SlideShare a Scribd company logo
1 of 13
RISK AND TESTING
Emi Rahmi
Program Studi S1 Sistem Informasi
Fakultas Sains dan Teknologi
Universitas Islam Negeri Sultan Syarif Kasim Riau
http://sif.uin-suska.ac.id http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
Risks and Levels of Risk
Risk is a word we all use loosely, but what
exactly is risk?
Simply put, it's the possibility of a negative or
undesirable outcome. In the future, a risk has
some likelihood between 0% and 100%; it is a
possibility, not a certainty. In the past, however,
either the risk has materialized and become an
outcome or issue or it has not; the likelihood of a
risk in the past is either 0% or 100%.
✖ The likelihood of a risk becoming an
outcome is one factor to consider when
thinking about the level of risk associated
with its possible negative consequences.
The more likely the outcome is, the worse
the risk. However, likelihood is not the only
consideration.
✖ The potential consequences or impact is an
important consideration affecting the level
of risk, too.
We can classify risks into :
o project risks -> factors relating to the way the
work is carried out, i.e. the test project
o product risks -> factors relating to what is
produced by the work, i.e. the thing we are
testing
Product risks
✖ Unsatisfactory software might omit some key function
that the customers specified, the users required or the
stakeholders were promised.
✖ Unsatisfactory software might be unreliable and
frequently fail to behave normally.
✖ Unsatisfactory software might fail in ways that cause
financial or other damage to a user or the company
that user works for.
✖ Unsatisfactory software might have problems related
to a particular quality characteristic, which might not
be functionality, but rather security, reliability,
usability, maintainability or performance.
Risk- based testing uses risk to prioritize and
emphasize the appropriate tests during test
execution, but it's about more than that.
Risk-based testing starts early in the project,
identifying risks to system quality and using that
knowledge of risk to guide testing planning,
specification, preparation and execution.
Risk-based testing involves both mitigation testing to
provide opportunities to reduce the likelihood of
defects, especially high impact defects and
contingency testing to identify work arounds to make
the defects that do get past us less painful.
Risk-based testing also involves measuring how well
we are doing at finding and removing defects in
critical areas.
Risk-based testing starts with product risk
analysis. One technique for risk analysis is a
close reading of the requirements
specification, design specifications, user
documentation and other items. Another
technique is brainstorming with many of the
project stakeholders. Another is a sequence of
one-on-one or small-group sessions with the
business and technology experts in the
company
Project risks
However, testing is an activity like the rest of the
project and thus it is subject to risks that
endanger the project. To deal with the project
risks that apply to testing, we can use the same
concepts we apply to identifying, prioritizing and
managing product risks.
Checklists and examples can help you identify test project risks
[Black, 2004].
For any risk, product or project, you have four typical options:
1. Mitigate
Take steps in
advance to reduce
the likelihood
(and possibly the
impact) of the
risk.
2. Contingency
Have a plan in
place to reduce
the impact
should the risk
become an
outcome.
4. Ignore
Do nothing
about the risk,
which is usually
a smart option
only when
there's little that
can be done or
when the
likelihood and
impact are low.
3. Transfer
Convince some
other member of
the team or
project
stakeholder to
reduce the
likelihood or
accept the
impact of the
risk.
Here are some typical risks along with some options for managing them.
✖ Logistics or product quality problems that block tests: These can be mitigated through
careful planning, good defect triage and management, and robust test design.
✖ Test items that won't install in the test environment: These can be mitigated through
smoke (or acceptance) testing prior to starting test phases or as part of a nightly build
or continuous integration. Having a defined uninstall process is a good contingency
plan.
✖ Excessive change to the product that invalidates test results or requires updates to test
cases, expected results and environments: These can be mitigated through good
change-control processes, robust test design and light weight test documentation.
When severe incidents occur, transference of the risk by escalation to management is
often in order.
✖ Insufficient or unrealistic test environments that yield misleading results: One option
is to transfer the risks to management by explaining the limits on test results
obtained in limited environments. Mitigation sometimes complete alleviation can be
achieved by outsourcing tests such as performance tests that are particularly sensitive
to proper test environments.
Reference
Graham. et al. Foundations of Software Testing
The End of Slide
thank you

More Related Content

What's hot

Risk assessment at workplace
Risk assessment at workplaceRisk assessment at workplace
Risk assessment at workplacesajid ali
 
BOHS control workshop slideshare version
BOHS control workshop slideshare versionBOHS control workshop slideshare version
BOHS control workshop slideshare versionMike Slater
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response TestSiemplify
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyWessam Atif
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessmentwirethehouse
 
Blue and orange bar marketing presentation
Blue and orange bar marketing presentationBlue and orange bar marketing presentation
Blue and orange bar marketing presentationabhishek1712
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementResolver Inc.
 
OSPAT Brochure 2015
OSPAT Brochure 2015OSPAT Brochure 2015
OSPAT Brochure 2015Peter Zahos
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident managementzapp0
 
To be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreakTo be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreakS.Nur Şimşir
 

What's hot (20)

Risk assessment at workplace
Risk assessment at workplaceRisk assessment at workplace
Risk assessment at workplace
 
Ecm
EcmEcm
Ecm
 
BOHS control workshop slideshare version
BOHS control workshop slideshare versionBOHS control workshop slideshare version
BOHS control workshop slideshare version
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & Safety
 
Job Description
Job DescriptionJob Description
Job Description
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessment
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
Blue and orange bar marketing presentation
Blue and orange bar marketing presentationBlue and orange bar marketing presentation
Blue and orange bar marketing presentation
 
Risk Assesments
Risk AssesmentsRisk Assesments
Risk Assesments
 
Environmental analysis
Environmental analysisEnvironmental analysis
Environmental analysis
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Occupational health risk assessment
Occupational health risk assessmentOccupational health risk assessment
Occupational health risk assessment
 
OSPAT Brochure 2015
OSPAT Brochure 2015OSPAT Brochure 2015
OSPAT Brochure 2015
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
To be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreakTo be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreak
 

Similar to Risk and Testing by Graham et al

Free-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingFree-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingQualister
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsReuben Korngold
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsAnanthReddy38
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Safety Inspections and Sample Safety Inspection.Health and safety training D...
Safety Inspections and Sample Safety Inspection.Health  and safety training D...Safety Inspections and Sample Safety Inspection.Health  and safety training D...
Safety Inspections and Sample Safety Inspection.Health and safety training D...Salman Jailani
 
Risk management overview
Risk management overviewRisk management overview
Risk management overviewHossam Maghrabi
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Softwareijtsrd
 
Risk Based Testing: Deferring the Right Bugs
Risk Based Testing: Deferring the Right BugsRisk Based Testing: Deferring the Right Bugs
Risk Based Testing: Deferring the Right Bugsindus329
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx CarlaDavis10
 

Similar to Risk and Testing by Graham et al (20)

Free-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingFree-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testing
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing Methods
 
CTFL chapter 05
CTFL chapter 05CTFL chapter 05
CTFL chapter 05
 
Test management
Test managementTest management
Test management
 
Test Management
Test ManagementTest Management
Test Management
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common Pitfalls
 
Safe Operating Procudures
Safe Operating ProcuduresSafe Operating Procudures
Safe Operating Procudures
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Safety Inspections and Sample Safety Inspection.Health and safety training D...
Safety Inspections and Sample Safety Inspection.Health  and safety training D...Safety Inspections and Sample Safety Inspection.Health  and safety training D...
Safety Inspections and Sample Safety Inspection.Health and safety training D...
 
Hazards and risk management
Hazards and risk managementHazards and risk management
Hazards and risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management overview
Risk management overviewRisk management overview
Risk management overview
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
 
Project/Program Risk management
Project/Program Risk managementProject/Program Risk management
Project/Program Risk management
 
Risk Based Testing: Deferring the Right Bugs
Risk Based Testing: Deferring the Right BugsRisk Based Testing: Deferring the Right Bugs
Risk Based Testing: Deferring the Right Bugs
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx
Step-by-Step Guide Conducting a Hazard Assessment Using a Template.pptx
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Risk and Testing by Graham et al

  • 1. RISK AND TESTING Emi Rahmi Program Studi S1 Sistem Informasi Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau http://sif.uin-suska.ac.id http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
  • 2. Risks and Levels of Risk Risk is a word we all use loosely, but what exactly is risk? Simply put, it's the possibility of a negative or undesirable outcome. In the future, a risk has some likelihood between 0% and 100%; it is a possibility, not a certainty. In the past, however, either the risk has materialized and become an outcome or issue or it has not; the likelihood of a risk in the past is either 0% or 100%.
  • 3. ✖ The likelihood of a risk becoming an outcome is one factor to consider when thinking about the level of risk associated with its possible negative consequences. The more likely the outcome is, the worse the risk. However, likelihood is not the only consideration. ✖ The potential consequences or impact is an important consideration affecting the level of risk, too.
  • 4. We can classify risks into : o project risks -> factors relating to the way the work is carried out, i.e. the test project o product risks -> factors relating to what is produced by the work, i.e. the thing we are testing
  • 5. Product risks ✖ Unsatisfactory software might omit some key function that the customers specified, the users required or the stakeholders were promised. ✖ Unsatisfactory software might be unreliable and frequently fail to behave normally. ✖ Unsatisfactory software might fail in ways that cause financial or other damage to a user or the company that user works for. ✖ Unsatisfactory software might have problems related to a particular quality characteristic, which might not be functionality, but rather security, reliability, usability, maintainability or performance.
  • 6. Risk- based testing uses risk to prioritize and emphasize the appropriate tests during test execution, but it's about more than that. Risk-based testing starts early in the project, identifying risks to system quality and using that knowledge of risk to guide testing planning, specification, preparation and execution.
  • 7. Risk-based testing involves both mitigation testing to provide opportunities to reduce the likelihood of defects, especially high impact defects and contingency testing to identify work arounds to make the defects that do get past us less painful. Risk-based testing also involves measuring how well we are doing at finding and removing defects in critical areas.
  • 8. Risk-based testing starts with product risk analysis. One technique for risk analysis is a close reading of the requirements specification, design specifications, user documentation and other items. Another technique is brainstorming with many of the project stakeholders. Another is a sequence of one-on-one or small-group sessions with the business and technology experts in the company
  • 9. Project risks However, testing is an activity like the rest of the project and thus it is subject to risks that endanger the project. To deal with the project risks that apply to testing, we can use the same concepts we apply to identifying, prioritizing and managing product risks.
  • 10. Checklists and examples can help you identify test project risks [Black, 2004]. For any risk, product or project, you have four typical options: 1. Mitigate Take steps in advance to reduce the likelihood (and possibly the impact) of the risk. 2. Contingency Have a plan in place to reduce the impact should the risk become an outcome. 4. Ignore Do nothing about the risk, which is usually a smart option only when there's little that can be done or when the likelihood and impact are low. 3. Transfer Convince some other member of the team or project stakeholder to reduce the likelihood or accept the impact of the risk.
  • 11. Here are some typical risks along with some options for managing them. ✖ Logistics or product quality problems that block tests: These can be mitigated through careful planning, good defect triage and management, and robust test design. ✖ Test items that won't install in the test environment: These can be mitigated through smoke (or acceptance) testing prior to starting test phases or as part of a nightly build or continuous integration. Having a defined uninstall process is a good contingency plan. ✖ Excessive change to the product that invalidates test results or requires updates to test cases, expected results and environments: These can be mitigated through good change-control processes, robust test design and light weight test documentation. When severe incidents occur, transference of the risk by escalation to management is often in order. ✖ Insufficient or unrealistic test environments that yield misleading results: One option is to transfer the risks to management by explaining the limits on test results obtained in limited environments. Mitigation sometimes complete alleviation can be achieved by outsourcing tests such as performance tests that are particularly sensitive to proper test environments.
  • 12. Reference Graham. et al. Foundations of Software Testing
  • 13. The End of Slide thank you