Information Technology Reference
In-Depth Information
(e.g., intranet) and some part of the system is outside the firewall. Because most of
the systems nowadays are at least partly over the Internet, security issues are para-
mount. Elaborate security mechanisms should be provided in the system to prevent
hacking, unauthorized access, phishing (a process of impersonating an authentic
user and stealing financial information about somebody from a Web site using
stolen personal information), and so on.
Most organizations have legacy as well as new systems implemented. Similarly the
organizations may have many systems implemented at their premises. All these hetero-
geneous systems should be properly integrated, and so one aspect of enterprise applica-
tion testing is testing whether integration with other applications is working properly.
So you, as a testing professional, need to test for many aspects of the application
like integration, security, functionality, and performance.
Functionality of the system for different versions is different. So you also need
to do regression testing to ensure that the new components added in new versions
have not affected functionality of existing components and that component fea-
tures work as defined in the requirement document. Similarly, in the same compo-
nents, if new features have been added, then check to ensure that old features are
working as expected.
Once the system is fully developed, it has to be tested in its entirety. For this,
pre-UAT (pre-user acceptance testing, also called system testing) and finally UAT
testing have to be done.
In essence, enterprise systems are large and complex and have a large function-
ality. Testing of these systems requires prior experience and knowledge.
2.. Enterprise System Types
2.4.1 Banking, Finance, Insurance,
and Securities (BFSI) Systems
Out of all enterprise systems, BFSI systems are the most prevalent and widely used.
By their very nature, software systems are the most useful tools for BFSI compa-
nies. BFSI systems crucially depend on calculation, creation, and collection of data
from many sources. They are transaction intensive and need security to ensure that
transaction data is not going to any unauthorized source.
BFSI enterprise systems need to be tested for transaction integrity, secure access,
and integration capability for integration with other systems.
2.4.2 Enterprise Resource Planning (ERP) Systems
ERP systems are the biggest software applications, comprising many subapplica-
tions for areas covering finance, supply chain management (SCM), manufactur-
ing, customer relationship management (CRM), project management, supplier
Search WWH ::




Custom Search