Posts

Showing posts from August, 2017

Cloud Computing

What is Cloud Computing The cloud computing paradigm is punctually gaining favor as the ideal choice for several businesses, educational and research establishments. It can be considered as a new computing model that can provide services on demand at a least cost. Cloud computing is a large scale distributed infrastructure of the hardware and software resources in the data centers that provide diverse services over the network or the Internet to satisfy user’s requirements.   According to the definition of “cloud computing” from the National Institute of Standards and Technology (NIST) it is that “cloud computing enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.” According to the definition, cloud computing provides a convenient on-demand network access to a shared pool of configurable computing resources like

Hybrid Modulation

Image
What is Modulation Modulation is a technique used to send information by modifying the characteristics of a basic electromagnetic signal. The basic signal is called the carrier signal. The characteristics of a signal are amplitude, frequency and phase. There are two types of modulations as: ·          Analog Modulation 1.       Frequency Modulation  (FM) 2.       Amplitude Modulation (AM) 3.       Phase Modulation (PM) ·          Digital Modulation 1.       Frequency Shift Keying (FSK) 2.       Amplitude Shift Keying (ASK) 3.       Phase Shift Keying (PSK) What is Hybrid Modulation? Hybrid modulation is a combination of ASK and PSK. This method of modulation is called Amplitude Phase Shift Keying (APSK) or Quadrature Amplitude Modulation (QAM). It generates by quadrature components with two independent carrier signals with same frequency and different amplitude which are transmitted simultaneously in same medium and phase by shifting 90 degrees with r

How To Recover Lost Ubuntu Password

Image
Let's see step by step how to hack Ubuntu password. Step 1: Switch the computer on. Go to Grub menu. Generally it appears automatically, if not then hold down the shift key until the boot menu appears. In the grub menu, choose for the “recovery mode” option. It will bring you a black screen with several lines of output being displayed in a flash. Wait for few seconds here. Step 2: Now you will be present with different options of recovery mode. Here you need to choose “Root Drop into root shell prompt“. Like in the picture below: Step 3: Here, you will be presented with root access (why? Is this not a security fault?) without prompting any password. Use the following command to list all the users available: ls /home From the previous command choose the “username” for which you want to reset or (say) hack the password. Now, use the following command to reset the password for the selected “username“: passwd username It prom

Virtual Private Database (VPD)

Image
What is VPD? Virtual Private Database (VPD) is a database security feature that is built into an Oracle database server, as opposed to being part of an application that is accessing the data. The user is only allowed to see the data they have been given permission to see. VPD is a feature of Oracle Database 11g Enterprise Edition, was introduced in Oracle8i. Why VPD? VPD is used when the standard object privileges and associated database roles are insufficient to meet application security requirements. VPD policies can be simple or complex depending on organization’s security requirements. VPD uses application contexts to provide row-level security and fine-grained access control based on a company's security policies. Application contexts are simply key value pairs that are created in a defined namespace. A simple VPD example might restrict access to data during business hours and a more complex VPD example might read an application context during a login trigger and

Sybil Attacks

One-way security can break down is in a Sybil attack. Named after the case study of a woman with multiple personality disorder, a Sybil attack is a type of security threat when a node in a network claims multiple identities. Most networks, like a peer-to-peer network, depend on on assumptions of identity, where each computer denotes one identity. A Sybil attack occurs when an insecure computer is hijacked to claim multiple identities. Problems arise when a reputation system (such as a file-sharing reputation on a torrent network) is tricked into thinking that an attacking computer has a disproportionally large influence. Similarly, an attacker with many identities can use them to act maliciously, by either stealing information or troublemaking communication. It is important to recognize a Sybil attack and note its danger in order to protect yourself from being a target. First defined by Microsoft researcher John Douceur, a Sybil attack relies on the fact that a network of comp

Sample Critical Infrastructure Protection Policy

Introduction Protecting the network, physical and information systems infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across the XYZ organization. Network infrastructure contains of interconnected devices planned to transport communications essential for data, applications, services, and multi-media. Physical infrastructure contains how to preserve all the devices, servers, physical files. Scope This policy applies to all employees of XYZ organization as well as any other users of the network infrastructure, including independent contractors or others who may be given access on a temporary basis to organization’s systems. Information transferred or stored on XYZ organization’s resources is the property of the organization unless it is specifically identified as the property of other parties. Policy Organization reserves the right to remove any unauthorized cables, connections, and hardware. Decide w

ISO 9001

Image
Introduction ISO 9001 is managed by the International Organization for Standardization (ISO) in Geneva, Switzerland. ISO is a self-governing membership organization and the largest developer of voluntary international standards in the world. International Organization for Standardization’s ISO 9001 series describes standards for a Quality Management System addressing the principles and processes surrounding the design, development and delivery of a general product or service. It supports businesses and organizations to be more effective and improve customer satisfaction. A new version of the standard, ISO 9001:2015, has just been launched, replacing the previous version ISO 9001:2008 to overcome the challenges that was there in few decades ago and faced by business organizations. For example, the way we do business, often operates with more complex supply chains with the increasing of globalization. Additionally the expectations and the need of access to more information from cu