Across
- 3. Testing performed in order to enhanced and improve the functional and performance capabilities of the application
- 5. A testing phase where the tester tries to ‘break’ the system by randomly trying the system’s functionality
- 8. The relationship between test cases and requirements is shown with the help of a document
- 10. A weakness that makes the system susceptible to attack or damage.
- 11. A very common form of attack involves causing a particular program to interpret data crafted in such a way as to cause an unanticipated change of control.
- 13. The process involves reviewing the complete product to ensure that it is structurally sound and that the standards and requirements have been met
- 15. Unsafe coding practices results in costly vulnerabilities in application software that leads to theft of sensitive data.
Down
- 1. The assurance that information is accurate, complete and valid, and has not been altered by an unauthorized action.
- 2. A set of controls that grant or deny a user, or other entity, access to a system resource.
- 4. Testing determines that the data taken from the front end of the application is stored in correct place and in correct manner in the database.
- 6. Testing tests the software with a motive to check that the application do not crashes if we increase the stress on the application by increasing the large number of user working on the application
- 7. Error condition hiding another error condition
- 9. Type of testing in which software elements, hardware elements, or both are combined all at once into a component or an overall system, rather than in stages.
- 12. ----------is a collection of software and test data required to test the application by running it in different testing condition like stress, load, data- driven, and monitoring its behavior and outputs
- 14. A free open source web application security control library that make it easier for programmers to write lower risk applications
