Spiral Model in SDLC

In the Spiral model, the software product is developed in small modules. Let us consider the figure shown below in developing a software product X. X is built by integrating A, B, C and D.   Ra- requirements analysis of module A. Similarly with Rb, Rc, Rd. Da – design of module A. Similarly with... Continue Reading →

Waterfall Model in SDLC

It is a traditional model It is a sequential design process, often used in SDLC, in which the progress is seen as flowing steadily downwards (like a waterfall), through the different phases as shown in the figure,   Requirements Collection:- - done by Business Analysts and Product Analysts - gathering requirements - translates business language... Continue Reading →

WannaCry

WannaCry was one of the deadliest ransomware attacks happened on the computer systems. If we look at Google Trends, we can see the same appearing in the worldwide trend result. It is time to take a deep dive to understand the subject. WannaCry can be defined as a ransomware class of worm malware. Let's break... Continue Reading →

Software Development Life Cycle

It is a process or procedure to develop a software or you can say it is a kind of methodology a developer is using to build a software. So as a software tester we also have to understand this process. Different procedures/models are available to develop a software namely:- Waterfall Model Spiral Model V-Model /... Continue Reading →

This is the second phase in Penetration Testing after reconnaissance phase. This is a pre-attack phase that helps in identifying hosts which are running with exploitable services and exposed critical data. The main idea is behind this phase is to determine vulnerabilities which can enable us with the access of the system. There are challenges... Continue Reading →

Reconnaissance

This is the very first step in the penetration testing process. This involves gathering information and intelligence which can be utilised in further steps of pen testing. The data collected are correlated and helps in setting up a better plan for attacking or evaluating assigned systems/applications. This can be carried out in two modes which... Continue Reading →

Penetration Testing

Penetration Testing (PenTest) is one of the most crucial processes followed by almost all organizations to unearth any hidden vulnerabilities either present in the systems or applications. It involves breaking the system and reporting any issues found to concerned operation team to fix. This helps organizations to enhance their security posture and reduce the attack... Continue Reading →

Hey All, Hope all of you are doing well !! Since a few weeks, I was thinking to start a blog where I can share my learning with my peers so that we can make a better ecosystem for knowledge sharing. I have planned to invite my fellow colleagues who can contribute to this endeavour... Continue Reading →

Website Powered by WordPress.com.

Up ↑