Author Archive Jayanthi

ByJayanthi

Magic of ‘Belur’!

I have always been a fan of history and particularly Indian history. India is a glorious and old country with a rich heritage. There are numerous temples and other architectural monuments all around the country which are several hundred years old. While I have never had the opportunity to visit the monuments in the Northern part of India, the temples at Hampi, Halebidu and Belur(in the southern part of India) hold a special place in my heart. Words and pictures do poor justice to the exotic monuments.Join me as I try to recreate the magic of  ‘Belur’ in this post.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definition of the day: Honeypots

“Honeypots” in network security is a computer system which entices hackers to attack it. ย All ports are kept open on the ย system and the computer acts normally with its services(but in reality, it is isolated and monitored) The main idea behind setting up “honeypots” is used to study the motives of malicious individuals and track their actions.

 

 

It must be noted that none of the production systems are connected to the “honeypot” system and no vital business information is lost during the “honeypot” project.

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Introduction to Bitcoins

Even as the Bitcoin fork is making news, and there is ย “Bitcoin” and ย “Bitcoin cash” now, we will deal with the elementary aspects of “Bitcoin” and “Blockchain” in this post.

“Bitcoin” first appeared in 2009, but they are much more prominent now, thanks be to better adoption by individuals and professionals. In this post, we will understand the meaning of the “Bitcoin” cryptocurrency, some basic terms related to it and the way it works.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definitions: What is “Deep web?”

Coming close on the heels of my previous post –  “Dark web“, we will be defining “Deep web” in this blog post.  Similar to “Dark web, the “Deep web” cannot be searched by traditional search engines as well. So, what is present in this “Deep web”, which sounds so similar to “Dark web”?  Here are a few features of the “Deep web”:

1. They cannot be indexed by popular search engines as well.

2.  The “Deep web” has content that you do not want everyone to see. The “Deep web” contents are:bank account statements,  contents of your email , medical information, academic information, databases and any dynamically generated information.

While “Dark web” is associated with illegal content, “Deep web” does not have that connotation.

3. In addition, it does not require special browsers to view it.

As seen in the previous blog post, surface web(the place where we mostly interact like Facebook, Twitter and other social media channels), the “Deep web” and the “Dark web” are best represented by an “iceberg”. The iceberg is the perfect representation of the amount of information that is visible to us (which is hardly any!)

Join me as I uncover more of the tangled web in Information Security! ๐Ÿ™‚

 

 

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definitions: What is “Dark web”?

“Dark web” which is not to be confused with “Deep web” is that part of the web which cannot be accessed by traditional search engines likes Google, Bing or Yahoo. In addition to this, it can only be accessed by special browsers like ‘Tor – the Onion router’ or ‘I2P'(Invisible Internet project). The “Tor router” enables anonymizedย browsing of the “dark web”.

“Dark web” domains end with “.onion” and are purposefully hidden from popular search engines. They are used to host a number of illegal activities.

 

Images source: Google images

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Who talks more?

….Men or Women? ๐Ÿ™‚ Yes – I know, I know – ย the answer seems to be pretty obvious about who is more loquacious but still it piqued my interest to write about it… ๐Ÿ™‚ However, it is to be noted – that there is no scientific reasoning behind my blog post – just ย some honest observations around my world!! ๐Ÿ™‚

In my universe, “the fair gender” is the one who has to more to say at all times! (I am sure there are a few exceptions to this rule – though I would find it hard to believe that!! :)) We,women ย have a lot to say,express, state, discuss, rant, gossip, agree, disagree on a variety of topics about almost everything in the world! ๐Ÿ˜‰ which, is a good thing as effective communication is the key to success, I would say…There is a great deal of pleasure women derive from just talking and sharing ideas… ๐Ÿ™‚

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Social media security!

Continuously toying with a new idea for the technical blog post for several weeks, I couldn’t help but post about “Social media security” finally!

We live in an era where “sharing is caring” and the more we share with our friends and well wishers, the happier we are. Contrast this is to the time, when snail mail was sent and received only in  totally sealed envelopes that nobody could see! As times have changed and social media plays a huge role in most of our lives for different reasons, it is but necessary to adopt some safety standards as we share and care.

As an ardent follower of Information security practices I see how simple data sharing can potentially open the doors for invisible hackers. My InfoSec brain is, tuned and wired differently and I see social media broadcasts in a totally different way! This post lists certain vulnerabilities that social media presents and some common ways to avoid it.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Wireless security

Look around you and you see everything has become wireless and more mobile than 10 years ago. Wireless technologies have seen increased growth as being tied to desktops, landline phones have become passรฉ. We see laptops with Wi-Fi connectivity that gives one the ultimate freedom to do business or do casual browsing on the go. In addition to this we also have numerous wireless devices such as the wireless mouse, wireless speakers, wireless headphones and wireless cameras. Another interesting development on the wireless front is the wireless POS terminal that again gives more convenience to the end user and the merchant. Given all these wireless developments, it is but necessary to secure them, using good policies and adopting latest standards.

We start our discussion on wireless security by first seeing the working of the WLAN, security issues with wireless networks followed by the countermeasures that seek to block these security issues.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Why do we Tamilians not have a last name?

Frankly, I have no idea!! ๐Ÿ™‚ If you do please comment below…

But I can share some thoughts regarding our first and last name business! While for most of the world specifying a first and last name is the easiest thing to do – it is not so for us who belong to one particular state in India, Tamil Nadu!! Specifying first and last names is Greek and Latin to most of us who are Tamilians. I used to be petrified of applications that asked for

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Intrusion Detection systems

 

‘Perimeter security’ is placing defenses around an organization’s perimeter thereby ensuring that an organization’s chances of being compromised are minimal. Some of the components that are used to ensure perimeter security are routers, VPN, IDS, IPS, firewalls and so on. We will see one type of perimeter security device the ‘IDS’ or ‘Intrusion Detection system’ in this post.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚