Wednesday, February 27, 2019

Registration process for ONE WEEK NATIONAL WORKSHOP ON IMAGE PROCESSING, COMPUTER VISION AND APPLICATION (IPCVA-2019)

please follow the following stapes.


1. Download form
2. print it.
3. fill it.
3.take it's photo.
4. convert it into pdf
5.save it in a folder named "your name"
6.this folder should contain pdf of your form and your fee recipt in PDF form
7.create a Zip file of that folder and it's name should be on your name.
8. mail this Zip file to ipcva2019@gmail.com
9.congratulation you are done. have fun.

Tuesday, February 26, 2019

Security threts to E-commerce.

All the security issues in the payment system through online system come in category of Security threats to E-commerce.
before we procede further we need to know following things. 

Electronic payment system



An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It’s also called an electronic payment system or online payment system

Payment Gateway

A payment gateway is an e-commerce service that processes credit card payments for online and traditional brick and mortar stores. Payment gateways facilitate these transactions by transferring key information between payment portals such as web-enabled mobile devices/websites and the front end processor/bank.
Payment gateways include PayPal, Google Pay(TEZ), Apple Pay, Ali Pay and Amazon Pay.

Monday, February 25, 2019

What is deffrence Among Private Network, Intranet, Extranet and, Internet?

Private network

the Internet addressing architecture, a private network is a network that uses private IP address space. Both, the IPv4 and the IPv6 specifications define private addressing ranges. These addresses are commonly used for local area networks in residential, office, and enterprise environments.

Intranet

An intranet is a private network accessible only to an organization's staff. Often, a wide range of information and services are available on an organization's internal intranet that are unavailable to the public, unlike the Internet

Extranet

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorized parties, without granting access to an organization's entire network. An extranet is a private network organization.

Historically the term was occasionally also used in the sense of two organizations sharing their internal networks over a VPN.

Internet

The Internet (contraction of interconnected network) is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

 

 Relation Between Private Network, intranet, Extranet and, Internet

 

 

what is firewall, VPN(virtual private network) and, Private network ?

FIREWALL: 

a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks and run on network hardware. Host-based firewalls run on host computers and control network traffic in and out of those machines.  




VPN(virtual private network):

 A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network.

VPN technology was developed to allow remote users and branch offices to access corporate applications and resources. To ensure security, the private network connection is established using an encrypted layered tunneling protocol and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN. In other applications, Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers to protect personal identity and location to stay anonymous on the Internet. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions, and many VPN providers have been developing strategies to get around these roadblock

Private network

the Internet addressing architecture, a private network is a network that uses private IP address space. Both, the IPv4 and the IPv6 specifications define private addressing ranges. These addresses are commonly used for local area networks in residential, office, and enterprise environments.

Tuesday, February 12, 2019

what is application security ? and it's types.

Application security:

It ensures the security of an application by taking some measures to protect the application from external threats. it is the use of software, hardware, and procedural methods to protect applications from external threats. security is becoming an increasingly important concern during the development as the application become more frequently accessible over the network and as result they become vulnerable to a wide verity of threats

Application security includes the following things 

1. knowing your threats 

2. securing the network host and network

3.encorporating security in the software development process


Issues of application security.

the important issues of application security include the following.


1.verification of users: 

an application needs to verify that only legitimate user or trying to use them. the identification of legitimate users by identifying their IP address



2. granting access to the user:

once a user is authenticated the application needs to determine if the identified user allowed to access the functionality requested by him. this is called authorization.



3. keeping the data confidential with encryption:

for business, transaction data from application system get exchange over the network. data stored by the application system need to be transmitted in encrypted form to prevent it from the potential attack.

4. Guaranteeing Data Integrity 

when the receivers get a message neither the sender nor the receiver can refuse it. That is the denial of authentication of the message. A digital signature is a common mechanism to guarantee data integrity.

5. Safeguarding application form common attack strategies 


6. Guarding the privacy of the application

Types of application security


1. email security 

Threats to email.
1. Junk file
Junk file is a very common term, that describes any orphaned file or it has no real value. Junk files are commonly referred among technologists ghost files or fantom files.


2. spam

Email spamming is an act of sending unsolicited bulk eMails, which one has not asked for. These are from commercial companies as an advertisement.


3. virus

Some emails may incorporate with files containing malicious scripts which may run on your computer and may lead to destroy or leak your important data.


4. Fishing

Email fishing is an activity of sending email to a user claiming to be a legitimate user of any enterprise. Its main purpose is to steal sensitive information such as password, username, etc.

Such e-mail contact with such websites Which are infected with viruses and ask for entering the details. This website looks like a legitimate enterprise.



5. Cleanup and archiving email

in order to have lightweight inbox its good to archive your inbox from time to time.
there are few steps to clean up and archive your inbox.
stapes:

  1.  select the file tab on the mail banner.
  2. select cleanup tools button on the account information screen.
  3.  select archive from cleanup tool dropdown menu.
  4. select archive this folder and all subfolder options and then click on the folder you want to archive.
  5. select the date from the archive items older than
  6. click browse to 'create new.pst' file name and location. and click 'ok'


2. database security

databases are a cardinal component of any web-based application that enables websites to provide varying dynamic content. databases to are usually intended to be shared across the deferent application thus the database security is primarily concern with the secrecy of data. it ranges from protection from intentional unauthorized database user to unintentional database accesses by unauthorized entities
the general categories of secrecy related problems in database management systems are:
  1. improper release of information from reading data that were intentionally accessed by an unauthorized user.
  2. the improper modification of data.
  3. denial of services(DOS) threats


threats to database security

  1. data tempering
  2. data theft
  3. password related threats
  4. falsification of user identification
  5. unauthorized access to tables and columns
  6. unauthorized access to data rows lack accountability


3. internet security

it contains IPSec(Internet Security Protocol) and SSL(Secure Socket Layer)

Internet security refers to securing communication over the internet it encompasses browser security, data security, net security and overall authentication and protection of data sent via internet protocol
1.IPSec(Internet Security Protocol)
2. SSL(Secure Socket Layer)


1.IPSec(Internet Security Protocol)


it consists of a set of a protocol designed by IETF(Internet Engineering Task Force) it provides security at the network level and helps to create authenticated and confidential packets for IP layer 


2. SSL(Secure Socket Layer)


it is a security protocol developed by net scape communication corporation. it provides security at the transport layer and includes the important security issues like confidentiality integrity and authenticity 



Threats to internet security


it includes specific security protocol such as


  1. worms
  2. malware
  3. ransomware
  4. spam
  5. fishing
  6. spoofing



Backup 


data backup refers to copying data into an archiving file. it may be used to restore the original content after a data loss event. 


  1. data backups have two main purpose the primary purpose is to recover the data after it's lost. (either by data deletion or corruption )
  2. the secondary purpose of data backups is to recover the data  from an earlier time 


Sunday, February 3, 2019

Top technology trends in 2019: Technologies, that will take the world by storm this year. AI ML cyber security, IoT, edge computing etc..

 Top Technology Trends in 2019


  Technologies, that will take the world by storm this year.


1. Artificial Intelligence(AI) 

  • Definition: 

    • Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems or AI is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
    • a branch of computer science dealing with the simulation of intelligent behavior in computers
  • Example:

    • Popular AI cloud offerings include Amazon AI services, IBM Watson Assistant, Microsoft Cognitive Services and Google AI services, Virtual assistant (Google Assistant, Amazon Alexa, Apple SIRI, Samsung’s Bixby
  • Application:

    • AI camera mode, AI based usage pattern, AI chat-bots etc.

 

2. Machine Learning

  • Definition: 

    • Machine learning is the scientific study of algorithms and statistical models that computer systems use to progressively improve their performance on a specific task
    • Machine Learning is the Field of study that gives computers the capability to learn without being explicitly programmed.
  • Example:

    • Image, speech recognisation medical diagnosis, market future etc.
  • Application:

    • Self driving car, spam detection and filtering, social media ads etc. 

 

3. Blockchain

  • Definition:

    • A blockchain is literally a chain of blocks. it is a growing list of records(blocks) which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data
  • Example:

    • Crypto currency like bitcoin, ethereum, munero etc.
  • Application:

    • Crypto currency payment, voting, Land Registry, digital ledger Smart contact, digital identification or signature, blockchain IoT, and thousends of application

 

4. 5G Technology

  • Definition:

    • It is the 5th generation of wireless network technology
    • With each generation it improves the speed, security safety, and bandwidth.
  • Application:

    • Mobile networks, broadbands, etc.

6. Electric, self driving cars and Flying Taxis
  • Definition:

    • Electric cars are the cars that run by the power of electricity.
    • Self driving cars are the cars which are driverless.
    • flying Cars or taxis that uses air medium for transportation are called flying taxi or flying cars.
  • Example:

    • Electric: Tesla model 3, model x, etc. and BMW i3, Hyundai ionic, Audi e-tron etc.
    • Autonomous: Mercedes-Benz E-Class, BMW 5 Series, Volvo Xc60, Tesla Model S, Tesla Model X, Audi A8.
    • Uber is testing flying taxis and other startups related to the same are growing.

* Google Apple Samsung these are also working in the field of self-driving cars and flying taxis


6. Edge computing
  • Definition:

    • Edge computing is a distributed computing paradigm in which computation is largely or completely performed on distributed device nodes known as smart devices or edge devices as opposed to primarily taking place in a centralized cloud environment.
    • Edge computing allows data produced by internet of things (IoT) devices to be processed closer to where it is created instead of sending it across long routes to data centers or clouds.
  • Example:

    • routers, switches, integrated access devices (IADs), multiplexers, and a variety of metropolitan area network (MAN) and wide area network (WAN) access devices
  • Application:
    • internet of things (IoT), network computing etc. 

 

7. Virtual Reality and Augmented Reality 

  • Definition:

    • Virtual reality (VR) is an interactive computer-generated experience taking place within a simulated environment. This immersive environment can be similar to the real world
    • Augmented reality is a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
  • Example:

    • AR and VR Glasses, (HTC Vive, Oculus go, Playstation VR etc.)
  • Application:

    • Realizing before doing or buying, AR , VR in e commerce , education , court room, and healthcare,  and a vast application.


8. Internet of Things

  • Definition:

    • The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
  • Example:

    • Kisi Smart Lock, Canary Smart Security System, DHL's IoT Tracking and Monitoring System, Cisco's Connected Factory, ProGlove's Smart Glove.
  • Application:

    • Smart home, smart city, wearables, connected cars, supply chain, smart farming.

 

9. Cyber Security

  • Definition:

    • Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security
  • Application:

    • Encryption, Authentication, Authorization, Network Security, Security by Design, Secure Coding, Physical Security, VPN, Secure Communication

10. Renewable energy

  • Definition:

    • energy that is collected from renewable resources, which are naturally replenished on a human timescale, such as sunlight, wind, rain, tides, waves, and geothermal heat.
    • energy from a source that is not depleted when used, such as wind or solar power
  • Example:

    • Solar energy, Wind energy, Hydrostatic energy, Biomass energy, Hydrogen and fuel cells, Geothermal power etc.
  • Application:

    • Renewable energy  can be utilized in our daily life.