SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
QA InfoTech1
Risk Based Testing - Deferring the right bugs
August 2009
Risk Based Testing
Deferring the Right Bugs
Does more testing
make the software
more stable?
It is a well known fact that even infinite amount of time and
resources can not eliminate all the risks associated with releas-
ing a product. Accepting the release readiness of the system
would mean accepting a certain level of risk.
Over years computer scientists have come to accept that no
amount of testing can ever guarantee that a piece of software
is completely defect free. It is because of the inherent nature
of information dependent software that there exists infinitely
large set of test cases even for the smallest of programs. Hence,
testing creates bounds and classes in order to limit the job.
Your Software Testing Partner
Excellence | Partnership | Commitment
2 QA InfoTech
Risk Based Testing - Deferring the right bugs
This technique establishes the release readiness cri-
teria not by the number of open defects but the con-
sequence of these defects. It, thus, allows you to ship
your product with known defects.
It provides a critical level of objectivity in determin-
ing what things to test by using a combination of
business and technical requirements to prioritize
the testing process. Though it’s a problem based
testing technique when applied in the case of loom-
ing deadlines and limited resources, but if combined
with the traditional ways to test the application, it
limits the scope of the testing efforts.
This technique makes it easy for the QA organiza-
tions to deliver the right level of quality as a response
to changing business requirements.
Risk-Based Testing helps to find the right quality
level that can be delivered in limited schedule and
resources by identifying business and technical re-
quirements for an application and prioritizing these
requirements on the basis of likelihood and impact
of failure.
This strategy involves setting risk indicators to priori-
tize the testing tasks by:
• Analyzing the most important/critical functionali-
ties: Priority Indicator
• Analyzing the areas where the probability of failure is
high: Defect Indicator
• Analyzing the impact of failure of a particular func-
tionality: Severity Indicator
It’s a metrics in itself that quantifies the progress of the
testing project by providing a framework for test mon-
itoring and control throughout the project. It builds
accountability to all the tests performed thus bringing
a clarity and objectivity to the entire testing process.
Formulating a risk based testing approach needs an
understanding that there are risks involved before
you start testing the product and there are going to
be some residual risks that can not be eliminated. This
assumption calls for a strategy to try reducing the like-
lihood of certain risks, categorizing the identified risks
on the basis of their importance, designing tests that
can eliminate the risks and devising a mitigation plan
to reduce the impact of the risks that can not be elimi-
nated.
Step 1: Review and Identify Gaps
Involve QA and testing from the initial stages of the
SDLC rather than treat it as a distinct artifact of soft-
ware development to reduce the probability of risks
occurring at later stages.
Effective traditional testing means finding the right
bugs whereas risk based testing involves deferring the
right bugs. This fact sets it apart from the strategies,
benefitsand limitations involved in thetraditional form
of testing.
What is Risk Based testing?
How does it work?
Risk Based Test Planning
QA InfoTech3
Risk Based Testing - Deferring the right bugs
Step 2: Identify Strategic Features
Identify the most strategic technical and business
priorities. The purpose of risk based testing strategy
lies in identifying and focusing on the most critical
and strategic features. It’s therefore important to
understand the product’s purpose towards both the
end users (technical priority) and the value addition
to the business (business priority). In business terms,
these features can be categorized on how they are
setting the product apart from the competition.
Step 3 Identify Risks
Classify components that can fail. Design test strate-
gies that can test areas where probability of failure is
high. For example, modified areas are an important
source of defect. Identify areas where any change in
application is introduced (especially if fo lowing an
iterative approach). Another such failure indicator
is the area around the defect fixes. Defects have the
tendency to bunch together in defect-prone areas
as fixes lead to changes leading to new defects.
Step 4: Identify Risk Triggers/Source
Design tests that can explore the application from
different perspectives, thus revealing the potential
weakness of the application. These tests are de-
signed with the intent to exploit the weakness if it
exists. Merely identifying risk areas is not enough.
Isolate the situations that can trigger that risk and
cause a failure. Identify the ways to attack the capa-
bilities of the software by forcing situations that are
the cause of failure. This particular strategy is often
termed as Negative testing. It can find significant
failures and provide strategic information about the
application under test.
Step 5: Assign the identified Risk items a Hierarchy
In the light of the risk indicators that have been iden-
tified, it’s important to prioritize them on the basis
of their priority (quantifies the necessity for the area
to be prioritized for testing: business focused) and se-
verity (quantifies the impact of a risk on functional-
ity: customer-focused).
Setting Priority: Areas can be prioritized on the basis of
their criticality, visibility and frequency of use.
Setting Severity: Areas can be prioritized on the basis
of the impact on the user if a particular feature fails to
operate correctly.
Step 6: Create Critical Path Test Cases
In order to make the risk based testing approach more
exhaustive it’s important to make the testing coverage
more wide-spread. The test cases should be able to
cover the basic flows with more emphasis on the criti-
cal flows.
Step 7: Devise a Mitigation Plan
The risk based approach not only targets the strategy
that can expose all the risks and eliminate them, it also
aims to reduce the impact of residual risks that were
not anticipated or eliminated.
Risk identification requires collecting all the system-
related information that can be analyzed and classified
to estimate the risks and the potential risk- sources
involved. A complete understanding of the system
and its operational environment helps to understand
the potential risks thereby establishing a well defined
scope of risk identification and assessment.
Some of the most probable sources that may trigger
the possibility of risk becoming a problem are listed as
follows:
• Unrealistic Project Schedule
• Incomplete or changing requirements that lead to
new/changed areas
• Application size
• Application complexity: areas that are complex to un-
derstand and execute
Knowing all the Risks: Risk Identi-
fication/Risk Assessment
4 QA InfoTech
Risk Based Testing - Deferring the right bugs
• Component interdependencies/ Introduction of
third party software
• Introduction to new technology/platform
• Project/Team Management Risks
All the risk management activities planned so far, i.e.
risk identification and assessment give a picture of
risks that can not be eliminated. For such risks, miti-
gation activities are planned to reduce the impact of
the failure that can not be avoided.
• Releasing the product with recommendations
• Fixing the defects later in a reasonable timeframe
(Patch release)
• Making the technical support ready
• Building Roll-Back plan
A risk based testing approach can be made more ex-
haustive by including few techniques like Beta test-
ing, Automation and Metrics generation. This will
facilitate the testing efforts and improve the testing
coverage.
Include Beta Testing
If the software has been used before, an active user
group can be helpful in testing new versions and ex-
pediting the entire testing efforts.
Add Automation for Test Management
To speed up the entire effort, Test Managers can au-
tomate the process of entering, tracking and resolv-
ing defects found during testing. Automation can
also be used for correlating and tracing the results
to the initial risk assessment.
Create Metrics to Gauge Results
A metrics can be generated to describe and analyze
the relationship between risk and testing efforts. It
articulates exactly what’s been tested and not tested,
giving accountability to the testing efforts. This set of
metrics will be used to analyze the results against ini-
tial risk assessments, to make the relevant changes to
the priority of testing and to re-evaluate the risk values
of out-of-line results.
So far, our approach in understanding the risk-based
testing was based on the assumption that we are test-
ing a new version of the existing product and that we
are familiar with the basic functionalities and purpose
of the product. What if it is a new product? What if all
the risk indicators describe earlier can not be applied?
In such cases, we execute Exploratory Testing by ex-
ploring the use of the software within its overall en-
vironment. A rough test should uncover all the critical
functionalities, defect prone areas and few important
failure situations. These features and areas can then be
prioritized as described earlier.
Risk Based Testing is an approach that requires skill
and experience to isolate the most important tests on
the basis of technical and business constraints. Risk
based testing is a powerful testing technique that ena-
bles the QA teams to streamline their testing efforts.
Organizations that implement this technique are in a
better knowhow of the risks that are inherent in their
applications and of the risks that are actually signifi-
cant. This knowledge is much helpful in exploiting the
relationship between risk and testing efforts, thus,
bringing an objectivity to the test designing and test
management. It allows QA teams to make informed
decisions while setting a clear test exit criteria.
Risk Mitigation
Optimized Risk Based Testing
What if there is no prior Product
Knowledge?
Conclusion
QA InfoTech5
Risk Based Testing - Deferring the right bugs
About QA InfoTech
QA InfoTech is a leading Software Quality Assurance and
Testing company specializing in providing independ-
ent , unbiased testing services to world class businesses.
Through its wide range of services constituting of function-
al testing, acceptance testing, localization testing, test au-
tomation and performance testing, QA InfoTech has helped
many Fortune 500 companies in creating and successfully
executing their QA strategy.
At QA InfoTech, we maintain a distinguished level of service
which blends top quality with cost effective solutions. The
forceful combination of our highly skilled Test Engineers,
Domain Experts and our investment in latest technologies
ensures a Wing to Wing Coverage for our client’s products.
We bring together best practices and strategies to cater to
the unique software testing needs.
Established in 2003, with less than five testing experts, QA
InfoTech has grown leaps and bounds with five QA Centers
of Excellence in US and India, and more than 450 Testing
engineers.
Excellence, Partnership and Commitment are the three hall-
marks of the way we approach our clients, we believe you
will see this in our service and our expert team.
Visit us at
www.qainfotech.com
Read our blog at
www.qainfotech.com/blog
All content / information present here is the exclusive property of QA InfoTech Pvt. Ltd. The content / information contained here is
correct at the time of publishing. No material from here may be copied, modified, reproduced, republished, uploaded, transmitted,
posted or distributed in any form without prior written permission from QA InfoTech. Unauthorized use of the content / information
appearing here may violate copyright, trademark and other applicable laws, and could result in criminal or civil penalties.
Copyright © 2009 QA InfoTech Pvt. Ltd.
Contact us at
info@qainfotech.com
Follow us on Twitter at
www.twitter.com/qainfotech
Functional • Automated • Load • Localization
End to End Testing Services
Usability • Integration • Mobile • Security

Contenu connexe

Tendances

IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessYolanda Williams
 
ISTQB Advanced – Study Guide -1
ISTQB Advanced – Study Guide -1ISTQB Advanced – Study Guide -1
ISTQB Advanced – Study Guide -1Yogindernath Gupta
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Trainingsuhasreddy1
 
Essential Test Management and Planning
Essential Test Management and PlanningEssential Test Management and Planning
Essential Test Management and PlanningTechWell
 
Test planning & estimation
Test planning & estimationTest planning & estimation
Test planning & estimationLeslie Smart
 
Free-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingFree-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingQualister
 
StarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On PreventionStarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On PreventionDavid Jellison
 
BugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect ManagementBugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect Managementguestf794555
 
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...AgileSparks
 
Testing metrics
Testing metricsTesting metrics
Testing metricsprats12345
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introductionOana Feidi
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsMani Nutulapati
 
Risk based testing, Katerina Meshkova
Risk based testing, Katerina MeshkovaRisk based testing, Katerina Meshkova
Risk based testing, Katerina MeshkovaSigma Software
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based TestingJeff Findlay
 

Tendances (20)

PI5_InspectAdapt
PI5_InspectAdaptPI5_InspectAdapt
PI5_InspectAdapt
 
t map brief
t map brieft map brief
t map brief
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
 
Test management
Test managementTest management
Test management
 
ISTQB Advanced – Study Guide -1
ISTQB Advanced – Study Guide -1ISTQB Advanced – Study Guide -1
ISTQB Advanced – Study Guide -1
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Training
 
Test planning
Test planningTest planning
Test planning
 
Essential Test Management and Planning
Essential Test Management and PlanningEssential Test Management and Planning
Essential Test Management and Planning
 
Test planning & estimation
Test planning & estimationTest planning & estimation
Test planning & estimation
 
Change Control
Change ControlChange Control
Change Control
 
Free-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testingFree-ebook-rex-black advanced-software-testing
Free-ebook-rex-black advanced-software-testing
 
StarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On PreventionStarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On Prevention
 
BugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect ManagementBugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect Management
 
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
 
Testing metrics
Testing metricsTesting metrics
Testing metrics
 
CTFL Module 01
CTFL Module 01CTFL Module 01
CTFL Module 01
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introduction
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
 
Risk based testing, Katerina Meshkova
Risk based testing, Katerina MeshkovaRisk based testing, Katerina Meshkova
Risk based testing, Katerina Meshkova
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based Testing
 

En vedette

Prioritization Survey Results
Prioritization Survey ResultsPrioritization Survey Results
Prioritization Survey ResultsMichal Bularz
 
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...Relational Capital for Innovative Growth Companies: Start-ups and Relational ...
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...Jukka Huhtamäki
 
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...Irma Muthiara Sari
 
Decommissioning and dismantling of the moata reactor a radiation protection ...
Decommissioning and dismantling of the moata reactor  a radiation protection ...Decommissioning and dismantling of the moata reactor  a radiation protection ...
Decommissioning and dismantling of the moata reactor a radiation protection ...Leishman Associates
 
Some key considerations relating anastas
Some key considerations relating anastasSome key considerations relating anastas
Some key considerations relating anastasLeishman Associates
 
The future of hands on learning technologies-no pictures
The future of hands on learning technologies-no picturesThe future of hands on learning technologies-no pictures
The future of hands on learning technologies-no picturesSusanna Martin
 
Botox london estheticclinique
Botox london estheticcliniqueBotox london estheticclinique
Botox london estheticcliniqueestheticclinique
 
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南maclean liu
 
Leadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityLeadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityErwin Schwella
 
了解Oracle数据库的版本号
了解Oracle数据库的版本号了解Oracle数据库的版本号
了解Oracle数据库的版本号maclean liu
 
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?attivapadula
 
Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响maclean liu
 
Myeloma conference presentation november 2012
Myeloma conference presentation   november 2012Myeloma conference presentation   november 2012
Myeloma conference presentation november 2012Jason Potts
 
Primaire de la Droite et du Centre : premier débat
Primaire de la Droite et du Centre : premier débatPrimaire de la Droite et du Centre : premier débat
Primaire de la Droite et du Centre : premier débatKantar
 
【Maclean liu技术分享】深入了解oracle asm(一)基础概念
【Maclean liu技术分享】深入了解oracle asm(一)基础概念【Maclean liu技术分享】深入了解oracle asm(一)基础概念
【Maclean liu技术分享】深入了解oracle asm(一)基础概念maclean liu
 
The bee swarm model of social change: How do institutions and grassroots push...
The bee swarm model of social change: How do institutions and grassroots push...The bee swarm model of social change: How do institutions and grassroots push...
The bee swarm model of social change: How do institutions and grassroots push...Steve Zavestoski
 

En vedette (20)

Prioritization Survey Results
Prioritization Survey ResultsPrioritization Survey Results
Prioritization Survey Results
 
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...Relational Capital for Innovative Growth Companies: Start-ups and Relational ...
Relational Capital for Innovative Growth Companies: Start-ups and Relational ...
 
Bolum3111
Bolum3111Bolum3111
Bolum3111
 
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...
06. a. salinan permendikbud no. 68 th 2013 ttg ttg kd dan struktur kurikulum ...
 
Decommissioning and dismantling of the moata reactor a radiation protection ...
Decommissioning and dismantling of the moata reactor  a radiation protection ...Decommissioning and dismantling of the moata reactor  a radiation protection ...
Decommissioning and dismantling of the moata reactor a radiation protection ...
 
Ais life 2009-3
Ais life 2009-3Ais life 2009-3
Ais life 2009-3
 
Some key considerations relating anastas
Some key considerations relating anastasSome key considerations relating anastas
Some key considerations relating anastas
 
The future of hands on learning technologies-no pictures
The future of hands on learning technologies-no picturesThe future of hands on learning technologies-no pictures
The future of hands on learning technologies-no pictures
 
Botox london estheticclinique
Botox london estheticcliniqueBotox london estheticclinique
Botox london estheticclinique
 
Presentation1
Presentation1Presentation1
Presentation1
 
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
 
Leadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityLeadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and Security
 
了解Oracle数据库的版本号
了解Oracle数据库的版本号了解Oracle数据库的版本号
了解Oracle数据库的版本号
 
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?
Antonio Bavusi - Petrolio: Quanto siamo disposti a pagare?
 
Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响
 
Myeloma conference presentation november 2012
Myeloma conference presentation   november 2012Myeloma conference presentation   november 2012
Myeloma conference presentation november 2012
 
Indian Ngo’S12
Indian Ngo’S12Indian Ngo’S12
Indian Ngo’S12
 
Primaire de la Droite et du Centre : premier débat
Primaire de la Droite et du Centre : premier débatPrimaire de la Droite et du Centre : premier débat
Primaire de la Droite et du Centre : premier débat
 
【Maclean liu技术分享】深入了解oracle asm(一)基础概念
【Maclean liu技术分享】深入了解oracle asm(一)基础概念【Maclean liu技术分享】深入了解oracle asm(一)基础概念
【Maclean liu技术分享】深入了解oracle asm(一)基础概念
 
The bee swarm model of social change: How do institutions and grassroots push...
The bee swarm model of social change: How do institutions and grassroots push...The bee swarm model of social change: How do institutions and grassroots push...
The bee swarm model of social change: How do institutions and grassroots push...
 

Similaire à Risk Based Testing: Deferring the Right Bugs

Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance Webtech Learning
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)KMS Technology
 
Module-4 PART-2&3.ppt
Module-4 PART-2&3.pptModule-4 PART-2&3.ppt
Module-4 PART-2&3.pptSharatNaik11
 
Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete GuideAbhay Kumar
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsReuben Korngold
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsAnanthReddy38
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationSonata Software
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdfSudhanshiBakre1
 
IRJET- Faces of Testing Strategies: Why &When?
IRJET- Faces of Testing Strategies: Why &When?IRJET- Faces of Testing Strategies: Why &When?
IRJET- Faces of Testing Strategies: Why &When?IRJET Journal
 
EFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWEFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWJournal For Research
 
Introduction to Software Testing Part- 2
Introduction to Software Testing Part- 2Introduction to Software Testing Part- 2
Introduction to Software Testing Part- 2Fayis-QA
 
Test Case Prioritization Techniques
Test Case Prioritization TechniquesTest Case Prioritization Techniques
Test Case Prioritization TechniquesKanoah
 
Top 10 Practices for Software Testing in 2023.pptx
Top 10 Practices for Software Testing in 2023.pptxTop 10 Practices for Software Testing in 2023.pptx
Top 10 Practices for Software Testing in 2023.pptxOprim Solutions
 

Similaire à Risk Based Testing: Deferring the Right Bugs (20)

CTFL chapter 05
CTFL chapter 05CTFL chapter 05
CTFL chapter 05
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)
 
Module-4 PART-2&3.ppt
Module-4 PART-2&3.pptModule-4 PART-2&3.ppt
Module-4 PART-2&3.ppt
 
Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete Guide
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing Methods
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common Pitfalls
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdf
 
IRJET- Faces of Testing Strategies: Why &When?
IRJET- Faces of Testing Strategies: Why &When?IRJET- Faces of Testing Strategies: Why &When?
IRJET- Faces of Testing Strategies: Why &When?
 
Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011
 
EFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWEFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEW
 
Manual Testing
Manual TestingManual Testing
Manual Testing
 
Introduction to Software Testing Part- 2
Introduction to Software Testing Part- 2Introduction to Software Testing Part- 2
Introduction to Software Testing Part- 2
 
Value of software testing
Value of software testingValue of software testing
Value of software testing
 
Test Case Prioritization Techniques
Test Case Prioritization TechniquesTest Case Prioritization Techniques
Test Case Prioritization Techniques
 
Top 10 Practices for Software Testing in 2023.pptx
Top 10 Practices for Software Testing in 2023.pptxTop 10 Practices for Software Testing in 2023.pptx
Top 10 Practices for Software Testing in 2023.pptx
 

Plus de indus329

Legionnaires Disease
Legionnaires DiseaseLegionnaires Disease
Legionnaires Diseaseindus329
 
Legionnaires Disease
Legionnaires DiseaseLegionnaires Disease
Legionnaires Diseaseindus329
 
To sample, or not to sample
To sample, or not to sampleTo sample, or not to sample
To sample, or not to sampleindus329
 
To sample, or not to sample
To sample, or not to sampleTo sample, or not to sample
To sample, or not to sampleindus329
 
Tank cleaning work
Tank cleaning workTank cleaning work
Tank cleaning workindus329
 
Legionella sampling
Legionella samplingLegionella sampling
Legionella samplingindus329
 
Legionella sampling
Legionella samplingLegionella sampling
Legionella samplingindus329
 
Tank cleaning work
Tank cleaning workTank cleaning work
Tank cleaning workindus329
 
Executive mba program united world
Executive mba program united worldExecutive mba program united world
Executive mba program united worldindus329
 

Plus de indus329 (9)

Legionnaires Disease
Legionnaires DiseaseLegionnaires Disease
Legionnaires Disease
 
Legionnaires Disease
Legionnaires DiseaseLegionnaires Disease
Legionnaires Disease
 
To sample, or not to sample
To sample, or not to sampleTo sample, or not to sample
To sample, or not to sample
 
To sample, or not to sample
To sample, or not to sampleTo sample, or not to sample
To sample, or not to sample
 
Tank cleaning work
Tank cleaning workTank cleaning work
Tank cleaning work
 
Legionella sampling
Legionella samplingLegionella sampling
Legionella sampling
 
Legionella sampling
Legionella samplingLegionella sampling
Legionella sampling
 
Tank cleaning work
Tank cleaning workTank cleaning work
Tank cleaning work
 
Executive mba program united world
Executive mba program united worldExecutive mba program united world
Executive mba program united world
 

Dernier

Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Dernier (20)

Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

Risk Based Testing: Deferring the Right Bugs

  • 1. QA InfoTech1 Risk Based Testing - Deferring the right bugs August 2009 Risk Based Testing Deferring the Right Bugs Does more testing make the software more stable? It is a well known fact that even infinite amount of time and resources can not eliminate all the risks associated with releas- ing a product. Accepting the release readiness of the system would mean accepting a certain level of risk. Over years computer scientists have come to accept that no amount of testing can ever guarantee that a piece of software is completely defect free. It is because of the inherent nature of information dependent software that there exists infinitely large set of test cases even for the smallest of programs. Hence, testing creates bounds and classes in order to limit the job. Your Software Testing Partner Excellence | Partnership | Commitment
  • 2. 2 QA InfoTech Risk Based Testing - Deferring the right bugs This technique establishes the release readiness cri- teria not by the number of open defects but the con- sequence of these defects. It, thus, allows you to ship your product with known defects. It provides a critical level of objectivity in determin- ing what things to test by using a combination of business and technical requirements to prioritize the testing process. Though it’s a problem based testing technique when applied in the case of loom- ing deadlines and limited resources, but if combined with the traditional ways to test the application, it limits the scope of the testing efforts. This technique makes it easy for the QA organiza- tions to deliver the right level of quality as a response to changing business requirements. Risk-Based Testing helps to find the right quality level that can be delivered in limited schedule and resources by identifying business and technical re- quirements for an application and prioritizing these requirements on the basis of likelihood and impact of failure. This strategy involves setting risk indicators to priori- tize the testing tasks by: • Analyzing the most important/critical functionali- ties: Priority Indicator • Analyzing the areas where the probability of failure is high: Defect Indicator • Analyzing the impact of failure of a particular func- tionality: Severity Indicator It’s a metrics in itself that quantifies the progress of the testing project by providing a framework for test mon- itoring and control throughout the project. It builds accountability to all the tests performed thus bringing a clarity and objectivity to the entire testing process. Formulating a risk based testing approach needs an understanding that there are risks involved before you start testing the product and there are going to be some residual risks that can not be eliminated. This assumption calls for a strategy to try reducing the like- lihood of certain risks, categorizing the identified risks on the basis of their importance, designing tests that can eliminate the risks and devising a mitigation plan to reduce the impact of the risks that can not be elimi- nated. Step 1: Review and Identify Gaps Involve QA and testing from the initial stages of the SDLC rather than treat it as a distinct artifact of soft- ware development to reduce the probability of risks occurring at later stages. Effective traditional testing means finding the right bugs whereas risk based testing involves deferring the right bugs. This fact sets it apart from the strategies, benefitsand limitations involved in thetraditional form of testing. What is Risk Based testing? How does it work? Risk Based Test Planning
  • 3. QA InfoTech3 Risk Based Testing - Deferring the right bugs Step 2: Identify Strategic Features Identify the most strategic technical and business priorities. The purpose of risk based testing strategy lies in identifying and focusing on the most critical and strategic features. It’s therefore important to understand the product’s purpose towards both the end users (technical priority) and the value addition to the business (business priority). In business terms, these features can be categorized on how they are setting the product apart from the competition. Step 3 Identify Risks Classify components that can fail. Design test strate- gies that can test areas where probability of failure is high. For example, modified areas are an important source of defect. Identify areas where any change in application is introduced (especially if fo lowing an iterative approach). Another such failure indicator is the area around the defect fixes. Defects have the tendency to bunch together in defect-prone areas as fixes lead to changes leading to new defects. Step 4: Identify Risk Triggers/Source Design tests that can explore the application from different perspectives, thus revealing the potential weakness of the application. These tests are de- signed with the intent to exploit the weakness if it exists. Merely identifying risk areas is not enough. Isolate the situations that can trigger that risk and cause a failure. Identify the ways to attack the capa- bilities of the software by forcing situations that are the cause of failure. This particular strategy is often termed as Negative testing. It can find significant failures and provide strategic information about the application under test. Step 5: Assign the identified Risk items a Hierarchy In the light of the risk indicators that have been iden- tified, it’s important to prioritize them on the basis of their priority (quantifies the necessity for the area to be prioritized for testing: business focused) and se- verity (quantifies the impact of a risk on functional- ity: customer-focused). Setting Priority: Areas can be prioritized on the basis of their criticality, visibility and frequency of use. Setting Severity: Areas can be prioritized on the basis of the impact on the user if a particular feature fails to operate correctly. Step 6: Create Critical Path Test Cases In order to make the risk based testing approach more exhaustive it’s important to make the testing coverage more wide-spread. The test cases should be able to cover the basic flows with more emphasis on the criti- cal flows. Step 7: Devise a Mitigation Plan The risk based approach not only targets the strategy that can expose all the risks and eliminate them, it also aims to reduce the impact of residual risks that were not anticipated or eliminated. Risk identification requires collecting all the system- related information that can be analyzed and classified to estimate the risks and the potential risk- sources involved. A complete understanding of the system and its operational environment helps to understand the potential risks thereby establishing a well defined scope of risk identification and assessment. Some of the most probable sources that may trigger the possibility of risk becoming a problem are listed as follows: • Unrealistic Project Schedule • Incomplete or changing requirements that lead to new/changed areas • Application size • Application complexity: areas that are complex to un- derstand and execute Knowing all the Risks: Risk Identi- fication/Risk Assessment
  • 4. 4 QA InfoTech Risk Based Testing - Deferring the right bugs • Component interdependencies/ Introduction of third party software • Introduction to new technology/platform • Project/Team Management Risks All the risk management activities planned so far, i.e. risk identification and assessment give a picture of risks that can not be eliminated. For such risks, miti- gation activities are planned to reduce the impact of the failure that can not be avoided. • Releasing the product with recommendations • Fixing the defects later in a reasonable timeframe (Patch release) • Making the technical support ready • Building Roll-Back plan A risk based testing approach can be made more ex- haustive by including few techniques like Beta test- ing, Automation and Metrics generation. This will facilitate the testing efforts and improve the testing coverage. Include Beta Testing If the software has been used before, an active user group can be helpful in testing new versions and ex- pediting the entire testing efforts. Add Automation for Test Management To speed up the entire effort, Test Managers can au- tomate the process of entering, tracking and resolv- ing defects found during testing. Automation can also be used for correlating and tracing the results to the initial risk assessment. Create Metrics to Gauge Results A metrics can be generated to describe and analyze the relationship between risk and testing efforts. It articulates exactly what’s been tested and not tested, giving accountability to the testing efforts. This set of metrics will be used to analyze the results against ini- tial risk assessments, to make the relevant changes to the priority of testing and to re-evaluate the risk values of out-of-line results. So far, our approach in understanding the risk-based testing was based on the assumption that we are test- ing a new version of the existing product and that we are familiar with the basic functionalities and purpose of the product. What if it is a new product? What if all the risk indicators describe earlier can not be applied? In such cases, we execute Exploratory Testing by ex- ploring the use of the software within its overall en- vironment. A rough test should uncover all the critical functionalities, defect prone areas and few important failure situations. These features and areas can then be prioritized as described earlier. Risk Based Testing is an approach that requires skill and experience to isolate the most important tests on the basis of technical and business constraints. Risk based testing is a powerful testing technique that ena- bles the QA teams to streamline their testing efforts. Organizations that implement this technique are in a better knowhow of the risks that are inherent in their applications and of the risks that are actually signifi- cant. This knowledge is much helpful in exploiting the relationship between risk and testing efforts, thus, bringing an objectivity to the test designing and test management. It allows QA teams to make informed decisions while setting a clear test exit criteria. Risk Mitigation Optimized Risk Based Testing What if there is no prior Product Knowledge? Conclusion
  • 5. QA InfoTech5 Risk Based Testing - Deferring the right bugs About QA InfoTech QA InfoTech is a leading Software Quality Assurance and Testing company specializing in providing independ- ent , unbiased testing services to world class businesses. Through its wide range of services constituting of function- al testing, acceptance testing, localization testing, test au- tomation and performance testing, QA InfoTech has helped many Fortune 500 companies in creating and successfully executing their QA strategy. At QA InfoTech, we maintain a distinguished level of service which blends top quality with cost effective solutions. The forceful combination of our highly skilled Test Engineers, Domain Experts and our investment in latest technologies ensures a Wing to Wing Coverage for our client’s products. We bring together best practices and strategies to cater to the unique software testing needs. Established in 2003, with less than five testing experts, QA InfoTech has grown leaps and bounds with five QA Centers of Excellence in US and India, and more than 450 Testing engineers. Excellence, Partnership and Commitment are the three hall- marks of the way we approach our clients, we believe you will see this in our service and our expert team. Visit us at www.qainfotech.com Read our blog at www.qainfotech.com/blog All content / information present here is the exclusive property of QA InfoTech Pvt. Ltd. The content / information contained here is correct at the time of publishing. No material from here may be copied, modified, reproduced, republished, uploaded, transmitted, posted or distributed in any form without prior written permission from QA InfoTech. Unauthorized use of the content / information appearing here may violate copyright, trademark and other applicable laws, and could result in criminal or civil penalties. Copyright © 2009 QA InfoTech Pvt. Ltd. Contact us at info@qainfotech.com Follow us on Twitter at www.twitter.com/qainfotech Functional • Automated • Load • Localization End to End Testing Services Usability • Integration • Mobile • Security