The document provides guidance for a software quality expert. It outlines areas of focus such as testing products using manual and automated tests, understanding requirements, and engaging with customers. It emphasizes driving clear standards and processes to support quality. Key methodologies include modeling systems, considering the product lifecycle, and identifying common problems through tools.
3. Take what the creators give you and test it, using
manual or automated tests.
Triage issues.
Update tests as necessary.
Analyse and report on results.
4. Drive for clear requirements and design, even if you
have to create these yourself!
Build models to understand how the system works.
Look beyond problems with the product, including
how it can be misused, or how its dependencies can
fail.
Create tools to identify common problems, such as
misconfigurations or network issues. These can be used
not just for testing but for customers and partners.
5. Participate in user research, customer support and
other customer engagement tasks, to understand how
the product will be, or is, perceived by customers.
Consider the whole product lifecycle, including
acquisition, initial configuration, typical usage,
maintenance, upgrade and retirement.
Drive the definition of quality standards, processes,
tools and community knowledge to support the
product in the ecosystem.
6.
7. A: Businesses want to reduce the risk in achieving their
goals.
Businesses want to avoid risks like:
“Deal breakers” for the consumers.
Exposure to liability from consumers, regulatory agencies or other parties.
Tarnishing of the company’s reputation.
Exposure of the business or its assets to threats, such as theft or abuse.
8. Identify what controls are currently in place and which ones are needed.
Design and implement any new controls needed.
Identify the business assets at risk.
Assess potential threats to the business and
prioritize them based on likelihood and impact.
Determine actions to take on each threat. Then:
Accept the risk;
Eliminate the threat;
Reduce the impact; or
Delegate the risk to a third party.
9. Widely visible patterns of defects across products
or services provided, or used, by the business.
Unintended exposure of business IP or other
sensitive assets (e.g. accounts, passwords, etc.)
Abuse of the product, its customers or partners.
Non-compliance with critical standards, or with
legal or geopolitical requirements.
Aspects of the ecosystem – including partners
and competitors – that effectively nullify benefits
of the product.
10. SSL is a protocol that allows secure communication between a client and a server.
Its ecosystem includes:
Cryptographic and public key infrastructure (PKI) components.
Entities that issue and manage certificates.
Browsers, networks and all other aspects of the network stack.
Some ecosystem issues that need to be considered include:
Will fixes in cryptographic dependencies require updates in the protocol?
How reliable is certificate issuance and management? What issues could arise, and how
can the protocol itself mitigate these?
Are there ways for consumers to improperly configure SSL?
Are the users of the browsers and apps made aware – in an effective manner – that they
are communicating securely, and that it’s important to do so in the context of their use?
11. Key revenue earners for Candy Crush Saga
Ability to charge money for certain game features (e.g. unlock levels)
Attention share of users on the game and the ability to keep growing it
Asset Importance Main Threats
The revenue earning
features of the game
Highest 1. Features don’t work and generate no revenue
2. Revenue aspect can be bypassed (front or back ends)
3. Revenue can be redirected to other parties
4. Customers can be charged for features that don’t work
Attention share
features of the game
High 1. Game can be altered to introduce unwanted aspects
2. Unable to collect usage information from customers
3. Usage information can be redirected to third parties
Intellectual property
pertaining to the game
Moderate Third parties can effectively copy the game and attract game
users to it
Sensitive operational
assets
Highest Sensitive data – such as user identities or credit card data – is
stolen, damaging users hence the profitability of the game
12. Prioritized list of risks to the business, within the
context of the product under test.
Areas of focus and how they pertain to each business
risk.
Methodology applied to each area of focus.
13. Business risk Areas of focus Methodologies
Features don’t work
and generate no
revenue
Unlock a level; Add time;
Add moves; Add lives.
Functional; App
sleep/resume cycle;
Network reliability.
Revenue earning
features can be
bypassed
Persistent app state
affecting levels, time, moves
and lives; Service entry point
and protocols; Billing
service.
State-based testing;
penetration testing; service
DoS; false billing data
entry; billing service
dependencies.
Revenue can be
redirected to other
parties
Billing service; service
protocols.
Secure design evaluation;
penetration testing; false
billing data entry.
Editor's Notes
Businesses create products to achieve a particular goal. Most often, this is to make money. Sometimes, it’s something else.
In any venture, there is an element of risk. Testing is a way to control some of those risks.
Business assets can include aspects like reputation, IP and customer satisfaction.