Contingency Plan Research Paper

Decent Essays
Software testing, account testing and website testing is loaded with risks. If the worst happens, such as if a program goes rogue, if a program wrecks your hardware, if your information is stolen, and so forth, it is a good idea to have a few contingency plans. Your personal contingency plan should depend on your methods and the types of software you are testing. With that in mind, here are a few elements you may wish to enter into your contingency plans.

Burnable Email Addresses

The first piece of advice is an easy one, as a tester and as a hardcore Internet user, you should have more than one email address. You should have plenty, such as one for your social media accounts, one for work, one for testing only, one for friends and family,
…show more content…
Do not mix them with your personal or other working profiles because you may risk being hacked, spammed and/or you may attract retribution from the products you reviewed negatively.

Work Accounts, Personal Accounts And Contingency Accounts

Keep your work and personal accounts separate, which is common senses, and also try to isolate your contingency accounts from your work and personal accounts.

Contingency Online Accounts

For example, if you have a Google account or a PayPal account, you can set up numerous accounts if you wish. If your data and/or other accounts are hacked, you can quickly burn them and use your backups.

Reset-Ready Computers

If you are testing on a desktop device, you should be ready to reset it. Buy a computer that is reset ready, which means you wouldn’t lose anything if it were reset because of a virus, hack or rogue program.

Disposable Or Reset-Ready Phones

You should do the same for your phone as you do for your desktop device. The online difference is that if you are well funded enough, you may be able to dispose of your phone and get another. For example, if you root the device to test a piece of software and the software then makes your phone
…show more content…
You should probably do it every now and again, and especially before you test a piece of software and/or a new website and/or an account. When you reset your computer, it often alters all your settings and you have to spend a long time getting them back to the way you like them. If you save your settings on a hard drive, you may simply load them back up again.

Different And Varied Cloud Computing Accounts

Using cloud computing brings its own sets of pros and cons. For example, you may be less likely to damage your own hardware, but there are also other security issues to take into consideration. Nevertheless, if you can afford cloud computing, then you should try it, and you should consider numerous accounts with different companies to act as a backup.

Numerous Free Cloud Storage Accounts

The fact is that you can get free cloud storage accounts from a bunch of brand named suppliers, so why not use them for different testing projects, especially projects where files may be corrupted and/or changes may go unnoticed for months before a bug is found.

External Hard

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    The Pangu 9 jailbreak is now out for those of you running the latest iOS 9.0.2 software update. You can follow the guide for jailbreaking with Pangu 9 on every device that can run the iOS 9.0.2 firmware. You can catch that completely list available from the requirements section below. Those with anything under the iPhone 4S cannot follow this guide, just like they cannot update to any version of iOS 9. REQUIREMENTS…

    • 516 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 922 Words
    • 4 Pages

    MidTerm Exam Question 1 Cloud computing is open space where you can place all our music and videos at one place. We can listen to the music, play video games and watch videos from anywhere and not necessarily connect to the computer. So, after turning off computer we can listen to music and watch videos through other device. Question 2 (c)…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Webii review: Pros: • Excellent customer service • Instant exposure • User friendly control panel • Money back guarantee • Reliable Sun and Dell servers Cons: • Cannot create Freehand SQL reports • Burst publication • Overwhelming flood In 1996 Webii starts a new internet service, which carry web hosting industry from the high level of customer service. Then the services have grown to custom web development, website design, marketing services, search engine optimization and domain name registration.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A Strategic Analysis of Five9 BUS 477N-112 Fall 2014 Five9 is an innovator and leading supplier of cloud contact center software. The company’s highly accessible and secure Virtual Contact Center (VCC) cloud platform delivers an inclusive set of easy-to-use applications that enables both simultaneous management and the augmentation of consumer interaction across email, social media, web, voice, and mobile channels through application programming. This strategic analysis was produced with the purpose of thoroughly exploring the cloud contact center as an industry, classifying and analyzing both external and internal opportunities and threats, and establishing where the company stands in relation to their key competitors.…

    • 830 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Shred your documents. Don’t toss bank statements and credit card receipts in the trash. Dispose of them using a cross-cut shredder or shredding service. 2.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The 20th Air Support Operations Squadron (ASOS) does not have an official federal continuity plan in place. The federal continuity plan template incorporates four separate phases. Phase One: Readiness and Preparedness, Phase Two: Activation, Phase Three: Continuity Operations, Phase Four: Reconstitution Operations (FEMA 2013, p iii). Although the plan is optional, the framework of the Federal Plan Template goes in depth on how to accomplish all four phases.…

    • 422 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Advantages of Creating Office 365 Backup Creating backup of Office 365 data proves to be beneficial in many ways. Some of them are: • Data Availability When Offline Office 365 backup ensures data availability even if…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hsc301 Unit 1 Assignment

    • 1112 Words
    • 5 Pages

    Univ 1001 - Unit 1 - Discussion Forum - Maurice (Rese) Lewis - S111276 - 11/13/2016 Hello classmates and Instructor, My name is Maurice Lewis. I prefer to be called Rese. I hope to complete a Bachelor degree in Computer Science. I work full-time as a (Jr.) Oracle Database Administrator.…

    • 1112 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Taniesha Weaknesses

    • 139 Words
    • 1 Pages

    Strengths: Taniesha greets the client in a polite and a professional tone. After verification, Taniesha does a good job acknowledging the client's established account and provides the username on file. Taniesha further explains that the accounts are all linked under the same login. She helpfully provides the email address on the file and makes sure the client has access to reset the password.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Part 1 What is data compression? Data compression is where a file is made smaller by shortening code where it is similar. This is helpful when transmitting files over the net, or in general just saving space of a SSD or Normal Hard drive. Data compression comes in two forms: Lossless Compression: Lossless compression is where similar parts of a file, are compressed by their similarities, however, the frequency is recorded and can be uncompressed without losing any extra data.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The military is one of the largest organizations that utilizes the contingency approach because it's an efficient way to address problems. The book outlines one of the reasons to use the contingency approach is because "a particular management practice that worked today, may not work tomorrow"(Kinicki - Fugate 5). Based on my experiences in the United States Navy, I would say this reference sums up my entire Naval career. When you have that many people from different walks of life and serving around the world it isn't possible to manage using static approach to every problem. The benefits from using this tactics in my experience bring about successful missions, effective leadership, positive morale, organized plans, and growth in human/social…

    • 178 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Terroristic activity is not a new concept here in the United States or in other countries plagued with high political turmoil. Terrorism is defined as the meaningful attempt of a smaller group or individual behaving irrationally with sadistic ideals who try to inflict their ways of thinking on a larger group or population. In every instance of terrorism, the tactics of fear and intimidation are always utilized (Schmallenger & Hall, 2014, p. 402). Terrorist organizations look for large areas with a booming population.…

    • 1447 Words
    • 6 Pages
    Great Essays