Posts

Showing posts from September 21, 2020

New Post

Bermuda Triangle Optimizer

Image
VIDEO LINK The Bermuda Triangle Optimizer (BTO) is a nature-inspired algorithm that simulates a gravity-like pull in the Bermuda Triangle to find optimal solutions. Learn Bermuda Triangle Optimizer (BTO) Step-By-Step using Examples. Video Chapters: Bermuda Triangle Optimizer (BTO) 00:00 Introduction 00:34 About the Bermuda Triangle 02:06 Bermuda Triangle Optimizer  05:44 BTO STEPS 09:30 BTO Advantages 10:17 BTO Limitations 10:42 BTO Applications 11:07 Conclusion Bermuda Triangle Optimizer || Step-By-Step || ~xRay Pixy Video Link:  https://youtu.be/bBnsd7BBttg #optimization #algorithm #metaheuristic #robotics #deeplearning #ArtificialIntelligence #MachineLearning #computervision #research #projects #thesis #Python #optimizationproblem #optimizationalgorithms 

Security Issues in Cloud Computing

1. Account Hijacking  Attackers can access user accounts remotely. Attackers can access data stored on the cloud. Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].  2. Insider threat An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as  Customer accounts, Financial forms, and other sensitive information. 3. Phishing and social engineering attacks Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere. 4. Malware injection Malware Injection means Code or Scripts embedded into cloud services.  Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves. ...
More posts