Security testing, after social investigation, most malicious attacks focus on illegal requests. Illegal people carry out system attacks by falsifying malicious urls and entering the service-side system directly. Testing through the simulation of malicious requests made by illegal personnel, forged url to see if it can be smooth request channel service side, but also by simulating malicious submission to check whether the system's data filtering method is well applied within the system. With these simple, basic testing methods, you can know exactly the level of security of your current system. The security test of the product subsystem covers the main items and results of security testing, test cases simulate many typical ways of malicious attacks, including SQL, xSS, head CLRF and other injection methods, jump vulnerabilities, INFO vulnerabilities, forged requests and other aspects of testing. The test results show that all malicious requests fail, have a certain fighting power for the industry's mainstream security vulnerability product subsystems, and have fully achieved the desired set test objectives.<br>Through functional testing, show that the product subsystem has completed all the expected development needs, completed all the objectives of the requirements analysis, and can be developed in accordance with industry norms, in strict accordance with the company's software development into development, with a good user experience and a beautiful interface.<br>Through compatibility testing, to show that the product subsystem in the current mainstream browser kernel on the product subsystem can be normal display and use the basic functions of viewing transactions, in each browser page to show normal, there is no serious incompatibility phenomenon, has reached the goal of compatibility.<br>Through system performance testing, it is demonstrated that the product subsystem can achieve the level of 1000TPS throughput under the best conditions of hardware and network, and that 90% response time is not more than 1000 milliseconds, and that the server utilization rate has reached the expected target and is fully capable of meeting the high traffic concurrency requirements, proving that the product subsystem has reached the desired performance target.
正在翻译中..