An organizational improvement model that serves as a roadmap for initiating, planning, and implementing improvement actions. The IDEAL model is named for the five phases it describes: initiating, diagnosing, establishing, acting, and learning.
incident management tool
incremental development model
independence of testing
A path that cannot be exercised by any set of possible input values.
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
See Also: IDEAL
The phase within the IDEAL model where the groundwork is laid for a successful improvement effort. The initiating phase consists of the activities: set context, build sponsorship and charter infrastructure.
See Also: domain
The set from which valid input values can be selected.
A security threat originating from within the organization, often by an authorized system user.
Testing performed by people who are co-located with the project team but are not fellow employees.
Ref: ISO 9126 . See Also: portability
The capability of the software product to be installed in a specified environment.
See Also: portability testing
Testing the installability of a software product.
Supplied software on any suitable media, which leads the installer through the installation process. It normally
runs the installation process, provides feedback on installation results, and prompts for options.
The insertion of additional code into the program in order to collect information about program behavior during
execution, e.g., for measuring code coverage.
Synonyms: program instrumenter
A software tool used to carry out instrumentation.
See Also: smoke test
A special instance of a smoke test to decide if the component or system is ready for detailed and further testing. An intake test is typically carried out at the start of the test execution phase.
intrusion detection system (IDS)
See Also: malware scanning
A system which monitors activities on the 7 layers of the OSI model from network to application level, to detect violations of the security policy.
Testing of individual components in isolation from surrounding components, with surrounding components being simulated by stubs and drivers, if needed.
iterative development model