Currently pursuing Post Graduation Diploma in the major Software system testing at Fanshawe College. London, Canada.By pursuing Post graduation in the field of system testing at Fanshawe college has given me a good opportunity with high ambition which enhanced me to become a system testing analyst dealing with various subjects.
· System design and analysis which deals with architecture, modules, interfaces, and data for a system to satisfy specified requirements. Systems design could be seen as the application of systems theory to product development.
· Usability testing which gives us an idea of how our product is going to work as a real-world entity.It validates the user needs.Usability testing is used to assess user behaviour, needs and attitudes towards the usage of product which enables us to develop or find an improvised solution for a problem.
· Testing methodologies which include functional and non-functional testing.Examples of Testing Methodologies are Unit Testing, Integration Testing, System Testing, Performance Testing etc.It also uses various software development life cycle in performing actual testing.
· Object-Oriented Programming in Java and Database management(MySQL).
Bachelor of Technology
Completed Bachelor of Technology in Computer science at GRIET College Hyderabad, India.
This course focuses on the basics of software programming concepts starting from C language to building a real-world application.
It has both software and hardware related concepts on how they work and interact while running an application.
C Language & C++ with object-oriented programing.
Compiler & Design
Design & Analysis of Algorithm.
TECHNOLOGIES LEARNED (Bachelors)
· Database essentials and design(MySQL)
· Computer networking with basic network concepts dealing with issues and security challenges in the network.
· Fundamentals of programming C language, C++ with object-oriented concepts.
· JAVA programming using java platform standard edition.
TECHNOLOGIES LEARNED (Post graduation diploma)
· Testing methodologies.
· How to design and organize test conventions by utilizing established protocols and utilization of core software programming testing standards to break down both functional and non-functional requirements at all test levels.
· Develop test cases to check system functionality and individual segments of the system considering different test levels, for example, component, integration, system, acceptance, and among the various test types such as functional, usability, and regression.
· Interpret, create, and present business related records, incident reports, test designs and test plan related data adequately and precisely with a specific goal to archive conceivable defects arise amid testing.
· How to Manage software quality assurance and software testing projects according to current project management standards and procedure.
It is described as an attempt to obtain sensitive information such as user credentials like usernames and passwords. It happens when a hacker, taking on the appearance as a trusted entity, tricks a user into opening an email, text, or instant message. The user is then deceived into clicking a link, which can prompt the establishment of malware, the freezing of the system as a component of a ransomware attack or expose the sensitive data.
This type of attack can have destructive outcomes. For a user, this incorporates purchases, the stealing of funds, or identity theft.
A spoofed email supposedly from Fanshawecollege.ca is mass-distributed to as many faculty/students members as possible.This email claims that the user’s password is about to expire. Instructions are given to go to Fanshawecollege.ca/renewal to renew their password within 24 hours.
When the user happens to click the link then he is diverted to fanshawecollege.edurenewal.com, a false page showing up precisely like the genuine renewal page, where both new and existing passwords are asked. The hacker, observing the page, hacks the original password to access secured regions of the college network.
How to prevent Phishing attack
For users, observance is critical. A spoofed message often contains rare mistakes that uncover its actual identity. These can incorporate spelling mix-ups or changes to domain names.
Two-factor validation (2FA) is the best technique for countering phishing attack, as it includes an additional check layer when signing in to sensitive applications. 2FA depends on clients having two things: something they know, for example, a password and username, and something they have, for example, their cell phones.Even when the client compromises, 2FA keeps the utilization of their traded off accreditations since these by themselves are insufficient to gain entry.
Ransomware is a kind of malware that encrypts a system and at that point demands money from the users or the entire organization.Fundamentally, ransomware encrypts the user files and data, restricting the user from using their own records or reports, or shuts the PC to avoid typical utilization and demands payments so as to decrypt the records and provide access.
There are three types of ransomware
2)Lock Screen ransomware
3)Master boot record ransomware
Encryption Ransomware encrypts your records and folders, preventing you from accessing your documents by locking them with an AES-256 key, which is notoriously difficult to decipher. Depending on the programmer’s rationale, the encoded files may or may not be recoverable. After encrypting your documents and files, encryption ransomware shows a pop-up message clarifying that your documents have been encrypted and you should pay a payment to have those documents decrypted.
This is the method WannaCry utilized against its casualties.
As the name suggests, lock screen ransomware it locks your screen and demands
a ransom. While this type of ransomware won’t encrypt your documents, it will block
every one of your windows straight away. Once your system is tainted, you won’t be
ready to get to your windows until you pay the payment or the programmers lift the
The master boot record (MBR) is a basic part of a hard drive, allowing the working system to boot up. MBR ransomware changes the MBR, interrupting the ordinary boot process by showing a demand for ransom on the bootup screen. Users can’t boot their system up until the point when the payment is paid. Of all three sorts of ransomware, this ransomware is arguably the most dangerous.
Steps to mitigate Ransomware attack
1)Educate users about phishing attacks.
2)Back up your files regularly.
3)Regularly patch your operating systems.
4)Update your third-party applications.