Secure Software Testing

High school
Essay
Miscellaneous
Pages 2 (502 words)
Download 0
Centralized Credentials Quality Assurance System (CCQAS) as a system has been conceived and later developed to provide support medical readiness capability to military operations through the identification of medical personnel with the requisite skills. The role of CCQAS now diversifies from maintaining of the required database with information being made available to the military treatment facility…

Introduction

So, it can easily be visualized that the CCQAS is a massive system with multiple sources of data storage as well possible queries for retrieval.
Testing phase with the software has been completed in two phases. The first one being the System Integration test (SIT)and in the second phase it's been the System Qualification Test (SQT). The SIT being the first phase of testing i.e., Development Test & Evaluation (DT&E) is performed by The McVey Company, Inc (TMCI). TMCI provided an independent team for this test with sole purpose being the validation of capabilities of the CCQAS system in ensuring technical specification, the rules of business, its various functionalities and other specifications mentioned in the requirement document as well as those defined by the developers and possible end users. The test environment provided for this phase of testing was similar to that of the designed production environment. TMCI role in this phase extends to testing all releases of CCQAS during the duration of SIT.
Now in the second phase of DT&E it's the System Qualification Test (SQT)that needs to be performed. Here, the testing is performed by the experts of the subject matter or the service representatives. ...
Download paper
Not exactly what you need?

Related papers

Empirical Methods in Software Engineering
Repetition allows greater certainty of observation.…
Secure Software Testing
So, it can easily be visualized that the CCQAS is a massive system with multiple sources of data storage as well possible queries for retrieval.…
Secure Computer Systems
Through a depth of experience and breadth of technologies spanning from servers to desktops and laptop PCs to mobile devices, Microsoft offers the most comprehensive technological solution to address this ongoing need". By Kimberly Nelson, Microsoft executive director for e-government, and William Billings, chief security advisor for the Microsoft U.S. Public Sector division. 'Protecting…
Secure Computer Systems Essay
The press release from OCABR made it amply clear that the new amendments are to be applicable to all the big and small businesses that possess or have licensed personal information of any resident of Massachusetts (Mondaq Business Briefing, 2009). The primary purpose of these amendments is to upgrade the existing data security standards, while taking into cognizance the emerging risks to data, to…
Secure Webbased Application
A Research methodology is a set of underlying principles behind the collection of models, theories, ideas, and hypothesis. Collectively, research methodology is a technique of collecting data systematically (Rajeev, 2009). For this research the data was analyzed from the previous researches in the literature review section. The authenticity and contingency of this paper depends upon the validity…
Secure Computer System
Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to…
Threats and Methods to Secure a VoIP Network
People were mostly concerned with its cost, functionality and reliability. Today, VoIP is growing to the point where companies of almost any size in any industry know how to take advantage of the cost savings and other emerging added features in VoIP. As VOIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue. Network…