Tuesday, September 10, 2019

what is Digital Signature?

when i was a kid , i used to think that digital signature is just signature in Digital form(picture of signature). but i was wrong at all.

it's use is just the same like Normal signature (i.e to validate something) but form is different (i.e. digital)

so the definition of digital signature can be "A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents"

Digital signature has following prerequisites.

  1. Received Message

  2. Secure Hash Algorithm

  3. Message Digest 

  4. Validation Algorithm

  5. Digital Signature

  6.  
       
    Image result for what is digital signature

       Digital signatures can provide the added assurances of evidence of origin, identity and status of an electronic document, transaction or message and can acknowledge informed consent by the signer.

    Tuesday, April 2, 2019

    Issues of seucrity designe structure

     {not completed article yet}

    there are some security design issues these are responsible for the all the threats and issues.
    Security Architecture is one component of a products or systems overall architecture and is developed to provide guidance during the design of the product or system.

    Security Architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall systems architecture. These controls serve the purpose to maintain the system’s quality attributes such as confidentiality, integrity and availability.

    there are some types of  issue management through which you can protect your system and it's information.

    1. performance management

    2. risk management

        a. risk identification

        b. risk assesment

        c. risk controle

    3. design alignment

    4. sustainability

    5. backup plans

    backing up the data assure you the about the data protection. your data may naot be lost after any threat of
    backup of the data can be classified in following ways

        full backup

        inherimental backup

        network backup

        deffrential backup

                  time dependent backup and update when the original file is changed.
    durability mesures

    6.security



    Friday, March 29, 2019

    Machine learning Curve fitting using MATLAB

    here is the code for the data set we have taken.



    >> clear;
    close all;
    Tx = [80: -20: -340];
    alphay=[6.47  6.36 6.24 6.12 6.00 5.86 5.72 5.58 5.43 5.28 5.09 4.91 4.72 4.52 4.30 4.08 3.83 3.58 3.33 3.07 2.76 2.45];
    alphay=1.e-6*alphay;
    plot(Tx,alphay,'bo');


    title('Thermal expansion cofficient of steel');
    ylabel('cofficient\alpha');
    xlabel('temperature(in F)');
    >> coef1=polyfit(Tx,alphay,1)

    Computer Networks all chapter Notebook From the book> Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,

    Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,

     Click and Download PPTs

    Sr. No.Chapter Name

    Overview

    1

    Introduction

    2

    Network Models

    Physical Layer and Media

    3

    Data and Signals

    4

    Digital Transmission

    5

    Analog Transmission

    6

    Bandwidth Utilization: Multiplexing and Spreading

    7

    Transmission Media

    8

    Switching

    9

    Using Telephone and Cable Networks for Data Transmission

    Data Link Layer

    10

    Error Detection and Correction

    11

    Data Link Control

    12

    Multiple Access

    13

    Wired LANs: Ethernet

    14

    Wireless LANs

    15

    Connecting LANs, Backbone Networks, and Virtual LANs

    16

    Wireless WANs: Cellular Telephone and Satellite Networks

    17

    SONETISDH

    18

    Virtual-Circuit Nenvorks: Frame Relay and ATM

    Network Layer

    19

    Network Layer: Logical Addressing

    20

    Network Layer: Internet Protocol

    21

    Network Layer: Address Mapping, Error Reporting, and Multicasting

    22

    Network Layer: Delivery, Forwarding, and Routing

    Transport Layer

    23

    Process-to-Process Delivery: UDP, TCP, and SCTP

    24

    Congestion Control and Quality of Service

    Application Layer

    25

    Domain Name System

    26

    Remote Logging, Electronic Mail, and File Transfer

    27

    WWW and HTTP

    28

    Network Management: SNMP

    29

    Multimedia

    Security

    30

    Cryptography

    31

    Network Security

    32

    Security in the Internet: IPSec, SSLlTLS, PCp, VPN, and Firewalls

    Wednesday, February 27, 2019

    Registration process for ONE WEEK NATIONAL WORKSHOP ON IMAGE PROCESSING, COMPUTER VISION AND APPLICATION (IPCVA-2019)

    please follow the following stapes.


    1. Download form
    2. print it.
    3. fill it.
    3.take it's photo.
    4. convert it into pdf
    5.save it in a folder named "your name"
    6.this folder should contain pdf of your form and your fee recipt in PDF form
    7.create a Zip file of that folder and it's name should be on your name.
    8. mail this Zip file to ipcva2019@gmail.com
    9.congratulation you are done. have fun.

    Tuesday, February 26, 2019

    Security threts to E-commerce.

    All the security issues in the payment system through online system come in category of Security threats to E-commerce.
    before we procede further we need to know following things. 

    Electronic payment system



    An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It’s also called an electronic payment system or online payment system

    Payment Gateway

    A payment gateway is an e-commerce service that processes credit card payments for online and traditional brick and mortar stores. Payment gateways facilitate these transactions by transferring key information between payment portals such as web-enabled mobile devices/websites and the front end processor/bank.
    Payment gateways include PayPal, Google Pay(TEZ), Apple Pay, Ali Pay and Amazon Pay.

    Monday, February 25, 2019

    What is deffrence Among Private Network, Intranet, Extranet and, Internet?

    Private network

    the Internet addressing architecture, a private network is a network that uses private IP address space. Both, the IPv4 and the IPv6 specifications define private addressing ranges. These addresses are commonly used for local area networks in residential, office, and enterprise environments.

    Intranet

    An intranet is a private network accessible only to an organization's staff. Often, a wide range of information and services are available on an organization's internal intranet that are unavailable to the public, unlike the Internet

    Extranet

    An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorized parties, without granting access to an organization's entire network. An extranet is a private network organization.

    Historically the term was occasionally also used in the sense of two organizations sharing their internal networks over a VPN.

    Internet

    The Internet (contraction of interconnected network) is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

     

     Relation Between Private Network, intranet, Extranet and, Internet

     

     

    what is firewall, VPN(virtual private network) and, Private network ?

    FIREWALL: 

    a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

    Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks and run on network hardware. Host-based firewalls run on host computers and control network traffic in and out of those machines.  




    VPN(virtual private network):

     A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network.

    VPN technology was developed to allow remote users and branch offices to access corporate applications and resources. To ensure security, the private network connection is established using an encrypted layered tunneling protocol and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN. In other applications, Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers to protect personal identity and location to stay anonymous on the Internet. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions, and many VPN providers have been developing strategies to get around these roadblock

    Private network

    the Internet addressing architecture, a private network is a network that uses private IP address space. Both, the IPv4 and the IPv6 specifications define private addressing ranges. These addresses are commonly used for local area networks in residential, office, and enterprise environments.

    Tuesday, February 12, 2019

    what is application security ? and it's types.

    Application security:

    It ensures the security of an application by taking some measures to protect the application from external threats. it is the use of software, hardware, and procedural methods to protect applications from external threats. security is becoming an increasingly important concern during the development as the application become more frequently accessible over the network and as result they become vulnerable to a wide verity of threats

    Application security includes the following things 

    1. knowing your threats 

    2. securing the network host and network

    3.encorporating security in the software development process


    Issues of application security.

    the important issues of application security include the following.


    1.verification of users: 

    an application needs to verify that only legitimate user or trying to use them. the identification of legitimate users by identifying their IP address



    2. granting access to the user:

    once a user is authenticated the application needs to determine if the identified user allowed to access the functionality requested by him. this is called authorization.



    3. keeping the data confidential with encryption:

    for business, transaction data from application system get exchange over the network. data stored by the application system need to be transmitted in encrypted form to prevent it from the potential attack.

    4. Guaranteeing Data Integrity 

    when the receivers get a message neither the sender nor the receiver can refuse it. That is the denial of authentication of the message. A digital signature is a common mechanism to guarantee data integrity.

    5. Safeguarding application form common attack strategies 


    6. Guarding the privacy of the application

    Types of application security


    1. email security 

    Threats to email.
    1. Junk file
    Junk file is a very common term, that describes any orphaned file or it has no real value. Junk files are commonly referred among technologists ghost files or fantom files.


    2. spam

    Email spamming is an act of sending unsolicited bulk eMails, which one has not asked for. These are from commercial companies as an advertisement.


    3. virus

    Some emails may incorporate with files containing malicious scripts which may run on your computer and may lead to destroy or leak your important data.


    4. Fishing

    Email fishing is an activity of sending email to a user claiming to be a legitimate user of any enterprise. Its main purpose is to steal sensitive information such as password, username, etc.

    Such e-mail contact with such websites Which are infected with viruses and ask for entering the details. This website looks like a legitimate enterprise.



    5. Cleanup and archiving email

    in order to have lightweight inbox its good to archive your inbox from time to time.
    there are few steps to clean up and archive your inbox.
    stapes:

    1.  select the file tab on the mail banner.
    2. select cleanup tools button on the account information screen.
    3.  select archive from cleanup tool dropdown menu.
    4. select archive this folder and all subfolder options and then click on the folder you want to archive.
    5. select the date from the archive items older than
    6. click browse to 'create new.pst' file name and location. and click 'ok'


    2. database security

    databases are a cardinal component of any web-based application that enables websites to provide varying dynamic content. databases to are usually intended to be shared across the deferent application thus the database security is primarily concern with the secrecy of data. it ranges from protection from intentional unauthorized database user to unintentional database accesses by unauthorized entities
    the general categories of secrecy related problems in database management systems are:
    1. improper release of information from reading data that were intentionally accessed by an unauthorized user.
    2. the improper modification of data.
    3. denial of services(DOS) threats


    threats to database security

    1. data tempering
    2. data theft
    3. password related threats
    4. falsification of user identification
    5. unauthorized access to tables and columns
    6. unauthorized access to data rows lack accountability


    3. internet security

    it contains IPSec(Internet Security Protocol) and SSL(Secure Socket Layer)

    Internet security refers to securing communication over the internet it encompasses browser security, data security, net security and overall authentication and protection of data sent via internet protocol
    1.IPSec(Internet Security Protocol)
    2. SSL(Secure Socket Layer)


    1.IPSec(Internet Security Protocol)


    it consists of a set of a protocol designed by IETF(Internet Engineering Task Force) it provides security at the network level and helps to create authenticated and confidential packets for IP layer 


    2. SSL(Secure Socket Layer)


    it is a security protocol developed by net scape communication corporation. it provides security at the transport layer and includes the important security issues like confidentiality integrity and authenticity 



    Threats to internet security


    it includes specific security protocol such as


    1. worms
    2. malware
    3. ransomware
    4. spam
    5. fishing
    6. spoofing



    Backup 


    data backup refers to copying data into an archiving file. it may be used to restore the original content after a data loss event. 


    1. data backups have two main purpose the primary purpose is to recover the data after it's lost. (either by data deletion or corruption )
    2. the secondary purpose of data backups is to recover the data  from an earlier time 


    Sunday, February 3, 2019

    Top technology trends in 2019: Technologies, that will take the world by storm this year. AI ML cyber security, IoT, edge computing etc..

     Top Technology Trends in 2019


      Technologies, that will take the world by storm this year.


    1. Artificial Intelligence(AI) 

    • Definition: 

      • Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems or AI is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
      • a branch of computer science dealing with the simulation of intelligent behavior in computers
    • Example:

      • Popular AI cloud offerings include Amazon AI services, IBM Watson Assistant, Microsoft Cognitive Services and Google AI services, Virtual assistant (Google Assistant, Amazon Alexa, Apple SIRI, Samsung’s Bixby
    • Application:

      • AI camera mode, AI based usage pattern, AI chat-bots etc.

     

    2. Machine Learning

    • Definition: 

      • Machine learning is the scientific study of algorithms and statistical models that computer systems use to progressively improve their performance on a specific task
      • Machine Learning is the Field of study that gives computers the capability to learn without being explicitly programmed.
    • Example:

      • Image, speech recognisation medical diagnosis, market future etc.
    • Application:

      • Self driving car, spam detection and filtering, social media ads etc. 

     

    3. Blockchain

    • Definition:

      • A blockchain is literally a chain of blocks. it is a growing list of records(blocks) which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data
    • Example:

      • Crypto currency like bitcoin, ethereum, munero etc.
    • Application:

      • Crypto currency payment, voting, Land Registry, digital ledger Smart contact, digital identification or signature, blockchain IoT, and thousends of application

     

    4. 5G Technology

    • Definition:

      • It is the 5th generation of wireless network technology
      • With each generation it improves the speed, security safety, and bandwidth.
    • Application:

      • Mobile networks, broadbands, etc.

    6. Electric, self driving cars and Flying Taxis
    • Definition:

      • Electric cars are the cars that run by the power of electricity.
      • Self driving cars are the cars which are driverless.
      • flying Cars or taxis that uses air medium for transportation are called flying taxi or flying cars.
    • Example:

      • Electric: Tesla model 3, model x, etc. and BMW i3, Hyundai ionic, Audi e-tron etc.
      • Autonomous: Mercedes-Benz E-Class, BMW 5 Series, Volvo Xc60, Tesla Model S, Tesla Model X, Audi A8.
      • Uber is testing flying taxis and other startups related to the same are growing.

    * Google Apple Samsung these are also working in the field of self-driving cars and flying taxis


    6. Edge computing
    • Definition:

      • Edge computing is a distributed computing paradigm in which computation is largely or completely performed on distributed device nodes known as smart devices or edge devices as opposed to primarily taking place in a centralized cloud environment.
      • Edge computing allows data produced by internet of things (IoT) devices to be processed closer to where it is created instead of sending it across long routes to data centers or clouds.
    • Example:

      • routers, switches, integrated access devices (IADs), multiplexers, and a variety of metropolitan area network (MAN) and wide area network (WAN) access devices
    • Application:
      • internet of things (IoT), network computing etc. 

     

    7. Virtual Reality and Augmented Reality 

    • Definition:

      • Virtual reality (VR) is an interactive computer-generated experience taking place within a simulated environment. This immersive environment can be similar to the real world
      • Augmented reality is a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
    • Example:

      • AR and VR Glasses, (HTC Vive, Oculus go, Playstation VR etc.)
    • Application:

      • Realizing before doing or buying, AR , VR in e commerce , education , court room, and healthcare,  and a vast application.


    8. Internet of Things

    • Definition:

      • The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
    • Example:

      • Kisi Smart Lock, Canary Smart Security System, DHL's IoT Tracking and Monitoring System, Cisco's Connected Factory, ProGlove's Smart Glove.
    • Application:

      • Smart home, smart city, wearables, connected cars, supply chain, smart farming.

     

    9. Cyber Security

    • Definition:

      • Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security
    • Application:

      • Encryption, Authentication, Authorization, Network Security, Security by Design, Secure Coding, Physical Security, VPN, Secure Communication

    10. Renewable energy

    • Definition:

      • energy that is collected from renewable resources, which are naturally replenished on a human timescale, such as sunlight, wind, rain, tides, waves, and geothermal heat.
      • energy from a source that is not depleted when used, such as wind or solar power
    • Example:

      • Solar energy, Wind energy, Hydrostatic energy, Biomass energy, Hydrogen and fuel cells, Geothermal power etc.
    • Application:

      • Renewable energy  can be utilized in our daily life.

    Thursday, January 24, 2019

    Xiaomi's folding phone is the best yet.


    Xiaomi's folding phone

    In a teaser from the company reveal the latest xiaomi folding phone.
    yes, the video revealed that the phone is in working condition and it's very interesting to see a great approach to a phone with a tablet.


    they didn't provide the details about the phone the video is interesting to see. it reveals the functionality of the device and much more things you can watch the video.



    this is the best prototype we have ever seen in the foldable smartphone trend.


     what do you say about the future of the foldable phones, do tell us in the comments below

    Meizu zero: smartphone from the future, specification revealed, world's first smartphone with no buttons, no ports.


    Meizu zero

    , a smartphone from the future having no jack no ports not even for the speaker.
    it seems futuristic isn't it?


    this phone has no buttons, no speakers holes, no charging port, and no SIM card slot.

    KEY SPECS
    Display : 5.99-inch
    Front Camera : 20-megapixel
    Resolution :1080x2160 pixels
    OS : Android
    Rear Camera : 12-megapixel + 20-megapixel



    CAMERA

    Rear camera: 12-megapixel + 20-megapixel
    Rear flash: Yes
    Front camera:  20-megapixel


    SOFTWARE

    Operating system: Android
    Skin:                      Flyme 7


    GENERAL

    Release date: January 2019
    Launched in India: No
    Fast charging Proprietary
    Wireless charging: Yes
    Colors: Black, White


    DISPLAY

    Screen size: 5.99(inches)
    Touchscreen: Yes
    Resolution: 1080x2160 pixels
    AMOLED capacitive touchscreen, 16M colors


    HARDWARE

    Processor: Snapdragon 845
    RAM: 6GB
    Storage: 128GB