Delivered by FeedBurner

Security testing is the most important testing type for finding vulnerability in the web site. Now a day’s Online transaction have taken place for each web site so security testing is the major activity which needs to be perform in testing phase of software testing life cycle. To gain the trust of customers towards web sites, security confirmation is given positive direction. Detail description of security is explained below.

Security Testing Approach

1. What is Security Testing?
  • Security testing itself explain that how can we protect our personal data by hacking, code damage or unauthorized user.
  • Security testing is the process that determines the personal data needs to be stay protected. Data which is not meant to share and discussed to other user that would not be allowed to explore and user must be able to do those task which is authorized to them only. No other operation should be allowed to perform with saved and protected data.
  • For example, if some website have their own key for Login functionally. Without that Key unauthorized user can work on this site by hijacking. This is the big vulnerability of that site. 
  • Also we can take an example for Bank Networking systems.
  • By testing a security, we can find the loopholes in application and after solving them we can protect our data. The main goal of security testing is the system reaction when unauthorized operation have been performed and how to prevent them to access data.
  • System analysis can perform a major part here. We must have system knowledge before we have start security testing.

  • LinkedHashMap class is one of the class of map interface which extends HashMap class and implements Map interface.
  • It is combination of linked list and Hash table implementation of the Map interface and that's why it is called LinkedHashMap.
  • It is maintaining doubly-linked list insertion order in which keys were inserted into the map.
  • It allows to store null elements and optional Map operations are also available.
  • It is non synchronized implementation so if any thread modifies map structurally when map is accessed by multiple threads then it must be synchronized externally.