<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Pradeep Parthiban</title>
    <description>The latest articles on DEV Community by Pradeep Parthiban (@pradeeparthiban).</description>
    <link>https://dev.to/pradeeparthiban</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F88907%2F7f2903db-e172-452e-b315-d65dc3793e6d.jpg</url>
      <title>DEV Community: Pradeep Parthiban</title>
      <link>https://dev.to/pradeeparthiban</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pradeeparthiban"/>
    <language>en</language>
    <item>
      <title>6 Password Policy Management Best Practices for a more secure IT environment</title>
      <dc:creator>Pradeep Parthiban</dc:creator>
      <pubDate>Tue, 10 Aug 2021 09:19:10 +0000</pubDate>
      <link>https://dev.to/pradeeparthiban/6-password-policy-management-best-practices-for-a-more-secure-it-environment-2n8</link>
      <guid>https://dev.to/pradeeparthiban/6-password-policy-management-best-practices-for-a-more-secure-it-environment-2n8</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ntwa5xa_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bcrt80elf1fcv9myo66j.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ntwa5xa_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bcrt80elf1fcv9myo66j.jpeg" alt="PPM Best Practices"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security and so are more prone to cyberattack. The FBI reported a 300% increase in cybercrimes since the pandemic began, and remote work has increased the average cost of a data breach substantially. &lt;/p&gt;

&lt;p&gt;Employees working from home are also distracted – &lt;/p&gt;

&lt;p&gt;“47% of remote workers cited distraction as the reason for falling for a cyberattack.”&lt;/p&gt;

&lt;p&gt;In other words, if you do not have a plan in place to mitigate these risks, you are setting yourself up for a potentially devastating cybersecurity breach.&lt;/p&gt;

&lt;p&gt;One simple way to protect your organization from breaches is to apply a strong password policy at all levels of the organization, and enforce it by implementing a secure password policy management solution (PPM).&lt;/p&gt;

&lt;p&gt;Here are some password policy best practices you may find useful.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Increase password length and strength&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Brute force attacks try all possible combinations of characters to arrive at the password. A 6 string password with only upper or lower case letters can be cracked in 8 seconds. An 18 character password with upper and lower case letters, numbers and symbols can take 1 quintillion years to crack! By adding a special character, combining both upper and lower case letters or adding numbers, encryption can be much more secure.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--B6lAeQf7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0ubofvzc6qoerjrn534j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--B6lAeQf7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0ubofvzc6qoerjrn534j.png" alt="Password length and strength"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Image Credit: ghacks.net&lt;/p&gt;

&lt;p&gt;The full strength of the Advanced Encryption Standard (AES) comes to bear when users create passwords of 32 characters for 128-bit encryption and 64 characters for 256-bit encryption. However, passwords of around 10 characters are strong enough for most applications.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Simplify as much as possible&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A password made of only numbers has 10 options for each character in the string, one made of numbers and letters has 36 options, and if you include special characters that adds another 32 possible characters for each spot in the string. This makes it more challenging for brute force attacks to be successful. Complexity in terms of the kind of characters that can be used in the password is, therefore, an advantage.&lt;/p&gt;

&lt;p&gt;However, do not mandate the usage of these different kinds of characters. This can lead to frustration and reuse of the same password with minor character substitutions (P@ssword or Passw0rd, for example). This is especially the case when the policy also demands frequent changes of password. If the old password is compromised, such minor variations will be relatively easy to guess, too.&lt;/p&gt;

&lt;p&gt;To mitigate this risk, don’t mandate the use of special characters and reduce the frequency of mandatory password reset to approximately once a year. A long password using only lowercase letters is more secure than a short one which is a variant of an older password.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Do not allow password reuse&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Do not allow reuse of earlier passwords during periodic password reset to increase security. Train your staff not to use minor variations of their earlier passwords, and instead look for completely different passwords.&lt;/p&gt;

&lt;p&gt;Also train staff on the risks of reusing passwords across home and work accounts. Password reuse results in a huge surge in credential stuffing attacks. If any service is compromised and your password and username are stolen, hackers could use the same credentials to try and hack your other accounts. Each account must therefore use unique credentials to maintain security.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reinforce passwords using multi-factor authentication (MFA)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Multi-factor authentication uses a combination of things you know, such as a password or PIN; things you have, such as a badge or smartphone; and things you are, such as biometric data, to authenticate your right to access a particular system, data or application.&lt;/p&gt;

&lt;p&gt;Enabling MFA ensures that even if a password is stolen, the system is not compromised.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use a secure password manager&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Many users find it difficult to remember their passwords for multiple online services, and so either use a single password for all, or, worse, save all their passwords to an unreliable password manager. &lt;/p&gt;

&lt;p&gt;If you do opt for a password manager, choose one that is highly secure, in order to mitigate the risk involved. Most IAM solutions will include a password manager or, with Single Sign-on, completely do away with the need for multiple passwords. A single secure password is enough to log on to your IAM and access your applications and data.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use an IAM application for Password Policy Management (PPM)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It’s one thing to lay down rules for password policy across the organization. It’s quite another to enforce the policy. An &lt;a href="https://www.akku.work/"&gt;Identity Access Management (IAM) application&lt;/a&gt; can help you ensure that all your users consistently comply with a high standard of security while setting their passwords, without the need for a separate password policy enforcement tool.&lt;/p&gt;

&lt;p&gt;Administrators can customize and define password policy for all users in the organization. You can also specify upon whom the policy should be enforced, based on the users’ access level. Password policies can of course also be defined as blanket rules.&lt;/p&gt;

&lt;p&gt;A common perception is that the risks associated with breached passwords do not apply to your organization as you have secure systems. But your organization’s data security is only as strong as the weakest password of your users. In 2020, 770 million credential stuffing attacks occurred. That means that if your employee’s personal passwords are compromised, and they have reused the same password at work, your data is compromised too. Worse, 17% of all sensitive files are accessible to all employees, and about 60% of companies have over 500 accounts with non-expiring passwords.&lt;/p&gt;

&lt;p&gt;Implementing a robust Identity and Access Management (IAM) solution brings you several steps closer to protecting your user credentials and corporate data. Worldwide, cybercrime costs will hit $6 trillion annually this year. Don’t let your organization succumb to a Data breach! With these simple steps, you can stay safe with multiple layers of data protection. Allow our team at Akku to help you secure your systems.&lt;/p&gt;

</description>
      <category>iam</category>
      <category>identityaccessmanagement</category>
      <category>passwordpolicymanagement</category>
      <category>multifactorauthentication</category>
    </item>
    <item>
      <title>The Role of AI in Software Testing</title>
      <dc:creator>Pradeep Parthiban</dc:creator>
      <pubDate>Mon, 06 Aug 2018 12:59:52 +0000</pubDate>
      <link>https://dev.to/pradeeparthiban/the-role-of-ai-in-software-testing-4g29</link>
      <guid>https://dev.to/pradeeparthiban/the-role-of-ai-in-software-testing-4g29</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fi1iaii11v8y3x427b0r8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fi1iaii11v8y3x427b0r8.png" alt="AI in Software Testing"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;We all know that over the recent years, AI has proven to be quite helpful for the human race in the multifarious fields like statistics, graphical studies, astronomy and so on. But now the concerned matter is whether the theory will be able to bring about the necessary and the expected changes in the &lt;a href="https://www.indiumsoftware.com/core-testing/" rel="noopener noreferrer"&gt;software testing&lt;/a&gt; field or not. Software testers and developers from all over the world are trying various methods to incorporate the idea to create a new version of the technologically advanced world. &lt;/p&gt;

&lt;p&gt;Will this new introduction become a salvation or the cause of destruction? Even though there is still an underlying uncertainty, the use of the AI theories has become abundant to an extent. According to &lt;a href="https://www.timeshighereducation.com/data-bites/which-countries-and-universities-are-leading-ai-research" rel="noopener noreferrer"&gt;The Times Higher Education&lt;/a&gt;, China is leading the pack with over 41000 research papers on AI and various countries are following this theory to perform various functions. &lt;/p&gt;

&lt;p&gt;Let’s take a glance at the attributes of the Artificial Intelligence and its related aspects of software testing! &lt;/p&gt;

&lt;p&gt;WHAT IS ARTIFICIAL INTELLIGENCE?&lt;br&gt;
We all know that the robots and the technologically developed machines are quickly replacing the human labours, be it bots or any automated machine. Now, when the mechanical strength is being replaced by artificial power, why not the natural intelligence of human beings is replaced by something similar? &lt;br&gt;
This proposition led to the development of a new concept of artificially induced intelligence, similar to the human intelligence in any sense yet advanced and quicker. This is known as Artificial Intelligence. It is actually a probabilistic approach towards any situation. &lt;/p&gt;

&lt;p&gt;Apart from this, AI technologies behave like humans and produce results the same way. Some of the best technologies developed to date that uses AI are speech recognition, virtual agents, machine learning platforms, robotic process automation and so on. &lt;/p&gt;

&lt;p&gt;The success of the Artificial Intelligence in these fields has driven the software minds to use the theory of the same in the aspect of developing software and testing the different parameters of the same.&lt;/p&gt;

&lt;p&gt;WHAT IS THE REQUIREMENT OF AI IN SOFTWARE TESTING?&lt;br&gt;
Software testers benefit more on automation than the manual checking process. The term ‘software testing’ revolves around a number of algorithms and technical processes which examines the quality of the software, the output, its market efficiency and other attributes. &lt;/p&gt;

&lt;p&gt;Now, software testing does not involve a step or two for the software testing purposes. Rather, the entire software developed is subjected to a series of repeated tests where at each level, the parameters are examined by various methods. This requires intelligence, extensive manpower and time. Also, the revenue spent by various macro software-giants accounts to around billions. &lt;br&gt;
The use of Artificial Intelligence will certainly cut out all the excess things that are needed for the testing process. The AI algorithm and the various processes are based on introducing automation and better ‘intelligent’ analysis of any faults or errors within the software. The entire work is done at low maintenance since AI means artificially induced intelligence, enough brainpower to run the processes without extensive care.&lt;/p&gt;

&lt;p&gt;BENEFITS OF AI IN SOFTWARE TESTING&lt;br&gt;
The benefits of the application of Artificial Intelligence are extensive; some can modify the existing testing methods while others will definitely introduce mind-blowing changes in the field of software testing. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Improved quality &lt;br&gt;
With the application of the artificially induced intelligence, the quality of the software will develop widely. Since all the testing methods will be carried out automatically and with secured assuredness, the quality will be improvised greatly. Moreover, the longevity of the applications will be increased greatly along with the increased market efficiency. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Effective and trustworthy&lt;br&gt;
AI algorithms have introduced effectiveness in the software testing. The artificial intelligence theories have also increased the reliability of the testing methods by reducing the manpower and also the intensive costs. The process is trustworthy since the errors will be checked by checking codes that will not leave the errors unattended without resolving them. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Earliest feedback&lt;br&gt;
As the AI testing process is automated, the software developers will get a quick feedback report on the working and the efficiency of the applications. Also, the bugs and the disputes will be resolved quickly and hence, the products can be launched quickly in the market. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improved traceability &lt;br&gt;
As the testing algorithms are preloaded within the machine and are based on statistical and other types of mathematical concepts, it's quite easier to trace the path of the tests and ensure that every step is being done clearly and carefully. Also, it will be possible to know what type of errors have occurred and hence, finding a solution to them will become easier. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Integrated platform&lt;br&gt;
The entire process is conducted on an integrated and embedded platform. This will make it easier for the software developers to launch the website easily on the client’s website. Hence, the execution process will become more flaccid. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The application of the Artificial Intelligence to the field of software testing is still under scrutiny. However, it is expected that soon the software world will see a dramatic change in the processes!&lt;/p&gt;

</description>
      <category>ai</category>
      <category>softwaretesting</category>
      <category>qualityassurance</category>
      <category>testautomation</category>
    </item>
  </channel>
</rss>
