Category Archive Beginner

ByJayanthi

Cryptography

After having done numerous posts on Information security, here is another basic and elementary concept in Information security – ‘Cryptography’. The concept of Cryptography also encloses encryption and decryption. 

Like any other subject, the field of Cryptography is another massive ocean of information. It is the technique of hiding information to bolster secure communication. Cryptographic techniques are an absolute necessity in this digital age where any information can be snooped on. These are a few basic concepts related to Cryptography:

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

XOR operator in Java

In the Java programming language, a ‘variable’ is used to store a value. Different kinds of operations can be performed on the variables by means of ‘operators’.  The Java programming language has a number of operators and these are listed below:

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

VPN(Virtual private network)

VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is easy and comfortable to make use of free and open Wi-Fi in open spaces to access corporate resources, it is highly susceptible to different types of attacks(stealing your password might be the simplest one) VPNs enable professionals to access corporate resources in a safe and secure manner.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Object oriented programming

‘Object oriented programming’ is a type of programming which involves object oriented principles like encapsulation, polymorphism and inheritance. These principles are implemented by means of classes, methods, variables and other constructs in Java. We saw a sneak peek into object oriented programming in the Java 101 post. 

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

List of Information security certifications

‘Information security’ briefly is that branch of study that deals with securing data and identifying weaknesses in systems and sealing them. Anti-virus software, firewalls are simple aspects of ‘Information security’ that we use unknowingly. There are a number of Information security certifications and we will review some of them here:

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Java 101

‘Java’ the object oriented programming language was developed by James Gosling of Sun Microsystems(now a part of Oracle) in 1995. It is a platform independent programming language meaning that once a Java program is written and compiled – the compiled program can run on any architecture(Apple, Windows etc)It is this feature that makes it flexible. It is also much easier to work with Java than other programming languages like C++.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Hyperledger Composer

Even as the Block chain technology is in its nascent stages and everybody is trying to understand it – there are organizations which have started collaborative efforts to harness the power of blockchain.  One such endeavor is the IBM Hyperledger open source project which is hosted by the Linux foundation to build blockchain applications efficiently and quickly. It is a “global collaboration” with entities from different sectors such as finance, retail, IoT, manufacturing included in it. 

IBM Hyperledger Composer playground:

The IBM Hyperledger Composer is a fast and efficient way of building block chain applications. While it normally takes a few months to build a blockchain for a business network, by means of the IBM Hyperledger Composer, the same can be achieved in a few weeks time.  It consists of a IBM Hyperledger Composer Playground to learn,build and test blockchains networks. 

The IBM Hyperledger Composer playground is available  from this link. This post will give a high level view of the Hyperledger Composer playground. The Hyperledger composer playground runs inside a Docker container and can be installed and worked with in any of the two modes:

a. a browser mode

b. Hyperledger Fabric peer network

There are three main actors in the Composer playground – Assets, Transactions and Participants.

Assets – As we already seen, asset is anything that has value. It is the main part of the trade. Examples of assets can be car, house, patent 

Transactions – Transactions are those events that we achieve with the ‘Assets’. For example, if ‘Car’ is an asset, ‘transferring’ car ownership might be a transaction.

Participants – are the major actors who take part in the block chain business network. For example, the buyer and seller are participants.

The Model(.cto file), script file(written in Javascript and holds the business logic) and access control(.acl file) files are appropriately configured. The business network is deployed. The network is tested by adding participants, assets and performing transactions. All transactions are recorded in the Block chain that we have created and can be viewed. 

This post involved the basics of working with Hyperledger Composer playground and is for the alphabet ‘H’ for the Blogchatter challenge… the previous post is here

 

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Go Green!!

Even as we grumble about the different types of pollution, is is quite ironic to note that “we” are the cause of the pollution! We are the cause of the different types of pollution – air pollution, water pollution, noise pollution. The ocean is our greatest dumping ground. Everything from garbage, cartons, plastic, to untreated sewage water lands in the ocean. Pollution has taken epic proportions and the different types of pollution like air pollution, water pollution, soil pollution are set to control(or already controlling) our life.  Pollution has led to global warming which in turn again affects us directly. Let us see a few ways to reduce pollution and keep our planet green!

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Four concepts of Blockchain

Blockchain, the technology disrupter and the decentralized shared ledger has four important points that essentially define it. They are: Consensus, Immutability, Finality, Provenance. This blog post will define these four important concepts.

Provenance:

Blockchain will be a game changer for the supply chain management system. The IBM business blog describes provenance as an “immutable audit trail of ownership & location as it changes over time” (Source: https://www.ibm.com/blogs/insights-on-business/government/proving-provenance-with-blockchain/) This audit trail promotes transparency that can never be achieved with traditional database systems.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚

ByJayanthi

Caesar Cipher

After having done a couple of posts on the Blockchain technology for the A2Z Blogchatter challenge, I have resumed my writing in the Information security field and a fun cipher called the ‘Caesar cipher’. But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.

From time immemorial, we are trying to make sure that important and crucial information is readable only by the right people once it has reached its destination. What if a crucial message falls into wrong hands and is read by them? This is prevented by making use of Cryptography and its various strategies.There are a number of ways(or technically called ‘ciphers’) to hide a message and the Caesar cipher is just one of them. This is done by encoding(converting to a special form) the information to be sent at the sender’s end and decoding(re-converting to original form) the information on the receiver’s end.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! πŸ™‚