Keywords from Day 3 & 4 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi

Further to Day 1 & 2 keywords given here: Keywords from Day 1 & 2 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi | LinkedIn, here are the keywords and details for Day 3 & 4 below: Day 3: Speakers: Swagatam Das | LinkedIn Faizanuddin Ansari…… Continue reading Keywords from Day 3 & 4 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi

Commands, Menus, Architecture & Features of Wireshark – Open source product dissection – Part 1 – Generated by Gemini & ChatGPT

Wireshark is a renowned network protocol analyzer, often considered the standard across many industries. It’s an essential tool for network administrators, security professionals, and anyone looking to monitor and troubleshoot network traffic. Here’s an overview of its main features and architecture: ### Main Features of Wireshark 1. Live Capture and Offline Analysis: Wireshark allows for…… Continue reading Commands, Menus, Architecture & Features of Wireshark – Open source product dissection – Part 1 – Generated by Gemini & ChatGPT

Cyber security tips for Portals – Generated by ChatGPT & GEMINI – Part 1

Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer of security beyond just usernames…… Continue reading Cyber security tips for Portals – Generated by ChatGPT & GEMINI – Part 1

Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1

Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure – Part 1. AWS: Security – AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) – AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance – AWS Prescriptive Guidance (amazon.com) Cloud…… Continue reading Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1

Cyber Security Keywords & Concepts – Part 1

Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding / decodingEncryption and it’s typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS / SSLDOS / DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN / Firewall / IPS /…… Continue reading Cyber Security Keywords & Concepts – Part 1

Security tips for Google Drive & Android

Google Drive: Open Google Drive on web based browser like Chrome On each of the folders if you see a person symbol it’s shared, if you don’t see the symbol its not shared For each folder -> click SHARE -> Advanced -> Check which user has view rights and which user has edit rights ->…… Continue reading Security tips for Google Drive & Android

Information security tips while working with digital sources and internet

Setup OTP and recovery emails for all your accounts Check permissions that various apps have on your phone When you get an option – TRUST THIS DEVICE in Gmail or similar accounts, only select this option on your personal devices not public devices Keep your desktop, laptop & mobiles password protected & encrypted if possible…… Continue reading Information security tips while working with digital sources and internet