Posts

Showing posts from September 21, 2020

New Post

Nash Equilibrium In Game Theory ~xRay Pixy

Image
 Video Link  CLICK HERE... Learn Nash Equilibrium In Game Theory Step-By-Step Using Examples. Video Chapters: Nash Equilibrium  00:00 Introduction 00:19 Topics Covered 00:33 Nash Equilibrium  01:55 Example 1  02:30 Example 2 04:46 Game Core Elements 06:41 Types of Game Strategies 06:55  Prisoner’s Dilemma  07:17  Prisoner’s Dilemma Example 3 09:16 Dominated Strategy  10:56 Applications 11:34 Conclusion The Nash Equilibrium is a concept in game theory that describes a situation where no player can benefit by changing their strategy while the other players keep their strategies unchanged.  No player can increase their payoff by changing their choice alone while others keep theirs the same. Example : If Chrysler, Ford, and GM each choose their production levels so that no company can make more money by changing their choice, it’s a Nash Equilibrium Prisoner’s Dilemma : Two criminals are arrested and interrogated separately. Each has two ...

Security Issues in Cloud Computing

1. Account Hijacking  Attackers can access user accounts remotely. Attackers can access data stored on the cloud. Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].  2. Insider threat An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as  Customer accounts, Financial forms, and other sensitive information. 3. Phishing and social engineering attacks Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere. 4. Malware injection Malware Injection means Code or Scripts embedded into cloud services.  Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves. ...
More posts