Frontend "Testing" - jastit00/IT-Sec-Projekt GitHub Wiki

Author: Michaja

Description of user input and the expected results

1. Open the dashboard

Input: The user enters the URL in the browser.

Expectation: The application is loaded and displays the login page (or the dashboard if you are already logged in).

Result: correct

2. Log in

Input: The user enters the login data.

Expectation: Login successful and redirection to dashboard 1 (on which 4 of the diagrams or the table are displayed, including the number of critical events in the navigation bar).

Result: correct

3. Display of dashboard

Input: The user clicks on the title "Security Event Detection" or the "Dashboard" button in the navigation bar.

Expectation: The dashboard is displayed (as descripted in 2. Log in).

Result: correct

4. Display all events

Input: The user clicks on the "All Events" button in the navigation bar.

Expectation: A table of all events is displayed (with timestamp, event type, status, IP addresses and event details). A search bar, filter options and sorting options (date ascending or descending) are also displayed above the table.

Result: correct

5. Search all events

Input: A search term is entered.

Expectation: Only the results of the search term are displayed immediately (without pressing Enter).

Result: correct

6. Filter all events

Input: An entry is selected in the “Sort by” menu.

Expectation: Only the results of the filter option are displayed.

Result: correct

7. Sort all events

Input: An entry is selected in the “Order by” menu.

Expectation: The results are displayed in the corresponding order (sorted by date).

Result: correct

8. Display critical events

Input: The user clicks on the “Critical Events” button in the navigation bar.

Expectation: A table of critical events is displayed (with the same structure as the table of all events).

Result: correct

9. Upload files

Input: The user clicks on the “Upload File” button in the navigation bar.

Expectation: A file upload window opens in which the user can select one or more log files.

Input: The user selects one or more files and clicks on “Upload”.

Expectation: If the selected file(s) have not already been uploaded, they will be uploaded and a pop-up with ID, status, file name, created DB entries and number of security incidents (with categorization) will appear. If the selected file(s) have already been uploaded, the following error message appears: “Error: This file was already uploaded.”

Result: correct

10. Display different dashboards

Input: The user moves the mouse pointer to the "Dashboard" button in the navigation bar and then to one of the 3 dashboards in the submenu.

Expectation: The corresponding dashboard is loaded with the associated diagrams and checkboxes appear next to the submenu to show which diagrams have been selected.

Result: correct

11 Configure diagrams

Input: The user clicks on the cogwheel symbol of a diagram, changes the parameters and confirms with "Submit".

Expectation: The corresponding diagram is adjusted accordingly with the new parameter values.

Result: correct

12. Configure the parameters of the security incidents

Input: The user clicks on the cogwheel symbol in the navigation bar, changes the parameters and confirms with "Change Settings".

Expectation: The diagrams are adjusted accordingly if required.

Result: correct

13. Log out

Input: The user clicks on the "Logout" button in the navigation bar.

Expectation: The user is logged out and redirected to the login page.

Result: correct