<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ndong Henry Ndang </title>
    <description>The latest articles on DEV Community by Ndong Henry Ndang  (@ndong21).</description>
    <link>https://dev.to/ndong21</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1047721%2F13efa100-407c-496b-9e16-e3263f1cb33a.jpg</url>
      <title>DEV Community: Ndong Henry Ndang </title>
      <link>https://dev.to/ndong21</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ndong21"/>
    <language>en</language>
    <item>
      <title>Technology and security,</title>
      <dc:creator>Ndong Henry Ndang </dc:creator>
      <pubDate>Mon, 27 Mar 2023 16:26:08 +0000</pubDate>
      <link>https://dev.to/ndong21/technology-and-security-4jo</link>
      <guid>https://dev.to/ndong21/technology-and-security-4jo</guid>
      <description>&lt;p&gt;What's the role of software engineers in network security methods like cryptography? &lt;/p&gt;

</description>
      <category>discuss</category>
      <category>programming</category>
      <category>cybersecurity</category>
      <category>algorithms</category>
    </item>
    <item>
      <title>GRYPTOGRAPHY</title>
      <dc:creator>Ndong Henry Ndang </dc:creator>
      <pubDate>Mon, 27 Mar 2023 06:06:52 +0000</pubDate>
      <link>https://dev.to/ndong21/gryptography-2gcf</link>
      <guid>https://dev.to/ndong21/gryptography-2gcf</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
Institutions, companies, the government and even individuals spent so much time, resources and money to protect their data from attackers and from being accessed by unauthorized persons which could use it for malicious purposes or alter it before it reaches its final destination. This is because as the internet continue to grow, communication and information sharing becomes very efficient and easy likewise so much data is continuously transmitted over the internet where there is little or no security hence can easily be accessed by attackers and hackers. Therefore protecting data being stored or transmitted over the internet has become a major priority for many. In this article we would take a look at cryptography, a  method to ensure digital security, cryptanalysis, an attempt by hackers which study techniques used to break security systems and cryptology, the science that study network security&lt;br&gt;
&lt;strong&gt;What is cryptography&lt;/strong&gt;&lt;br&gt;
It was the formation of the first computer network that started people thinking about the importance of securing data.  This is because there was communication between computers over the open internet, that sort of network was transformative in many great ways but also made it trivially easy to access data travelling across the internet by hackers and financial services being an early use case for computers, it was very necessary to keep information transmitted over the internet secret. Due to the need to secure data transmitted over the internet, network security experts made use of cryptograghy.Gryptography comes from two word &lt;strong&gt;grypto&lt;/strong&gt; a greek word that means &lt;strong&gt;hidden&lt;/strong&gt;  or &lt;strong&gt;secret&lt;/strong&gt; and &lt;strong&gt;graphy&lt;/strong&gt; which means &lt;strong&gt;writing&lt;/strong&gt;. Hence cryptography is the art of secret writing. It is a method used in protecting information and communications through the use of codes, so that information sent is read and processed by the only the intended recipients. The use of codes is to make this information seem meaningless to unauthorized persons.&lt;br&gt;
&lt;strong&gt;The process of cryptography&lt;/strong&gt;&lt;br&gt;
Providing security using cryptography involves the design and development of algorithms or a series of mathematical operations alongside keys which are then used on a readable message called plaintext(original information to be transmitted or stored) which converts it to an unreadable form called ciphertext (information that is been coded). A key is just another piece of information almost always a number that specifies how the algorithm is applied to the plaintext in order to encrypt it. This process involves two main activities: encryption and decryption. Encryption simply means making secret , therefore encryption is an integral part of cryptography. The algorithm generated along side the key are used to encrypt the data to an unreadable form. A good cryptographic system is also ensured so as to effectively manage the algorithms and keys developed for encryption and decryption. The ciphertext can be read and processed by the intended recipients by following the same algorithm and the assigned key to obtain the plaintext. This process is called decryption. it should be noted that though the algorithm can be known but without the correct key, the decryption process is very difficult and sometimes impossible.&lt;br&gt;
&lt;strong&gt;Cryptanalysis&lt;/strong&gt;&lt;br&gt;
Building strong algorithms and cryptographic systems is primarily aimed at protecting data from attackers, cryptanalysis is rather the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work, finding and improving techniques for defeating or weakening them with the objective to gain access to the contents of encrypted data, even if the cryptographic key is unknowned&lt;br&gt;
Another approach by cryptanalyst is not the study of the algorithms used but they rather engage in the study of side channel attacks, which do not target weaknesses in the cryptographic algorithms but instead exploit weaknesses in their implementation&lt;br&gt;
Cryptanalysis is practiced by a broad range of organizations, including government aiming to decipher other nation’s confidential communication; companies developing security products that employ cryptanalyst to test their security features; hackers, crackers, independent researchers and academicians who search for weaknesses in cryptographic protocols and algorithms. Hence cryptographic systems should be designed such that they don’t need to be secret in order to conceal information  While the objective of cryptanalysts is to find weaknesses in or otherwise defeat cryptographic algorithms, cryptanalyst research results are used by cryptographers to improve and strengthen or replace flawed algorithms. Both cryptanalysis, which is focused on deciphering  encrypted data and cryptography which is focused on creating and improving encrypted ciphers and other algorithms are aspects of cryptology, the mathematical study of codes, ciphers and related algorithms. &lt;br&gt;
We can therefore conclude that though cryptography is one method of securing data and information over network systems, it can never be one hundred percent efficient, either due to weaknesses in the underlying algorithms or weaknesses in it's implementation, therefore cryptographers are to continuously work hard in protecting, updating and creating new algorithms as need arises. &lt;/p&gt;

</description>
      <category>programming</category>
      <category>security</category>
      <category>design</category>
      <category>algorithms</category>
    </item>
    <item>
      <title>Report writing.</title>
      <dc:creator>Ndong Henry Ndang </dc:creator>
      <pubDate>Mon, 20 Mar 2023 03:15:25 +0000</pubDate>
      <link>https://dev.to/ndong21/report-writing-mi2</link>
      <guid>https://dev.to/ndong21/report-writing-mi2</guid>
      <description>&lt;p&gt;Most academic disciplines ask or require students to write reports and students are often confused with what that really means.&lt;br&gt;
Likewise in business, confronted with a request to write a &lt;strong&gt;report&lt;/strong&gt; to a senior manager, many people struggle to know what to write.&lt;br&gt;
Confusion often arises about the writing style, what to include, the language to use and other factors.&lt;br&gt;
This article aims to tackle some of these elements and provide guidelines on how to write a good report. &lt;br&gt;
&lt;strong&gt;What is report&lt;/strong&gt;&lt;br&gt;
A report is a document that presents information in an organized format for a specific audience and purpose. It is written after the completion of a task in different fields which aims to&lt;br&gt;
Convey information, analyze an issue or problem, and provide a recommended course of action. They present factual based information for a specified audience. &lt;br&gt;
There are many types of Reports and the format or style of writing these reports may differ depending on the institution, field concern or even the professor.&lt;br&gt;&lt;br&gt;
As earlier said reports are of many types but for this article we would be looking at academic reports. &lt;br&gt;
&lt;strong&gt;What is an academic report&lt;/strong&gt;&lt;br&gt;
An academic report aims to sell a product, idea or point of view (Van Emden and Easteal, 1995).It should inform, explain and persuade (Williams, 1995) by using well organized research.&lt;br&gt;
These kind of reports are also used to present and discuss the results of an experiment, survey or other research methods.&lt;br&gt;
&lt;strong&gt;Format of an academic report.&lt;/strong&gt;&lt;br&gt;
An academic report is often characterized by its layout presented in form of sections. These sections are;&lt;br&gt;
&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Literature Review&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Methods&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Results&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Discussions&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Conclusions&lt;/strong&gt;&lt;br&gt;
Now let's look at each section in details to find out what each section should contain and in what order.&lt;br&gt;
&lt;strong&gt;1. Introduction&lt;/strong&gt;&lt;br&gt;
Here you present the research topic or question(problem statement)and explain why you chose to study that topic(rationale). You may also present a general overview of the work you did and your findings, expanding on these points further in the main body of the text.&lt;br&gt;
&lt;strong&gt;2. Literature review&lt;/strong&gt;&lt;br&gt;
Here you briefly summarize work on this topic other researchers have conducted, including their findings. You can also provide any background information on the topic that your readers should have before you present your own work. Remember your readers are interested in your work, not the work of others. Focus on summarizing work that relates in some way to the work you have performed.&lt;br&gt;
&lt;strong&gt;3. Methods&lt;/strong&gt;&lt;br&gt;
Here you describe the steps you took in your research, for example, you can describe the methodology you used to build your study, the sampling method you used to obtain survey participants and the steps you took in a scientific experiment. Make sure everything is written in past tense as you are describing something that has already been carried out. &lt;br&gt;
&lt;strong&gt;4. Results&lt;/strong&gt;&lt;br&gt;
This sections is meant to describe your findings, for example you can provide information such as survey participant's answers, medical test results, data from scientific experiment and any statistical analysis results. You may find it useful to use figures and tables to represent these results in a easy-to-read format&lt;br&gt;
&lt;strong&gt;5. Discussions&lt;/strong&gt;&lt;br&gt;
You will discuss the implications of your findings, explaining them and relating them to the previous research presented in your literature review. You will interpret your findings and describe how these findings answer (or don't answer) your research questions. You should also describe any limitation of your work such as sample size, missing values and discuss how you could solve these issues in your next research.&lt;br&gt;
&lt;strong&gt;6. Conclusion&lt;/strong&gt;&lt;br&gt;
This is where you summarize your main work and findings as well as the implications of your works. You should not introduce any new material in this section. You should also provide recommendations based on your findings and discuss any future research needed.&lt;br&gt;
Those are the various sections a report is to have but these may differ depending on the institution or professor supervising as earlier stated, that's why it's always advisable to check and verify clearly what's expected of you. Furthermore, reports are not based on personal ideas or opinions but are informative and fact based. &lt;/p&gt;

</description>
      <category>career</category>
      <category>writing</category>
      <category>tutorial</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
