outputs
  8. 14. A free open source web application security control library that make it easier for programmers to write lower risk applications