-
Notifications
You must be signed in to change notification settings - Fork 64
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
cc51a64
commit 4e5901d
Showing
7 changed files
with
124 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"title": "Behaviour Driven development (BDD)", | ||
"subtext": "A software development approach where the application is designed by specifying its behavior through examples written in a human-readable format.", | ||
"categories": ["Software Development", "Testing Methodologies", "Agile Methodologies"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Behaviour Driven development (BDD)", | ||
"texts": [ | ||
"BDD is a practise in software development that ensures a software satisfies the needs of its end-users.", | ||
"In other words, BDD is a practice in software development that ensures software meets the needs of its end-users by defining and understanding system behaviour through user-centric scenarios.", | ||
"The major aim of BDD is to streamline the development process to align with the user needs." | ||
], | ||
"image": "https://media.geeksforgeeks.org/wp-content/uploads/20240613150124/Behavior-Driven-Development-bDD-Life-Cycle.webp", | ||
"references": [ | ||
"https://www.geeksforgeeks.org/behavioral-driven-development-bdd-in-software-engineering/" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"title": "Code refactoring", | ||
"subtext": "Improving the internal structure of code without altering its external behavior" , | ||
"categories": ["Software Development", "Code Maintenance", "Software Design"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Code refactoring", | ||
"texts": [ | ||
"Code refactoring is the process of editing and fine-tuning the source code of a software without changing or affecting its functionality.", | ||
"This concept is aimed at ensuring a well written source code that is easy to read and flexible enough for collaborations." | ||
], | ||
"image": "https://www.techtarget.com/rms/onlineimages/code_refactoring_process-f.png", | ||
"references": [ | ||
"https://www.techtarget.com/searchapparchitecture/definition/refactoring" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"title": "Decryption", | ||
"subtext": "The process of converting encrypted data back into its original form, making it readable again", | ||
"categories": ["Cryptography", "Data Security", "Network Security"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Decryption", | ||
"texts": [ | ||
"This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form.", | ||
"For instance, 'bchgtiuythnhuiol' will be decrypted into 'I am beautiful' using the appropriate decryption key." | ||
], | ||
"image": "https://usemynotes.com/wp-content/uploads/2021/03/what-is-decryption.jpg", | ||
"references": [ | ||
"https://usemynotes.com/what-is-encryption-and-decryption-techniques/" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"title": "Dependency", | ||
"subtext": "A software component or library that another piece of software relies on to function properly", | ||
"categories": ["Software Development", "Package Management", "Build Systems"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Dependency", | ||
"texts": [ | ||
"A dependency, also known as a package, is a collection of code functions or modules packaged as a single unit of code.", | ||
"These dependencies often consist of multiple lines of code designed to perform repetitive or complex tasks efficiently.", | ||
"This packaged code can be installed and used by developers to achieve specific results. For example, `Express` in JavaScript and `Pillow` in Python." | ||
], | ||
"image": "https://phoenixnap.com/blog/wp-content/uploads/2024/01/what-are-software-dependencies.jpg", | ||
"references": [ | ||
"https://phoenixnap.com/blog/software-dependencies" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"title": "Encryption", | ||
"subtext": "A method of converting plaintext into ciphertext to protect data from unauthorized access", | ||
"categories": ["Cryptography", "Data Security", "Network Security"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Encryption", | ||
"texts": [ | ||
"Encryption is a process that uses algorithms and keys to conceal a file, text, or any other content. It is widely used to securely transfer data or messages between two or more parties.", | ||
"When data is encrypted, it is transformed into an unreadable format using an algorithm ensuring that even if it is intercepted, it cannot be understood without the proper decryption key.", | ||
"For example, a message like 'I am beautiful' could be encrypted into a string such as 'bchgtiuythnhuiol'." | ||
], | ||
"image": "https://upload.wikimedia.org/wikipedia/commons/thumb/7/70/Public_key_encryption_keys.svg/300px-Public_key_encryption_keys.svg.png", | ||
"references": [ | ||
"https://www.fortinet.com/resources/cyberglossary/encryption" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"title": "Hashing", | ||
"subtext": "A data security algorithm", | ||
"categories": ["Cryptography", "Data Security", "Data Structures"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "Hashing", | ||
"texts": [ | ||
"Hashing is a one-way process of converting plain text, files, or any digital content into a hashed value.", | ||
"This hashed value is a fixed-length string of characters that appears random and lacks coherent meaning", | ||
"For example, the hashed value of the phrase 'I love Python' might look like '&5668?+#@/)(:;!'" | ||
], | ||
"image": "https://www.techtarget.com/rms/onlineimages/sqlserver-hash_table_example-f.png", | ||
"references": [ | ||
"https://www.techtarget.com/searchdatamanagement/definition/hashing" | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"title": "SQL Injection (SQLi)", | ||
"subtext": "A security vulnerability that allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data", | ||
"categories": ["Web Security", "Database Security", "Software Vulnerabilities"], | ||
"author": "Rilwan", | ||
"description": { | ||
"title": "SQL Injection (SQLi)", | ||
"texts": [ | ||
"SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database.", | ||
"It involves sending raw SQL statements instead of actual form data via the inputs in a web form or URL.", | ||
"This raw SQL statement is unknowingly received in the backend and used to query the database, revealing unauthorised data to the attacker." | ||
], | ||
"image": "https://cdn.hashnode.com/res/hashnode/image/upload/v1704899971801/80447ae3-883f-4af4-ae7d-ddf10accefb1.png?w=1600&h=840&fit=crop&crop=entropy&auto=compress,format&format=webp", | ||
"references": [ | ||
"https://superbemiloju.hashnode.dev/protecting-your-data-understanding-sql-injection-and-prevention" | ||
] | ||
} | ||
} |