Contingency Plan Research Paper

Decent Essays
Software testing, account testing and website testing is loaded with risks. If the worst happens, such as if a program goes rogue, if a program wrecks your hardware, if your information is stolen, and so forth, it is a good idea to have a few contingency plans. Your personal contingency plan should depend on your methods and the types of software you are testing. With that in mind, here are a few elements you may wish to enter into your contingency plans.

Burnable Email Addresses

The first piece of advice is an easy one, as a tester and as a hardcore Internet user, you should have more than one email address. You should have plenty, such as one for your social media accounts, one for work, one for testing only, one for friends and family,
…show more content…
Do not mix them with your personal or other working profiles because you may risk being hacked, spammed and/or you may attract retribution from the products you reviewed negatively.

Work Accounts, Personal Accounts And Contingency Accounts

Keep your work and personal accounts separate, which is common senses, and also try to isolate your contingency accounts from your work and personal accounts.

Contingency Online Accounts

For example, if you have a Google account or a PayPal account, you can set up numerous accounts if you wish. If your data and/or other accounts are hacked, you can quickly burn them and use your backups.

Reset-Ready Computers

If you are testing on a desktop device, you should be ready to reset it. Buy a computer that is reset ready, which means you wouldn’t lose anything if it were reset because of a virus, hack or rogue program.

Disposable Or Reset-Ready Phones

You should do the same for your phone as you do for your desktop device. The online difference is that if you are well funded enough, you may be able to dispose of your phone and get another. For example, if you root the device to test a piece of software and the software then makes your phone
…show more content…
You should probably do it every now and again, and especially before you test a piece of software and/or a new website and/or an account. When you reset your computer, it often alters all your settings and you have to spend a long time getting them back to the way you like them. If you save your settings on a hard drive, you may simply load them back up again.

Different And Varied Cloud Computing Accounts

Using cloud computing brings its own sets of pros and cons. For example, you may be less likely to damage your own hardware, but there are also other security issues to take into consideration. Nevertheless, if you can afford cloud computing, then you should try it, and you should consider numerous accounts with different companies to act as a backup.

Numerous Free Cloud Storage Accounts

The fact is that you can get free cloud storage accounts from a bunch of brand named suppliers, so why not use them for different testing projects, especially projects where files may be corrupted and/or changes may go unnoticed for months before a bug is found.

External Hard

Related Documents

  • Superior Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    A security feature should also be turned on that locks the user out if multiple incorrect attempts have been made to log into a particular station. Risks Although there are many benefits to requiring employees to create complex passwords, there are also some risks involved. Since complex passwords are long, employees may be tempted to write them down. The longer more complex passwords are also likely to be forgotten. This can cause the employee to frequently use the forgot password option or the need for the IT team to reset passwords.…

    • 2482 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    Social Media Frauds

    • 1274 Words
    • 5 Pages

    That’s the flaw in social media it’s there lack of security and massive databases that makes them easy targets. More data means more security if the companies were to realize that they would improve their websites user’s experience by decreasing their database by deleting conversation, photos, and post that users may have not wanted to be stored in the company’s database. We wouldn’t have to worry about cyber threats. With the current privacy polies that are in use today by many of the social media sites they not only threaten our individual privacy but also comprise our security in the real world and cyber world by signaling burglar’s when our homes our vacant and becoming victims to hackers by either financial hardship through credit card fraud or public embarrassment through sharing of an unwanted conversation or photo. This is why we need to be aware of our privacy and what information we allow others to view and always to think twice before posting because we never know when we might become a victim of social media…

    • 1274 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Sony Xperia Case Study

    • 996 Words
    • 4 Pages

    This allows you to browse/ play games without any disturbance on your android device You can also get the new Android features like slow motion video, NFC payments etc before they are released. Disadvantages Warranty for your phone will be void (no more valid) Your android device will be susceptible to malware and virus Rooting involves the risk of "bricking" your phone. To put it in simple terms a "bricked" phone is no better than carrying a brick in your…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hardware thieving defines stealing the computer hardware vandalism is when the computer equipment is being wrecked. To lower your chances of that happening you may want to put the hardware in a secure place, lock it up and protect your devices. Who are mainly at risk in this area, are organizations that house several computers, and people with mobile devices the size that makes it particularly simple to rob. Thieves usually shoot for notebooks of company executives, as they can get into confidential company information. So with that being said software or identity theft, can be connected with hardware theft.…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    This second program that I installed functions help when navigating the web due to the fact that it had real-time protection. Whenever you go on a site that can infect your computer it will stop it and you won’t be able to access it. This program also gives you the function to check your registry for any errors. Your computer files and whenever you plug an external device to the computer it will scan it to see if it’s infected or not. You will be able to get all of these services for free.…

    • 1638 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on.…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    I do not want to be tricked into going to a web site that could contain viruses or malware that can affect the functionality of my computer or worse, steal my personal information. I appreciate that they are attempting to make ads less intrusive. Experiencing the early days of the internet I remember web pages being crippled by pop up advertisements. Consumers should always have a choice in the way that consume ads. If an ad begins.…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It is because the payment can make using the credit card. It has a case fraudulent person gets hold of your credit card or account number, you may run the risk of being duped and cheated monetarily. Hence, it is advisable to the customer to purchase items from a particular website only after checking its privacy policy thoroughly and making sure that the portal is authentic and can be held accountable in case of discrepancies. User-friendliness and aesthetics are also missing in online shopping. It is because customers just make the order of the product through the website or phone call without face to face during buying the product.…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I would want to upgrade the systems’ server with a more up to date program which would probably be 2007 or 2012. If I had to choose which system I would use it would be Windows over any other, I find that windows would be more suitable for a business environment. Windows is used pretty much with almost every business , with using an updated version I think it would be better , because then you wouldn’t have any issues when it comes to opening up any documents due to it not being supported. Most systems outside of windows are open source which it is open basically for anyone to make changes to the system you place. I think if you have one person within your business and or IT department of your company they should be certified in order to fix things within the company verses having to contact someone from another source.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    They tend to completely destroy your Operating System and you can’t recover anything from them. These types of programs are created to make steal your information and destroy your computer at the same time. Getting anti-malware software that does real-time protection is the way to go. You will be able to protect your computer when you navigate the web and if malware tries to infect your computer, the software will catch it and remove it from your…

    • 1113 Words
    • 5 Pages
    Improved Essays