<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hansika Herath</title>
    <description>The latest articles on DEV Community by Hansika Herath (@hansikaherath).</description>
    <link>https://dev.to/hansikaherath</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F510214%2F5e5f32db-2360-4f7a-96f3-89839ea886a1.jpeg</url>
      <title>DEV Community: Hansika Herath</title>
      <link>https://dev.to/hansikaherath</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hansikaherath"/>
    <language>en</language>
    <item>
      <title>Ethical Hacking</title>
      <dc:creator>Hansika Herath</dc:creator>
      <pubDate>Sun, 30 May 2021 04:54:34 +0000</pubDate>
      <link>https://dev.to/hansikaherath/ethical-hacking-2lmh</link>
      <guid>https://dev.to/hansikaherath/ethical-hacking-2lmh</guid>
      <description>&lt;p&gt;🔘What is ethical hacking?&lt;/p&gt;

&lt;p&gt;Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization’s defenses. It involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal.&lt;/p&gt;

&lt;p&gt;Ethical hackers improve the security posture of an organization. Ethical hackers use the same tools, tricks, and techniques that malicious hackers used, but with the permission of the authorized person. The purpose of ethical hacking is to improve the security and to defend the systems from attacks by malicious users.&lt;/p&gt;

&lt;p&gt;Ethical hackers are often referred to as white-hat hackers. Ethical hackers learn and perform hacking in a professional manner and they are hired by organizations to look into the vulnerabilities of their systems and networks and develop solutions to prevent data breaches.&lt;br&gt;
Types of ethical hacking&lt;/p&gt;

&lt;p&gt;We can define hacking into different categories, based on what is being hacked:&lt;br&gt;
· Web application hacking&lt;br&gt;
· Social engineering&lt;br&gt;
· System hacking&lt;br&gt;
· Hacking wireless networks&lt;br&gt;
· Web server hacking&lt;/p&gt;

&lt;p&gt;🔘The process of ethical hacking&lt;/p&gt;

&lt;p&gt;There is a six-step process that is usually performed by ethical hackers in ethical hacking.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--B82S0l8s--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5lslheiwe5ozentmk5n1.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--B82S0l8s--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5lslheiwe5ozentmk5n1.jpg" alt="Six phrases of ethical hacking"&gt;&lt;/a&gt;&lt;br&gt;
▪ Reconnaissance&lt;br&gt;
It is the principal stage. Here the white-hat hacker attempts to gather information about the objective. It incorporates Identifying the Target, discovering the objective’s IP Address Range, DNS records, Network, and so on.&lt;/p&gt;

&lt;p&gt;▪ Scanning&lt;br&gt;
In the stage of scanning, the hacker starts to effectively test an objective machine or organization for weaknesses that can be abused.&lt;/p&gt;

&lt;p&gt;▪ Gaining Access&lt;br&gt;
In this stage, the hacker plans the outline of the organization of the objective and concludes that they have a few alternatives to access the organization.&lt;/p&gt;

&lt;p&gt;▪ Maintaining Access&lt;br&gt;
In this stage, the hacker has effectively gotten entrance into a framework and introduces a few secondary passages to go into the framework when he needs access in this possessed framework in the future.&lt;/p&gt;

&lt;p&gt;▪ Clearing Track&lt;br&gt;
In this stage, hackers clear their track. This step ensures that the attackers leave no clues or evidence behind that could be traced back.&lt;/p&gt;

&lt;p&gt;▪ Reporting&lt;br&gt;
In this last stage of the process, the ethical hacker create a report on the findings like weaknesses found in the system and the work that was done.&lt;/p&gt;

&lt;p&gt;🔘There are some limitations of ethical hacking=&amp;gt;&lt;/p&gt;

&lt;p&gt;💫Limited scope. Ethical hackers cannot progress beyond a defined scope to make an attack successful. However, it’s not unreasonable to discuss out of scope attack potential with the organization.&lt;/p&gt;

&lt;p&gt;💫Resource constraints. Malicious hackers don’t have time constraints that ethical hackers often face. Computing power and budget are additional constraints of ethical hackers.&lt;/p&gt;

&lt;p&gt;💫Restricted methods. Some organizations ask experts to avoid test cases that lead the servers to crash (e.g., Denial of Service (DoS) attacks).&lt;/p&gt;

&lt;p&gt;🔘Benefits of ethical hacking&lt;/p&gt;

&lt;p&gt;▪ Implementing a secure computer network that prevents security breaches.&lt;br&gt;
▪ Discovering vulnerabilities from an attacker’s point of view, so that weak points can be fixed.&lt;br&gt;
▪ Helps in taking preventive actions against hackers.&lt;br&gt;
▪ Helps in building a system which prevents any kinds of penetration by hackers.&lt;br&gt;
▪ Gaining the trust of customers and investors by ensuring the security of their products and data.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---ZQwrtk0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/alo2vzd70wfrjzqq6uo1.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---ZQwrtk0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/alo2vzd70wfrjzqq6uo1.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thank you very much for reading. Hope you get an idea about Ethical hacking.&lt;/p&gt;

</description>
      <category>ethics</category>
      <category>cybersecurity</category>
      <category>ethicalhacking</category>
    </item>
    <item>
      <title>SDLC Methods and Their Advantages &amp; Disadvantages.</title>
      <dc:creator>Hansika Herath</dc:creator>
      <pubDate>Fri, 20 Nov 2020 07:37:34 +0000</pubDate>
      <link>https://dev.to/hansikaherath/sdlc-methods-and-their-advantages-disadvantages-15d5</link>
      <guid>https://dev.to/hansikaherath/sdlc-methods-and-their-advantages-disadvantages-15d5</guid>
      <description>&lt;p&gt;What is SDLC?&lt;/p&gt;

&lt;p&gt;SDLC Stands for Software Development Life Cycle. SDLC is a process used by the software industry to design, develop, and maintain the quality of software. This framework defining tasks containing 6 steps. The SDLC aims to produce high-quality software that reaches customer expectations, with completion within times and lower cost.&lt;/p&gt;

&lt;p&gt;The following shows a graphical representation of the stages of SDLC.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fo8jblsw4fyp1d65wfml4.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fo8jblsw4fyp1d65wfml4.jpg" alt="SDLC"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's look at SDLS Methodologies&lt;/p&gt;

&lt;p&gt;⚫Waterfall Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fu1y7n3in07z80xebi3v9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fu1y7n3in07z80xebi3v9.jpg" alt="waterfall model"&gt;&lt;/a&gt;&lt;br&gt;
  This is a linear sequential flow. Progress is seen as flowing steadily downwards (like a waterfall) through the phases of software implementation. This means any phase in the development process begins only if the previous phase is complete. The waterfall approach is most widely known that was used for software development.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fdvptaswhuhy9hi3gr5td.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fdvptaswhuhy9hi3gr5td.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚫V-Shaped Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fwbefglyfhdbv6bllzapc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fwbefglyfhdbv6bllzapc.png" alt="v-shaoed model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mainly V-shaped model planning the early test. In this model,  Software requirements clearly defined and known.&lt;br&gt;
Software development technologies and tools are also well-known.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fi7x12u7h1y32b2qfhvwc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fi7x12u7h1y32b2qfhvwc.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚫Prototyping Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvyh7vqcs25igb9kj3d8m.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fvyh7vqcs25igb9kj3d8m.jpg" alt="Prototype model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This method is to create prototypes of software applications which can occur in software development and It used to visualize some component of the software to limit the gap of misunderstanding the customer requirements. It has some types, such as:&lt;br&gt;
          Throwaway prototyping&lt;br&gt;
          Evolutionary prototyping&lt;br&gt;
          Incremental prototyping&lt;br&gt;
          Extreme prototyping&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fz72rp9ihbyncl5ngtt87.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fz72rp9ihbyncl5ngtt87.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚫Spiral Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fy1mj7zbhoe29wtihlosw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fy1mj7zbhoe29wtihlosw.png" alt="Spiral model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The spiral model is used for large, expensive, and complicated projects. This model uses many of the same phases as the waterfall model shown in the figure.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F553mmwvtehjgfej9z2ar.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F553mmwvtehjgfej9z2ar.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚫Iterative and Incremental Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4wevlwcmvfn9atlsm76j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4wevlwcmvfn9atlsm76j.png" alt="Iterative model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This model starts with initial planning and ends with deployment with the cyclic interactions in between. Basically, this method is to develop a system through repeated cycles (iterative) and in smaller portions at a time (incremental), From that software developers can take advantage of what was learned during the development earlier.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fl2niklrryw2cmnco8oqw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fl2niklrryw2cmnco8oqw.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚫Agile Model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fnvjha2o7de4cq5w89hz0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fnvjha2o7de4cq5w89hz0.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is based on iterative and incremental development. It can be used with any type of project. Also, we can use it when the customer needs to have some functional requirements and the requirements are not clear enough.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fiiko3lyjsa0l3tfm8c36.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fiiko3lyjsa0l3tfm8c36.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sdlc</category>
      <category>sdlcmethods</category>
      <category>softwareenginnering</category>
    </item>
  </channel>
</rss>
