Posts

New Post

Markov Chains || Step-By-Step || ~xRay Pixy

Image
Learn Markov Chains step-by-step using real-life examples. Video Chapters: Markov Chains 00:00 Introduction 00:19 Topics Covered 01:49 Markov Chains Applications 02:04 Markov Property 03:18 Example 1 03:54 States, State Space, Transition Probabilities 06:17 Transition Matrix 08:17 Example 02 09:17 Example 03 10:26 Example 04 12:25 Example 05 14:16 Example 06 16:49 Example 07 18:11 Example 08 24:56 Conclusion

Security Issues in Cloud Computing

1. Account Hijacking  Attackers can access user accounts remotely. Attackers can access data stored on the cloud. Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].  2. Insider threat An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as  Customer accounts, Financial forms, and other sensitive information. 3. Phishing and social engineering attacks Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere. 4. Malware injection Malware Injection means Code or Scripts embedded into cloud services.  Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves. ...

What is a meta heuristic algorithm for?

  Metaheuristic  means a High-level problem-independent algorithmic framework that is developed for the optimization algorithm. Metaheuristic algorithms  find the best solution out of all possible solutions of an optimization. I discussed some Meta-heuristic algorithm like: Grey Wolf Optimization (GWO) Algorithm:  GWO is a metaheuristic proposed by Mirjaliali Mohammad and Lewis, 2014. GWO is inspired by the social hierarchy and the hunting technique of Grey Wolves Bat Algorithm:  The  Bat algorithm  is a metaheuristic algorithm for global optimization. It was inspired by the echolocation behavior of microbats. Cuckoo Search Algorithm: Cuckoo Search is a n ature-inspired  algorithm , based on the brood reproductive strategy of cuckoo birds to increase their population. Meta-heuristic Algorithms

Cloud Computing Components and Cloud Services

Cloud Computing includes Several elements like: Clients Datacenters Distributed servers Each component has a Purpose and plays a specific role in delivering a functional Cloud-based application.  1. Clients: C lients are typically computers. Clients are devices that end-users interact with to manage their information on Cloud.  For example Laptops, Mobiles Phones,  Tablets  Note: because of their mobility they are big drivers for Cloud computing.  2. Datacenter means the Collection of Servers. W here the application to which you subscribe is housed. A growing trend in the IT world is VIRTUALIZING servers. Multiple Virtual servers running on one physical server. 3. Distributed servers mean Large networks have Multiple servers. Servers are in geographically disparate locations. It provides more flexibility and security to the service providers.  For example, Amazon has its own Cloud solution in servers all over the world....

Monoalphabetic Substitution Cipher Techniques

  Monoalphabetic Substitution Cipher, also known as a simple substitution cipher, relies (depends) on a fixed replacement structure. That is substitution is fixed for each letter of the alphabet.  A simple example is where each letter is encrypted as the next letter in the alphabet: "a simple message" becomes "B TJNQMF NFTTBHF". Each letter can be encrypted to any symbol [&,%,?,/,*,{},@,~,+,-] not just another letter. 1.) Additive Cipher The Simplest Monoalphabetic cipher is an Additive cipher. This cipher is sometimes called Shift Cipher. When the Cipher is Additive, the Plain Text, Cipher Text and key are integers in Z(26). For Encryption: C = (p + k) mod 26 For Decryption: P = (c - k) mod 26 Where, C = Cipher Text                   P = Plain Text                   k = Key  The secret key between Alice and Bob is also an integer value. The encryption Algorithm adds the key to t...
More posts