diff --git a/src/content/terms/Behaviour_driven_development.json b/src/content/terms/Behaviour_driven_development.json index a79e1480..85ca1393 100644 --- a/src/content/terms/Behaviour_driven_development.json +++ b/src/content/terms/Behaviour_driven_development.json @@ -1,6 +1,6 @@ { "title": "Behaviour Driven development (BDD)", - "subtext": "A software development approach where the application is designed by specifying its behavior through examples written in a human-readable format.", + "subtext": "A software development approach", "categories": ["Software Development", "Testing Methodologies", "Agile Methodologies"], "author": "Rilwan", "description": { diff --git a/src/content/terms/Decryption.json b/src/content/terms/Decryption.json index b33a5080..afd677ee 100644 --- a/src/content/terms/Decryption.json +++ b/src/content/terms/Decryption.json @@ -1,12 +1,12 @@ { "title": "Decryption", - "subtext": "The process of converting encrypted data back into its original form, making it readable again", + "subtext": "Conversion of encrypted data back into its original form", "categories": ["Cryptography", "Data Security", "Network Security"], "author": "Rilwan", "description": { "title": "Decryption", "texts": [ - "This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form.", + "This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form, making it readable again.", "For instance, 'bchgtiuythnhuiol' will be decrypted into 'I am beautiful' using the appropriate decryption key." ], "image": "https://usemynotes.com/wp-content/uploads/2021/03/what-is-decryption.jpg", diff --git a/src/content/terms/Dependency.json b/src/content/terms/Dependency.json index 759e0eec..20f97b4b 100644 --- a/src/content/terms/Dependency.json +++ b/src/content/terms/Dependency.json @@ -1,6 +1,6 @@ { "title": "Dependency", - "subtext": "A software component or library that another piece of software relies on to function properly", + "subtext": "A required software library or component that other software relies on", "categories": ["Software Development", "Package Management", "Build Systems"], "author": "Rilwan", "description": { @@ -10,7 +10,7 @@ "These dependencies often consist of multiple lines of code designed to perform repetitive or complex tasks efficiently.", "This packaged code can be installed and used by developers to achieve specific results. For example, `Express` in JavaScript and `Pillow` in Python." ], - "image": "https://phoenixnap.com/blog/wp-content/uploads/2024/01/what-are-software-dependencies.jpg", + "image": "", "references": [ "https://phoenixnap.com/blog/software-dependencies" ] diff --git a/src/content/terms/Encryption.json b/src/content/terms/Encryption.json index 0c06e91d..8a7dc1e7 100644 --- a/src/content/terms/Encryption.json +++ b/src/content/terms/Encryption.json @@ -1,6 +1,6 @@ { "title": "Encryption", - "subtext": "A method of converting plaintext into ciphertext to protect data from unauthorized access", + "subtext": "Converting plaintext into ciphertext to protect data from unauthorized access", "categories": ["Cryptography", "Data Security", "Network Security"], "author": "Rilwan", "description": { diff --git a/src/content/terms/SQL_injection.json b/src/content/terms/SQL_injection.json index f0e9a410..a1205ef3 100644 --- a/src/content/terms/SQL_injection.json +++ b/src/content/terms/SQL_injection.json @@ -1,16 +1,16 @@ { "title": "SQL Injection (SQLi)", - "subtext": "A security vulnerability that allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data", + "subtext": "A security vulnerability", "categories": ["Web Security", "Database Security", "Software Vulnerabilities"], "author": "Rilwan", "description": { "title": "SQL Injection (SQLi)", "texts": [ - "SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database.", + "SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database. It allows allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data", "It involves sending raw SQL statements instead of actual form data via the inputs in a web form or URL.", "This raw SQL statement is unknowingly received in the backend and used to query the database, revealing unauthorised data to the attacker." ], - "image": "https://cdn.hashnode.com/res/hashnode/image/upload/v1704899971801/80447ae3-883f-4af4-ae7d-ddf10accefb1.png?w=1600&h=840&fit=crop&crop=entropy&auto=compress,format&format=webp", + "image": "https://spanning.com/wp-content/uploads/2019/07/SQL-injection-attack-example.png", "references": [ "https://superbemiloju.hashnode.dev/protecting-your-data-understanding-sql-injection-and-prevention" ]