Skip to content

Commit

Permalink
fix(issue #155): added new terms
Browse files Browse the repository at this point in the history
  • Loading branch information
Omotunde2005 committed Oct 6, 2024
1 parent cc51a64 commit 4e5901d
Show file tree
Hide file tree
Showing 7 changed files with 124 additions and 0 deletions.
18 changes: 18 additions & 0 deletions src/content/terms/Behaviour_driven_development.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
{
"title": "Behaviour Driven development (BDD)",
"subtext": "A software development approach where the application is designed by specifying its behavior through examples written in a human-readable format.",
"categories": ["Software Development", "Testing Methodologies", "Agile Methodologies"],
"author": "Rilwan",
"description": {
"title": "Behaviour Driven development (BDD)",
"texts": [
"BDD is a practise in software development that ensures a software satisfies the needs of its end-users.",
"In other words, BDD is a practice in software development that ensures software meets the needs of its end-users by defining and understanding system behaviour through user-centric scenarios.",
"The major aim of BDD is to streamline the development process to align with the user needs."
],
"image": "https://media.geeksforgeeks.org/wp-content/uploads/20240613150124/Behavior-Driven-Development-bDD-Life-Cycle.webp",
"references": [
"https://www.geeksforgeeks.org/behavioral-driven-development-bdd-in-software-engineering/"
]
}
}
17 changes: 17 additions & 0 deletions src/content/terms/Code_refactoring.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
{
"title": "Code refactoring",
"subtext": "Improving the internal structure of code without altering its external behavior" ,
"categories": ["Software Development", "Code Maintenance", "Software Design"],
"author": "Rilwan",
"description": {
"title": "Code refactoring",
"texts": [
"Code refactoring is the process of editing and fine-tuning the source code of a software without changing or affecting its functionality.",
"This concept is aimed at ensuring a well written source code that is easy to read and flexible enough for collaborations."
],
"image": "https://www.techtarget.com/rms/onlineimages/code_refactoring_process-f.png",
"references": [
"https://www.techtarget.com/searchapparchitecture/definition/refactoring"
]
}
}
17 changes: 17 additions & 0 deletions src/content/terms/Decryption.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
{
"title": "Decryption",
"subtext": "The process of converting encrypted data back into its original form, making it readable again",
"categories": ["Cryptography", "Data Security", "Network Security"],
"author": "Rilwan",
"description": {
"title": "Decryption",
"texts": [
"This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form.",
"For instance, 'bchgtiuythnhuiol' will be decrypted into 'I am beautiful' using the appropriate decryption key."
],
"image": "https://usemynotes.com/wp-content/uploads/2021/03/what-is-decryption.jpg",
"references": [
"https://usemynotes.com/what-is-encryption-and-decryption-techniques/"
]
}
}
18 changes: 18 additions & 0 deletions src/content/terms/Dependency.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
{
"title": "Dependency",
"subtext": "A software component or library that another piece of software relies on to function properly",
"categories": ["Software Development", "Package Management", "Build Systems"],
"author": "Rilwan",
"description": {
"title": "Dependency",
"texts": [
"A dependency, also known as a package, is a collection of code functions or modules packaged as a single unit of code.",
"These dependencies often consist of multiple lines of code designed to perform repetitive or complex tasks efficiently.",
"This packaged code can be installed and used by developers to achieve specific results. For example, `Express` in JavaScript and `Pillow` in Python."
],
"image": "https://phoenixnap.com/blog/wp-content/uploads/2024/01/what-are-software-dependencies.jpg",
"references": [
"https://phoenixnap.com/blog/software-dependencies"
]
}
}
18 changes: 18 additions & 0 deletions src/content/terms/Encryption.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
{
"title": "Encryption",
"subtext": "A method of converting plaintext into ciphertext to protect data from unauthorized access",
"categories": ["Cryptography", "Data Security", "Network Security"],
"author": "Rilwan",
"description": {
"title": "Encryption",
"texts": [
"Encryption is a process that uses algorithms and keys to conceal a file, text, or any other content. It is widely used to securely transfer data or messages between two or more parties.",
"When data is encrypted, it is transformed into an unreadable format using an algorithm ensuring that even if it is intercepted, it cannot be understood without the proper decryption key.",
"For example, a message like 'I am beautiful' could be encrypted into a string such as 'bchgtiuythnhuiol'."
],
"image": "https://upload.wikimedia.org/wikipedia/commons/thumb/7/70/Public_key_encryption_keys.svg/300px-Public_key_encryption_keys.svg.png",
"references": [
"https://www.fortinet.com/resources/cyberglossary/encryption"
]
}
}
18 changes: 18 additions & 0 deletions src/content/terms/Hashing.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
{
"title": "Hashing",
"subtext": "A data security algorithm",
"categories": ["Cryptography", "Data Security", "Data Structures"],
"author": "Rilwan",
"description": {
"title": "Hashing",
"texts": [
"Hashing is a one-way process of converting plain text, files, or any digital content into a hashed value.",
"This hashed value is a fixed-length string of characters that appears random and lacks coherent meaning",
"For example, the hashed value of the phrase 'I love Python' might look like '&5668?+#@/)(:;!'"
],
"image": "https://www.techtarget.com/rms/onlineimages/sqlserver-hash_table_example-f.png",
"references": [
"https://www.techtarget.com/searchdatamanagement/definition/hashing"
]
}
}
18 changes: 18 additions & 0 deletions src/content/terms/SQL_injection.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
{
"title": "SQL Injection (SQLi)",
"subtext": "A security vulnerability that allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data",
"categories": ["Web Security", "Database Security", "Software Vulnerabilities"],
"author": "Rilwan",
"description": {
"title": "SQL Injection (SQLi)",
"texts": [
"SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database.",
"It involves sending raw SQL statements instead of actual form data via the inputs in a web form or URL.",
"This raw SQL statement is unknowingly received in the backend and used to query the database, revealing unauthorised data to the attacker."
],
"image": "https://cdn.hashnode.com/res/hashnode/image/upload/v1704899971801/80447ae3-883f-4af4-ae7d-ddf10accefb1.png?w=1600&h=840&fit=crop&crop=entropy&auto=compress,format&format=webp",
"references": [
"https://superbemiloju.hashnode.dev/protecting-your-data-understanding-sql-injection-and-prevention"
]
}
}

0 comments on commit 4e5901d

Please sign in to comment.