Posts

Showing posts from November, 2020

How Cloud Resiliency organized in Microsoft Azure

Image
Disaster avoidance and Disaster recovery are two concepts used in many industrial areas. The two terms look alike but they are somewhat different based on the situation that we use them in. Sometimes disaster avoidance is also called resiliency. In information technology, these two terms are mainly used in system engineering and system designing areas. So, what is meant by terms resiliency and recoverability? Resiliency expresses the ability to operate services even in a disruptive system event. Recovery means actions needed to perform to make a system work again when a disruption causes a system to fail. For example, resiliency is like building structures to stay stable in an earthquake situation, on the other hand, recoverability means if some disaster happens to the structure how we are going to correct that damage. So, now as we know the meaning of the two terms, let’s move to our main topic, How Cloud Resiliency is organized in Microsoft Azure. Cloud consists of a larger number of...

Network Traffic Identification and Classification with Machine Learning

Image
A computer network should consist of four primary objectives: Fault tolerance, Scalability, Security, and Quality of Service (QoS). These objectives make computer networks efficient, reliable, and suitable to satisfy users' requirements. Network administrators try to continuously improve these properties to give a better experience for their customers. There are various practices network admins can implement to achieve these four main objectives related to computer networking. Knowing about the network is one of the initial and basic activities that we can commonly see in those practices. Network monitoring is the process we use to get to know about the network. Network traffic monitoring plays a significant part in computer networking. It has been used from network resources management to network security-related activities.  Network monitoring is an umbrella term that is used to combine a few other processes/techniques. Network traffic identification and classification (TIC) is a...

Defense in Depth

Image
Old but still Powerful. Defense in depth (DiD) is an attack mitigation strategy that helps organizations and even individual computer users to protect their valuable information and systems from cyber-attacks. Defense in depth practices involve placing multiple layers of security measures to prevent cyber-attacks. These layers include different security techniques and multiple layers from the same technique. The simple idea is, if one security control fails, then there are multiple security layers that prevent cyber-attack. This approach is also called the castle approach because it aims on arranging layers of security measures similar to a castle where there are multiple strengthened walls. This type of security placement will help to protect resources from attacks that originated in various ways and in an attack situation it will buy more time for security engineers to initiate countermeasures. There is no single solution ever implemented that can protect valuable information with on...

MalLocker.B

Image
New  Malware Affecting A ndroid Users. Malware has been there for a very long time from the beginning of computer systems. Any computer system could be a target for a malware attack. The common intention of any malware is to cause damage to computer systems. Before the era of smart devices, malware was mainly designed to attack servers, personal computers, and likewise. However, with the rapid increase of smart devices, malware attack surfaces grew rapidly. Smart devices became a comparably easy target for threat actors because of the extensive user base, less knowledge of users about the device, users trying to add various applications without checking their background, along with many other reasons. These reasons enable attackers to quickly and easily spread malware to smart devices. Ransomware is one type of malware that causes huge losses for both business and personal computer systems in current times. This type of malware holds the computer system in a captive state until t...