Posts

Showing posts from 2018

Investigating the concept of Mining Bitcoin

Image
What is crypto currency? Crypto currency types and the most famous one. What is crypto currency mining? Process behind the bitcoin mining. Concept of ‘nonce’. Can anyone do bitcoin mining with standard PC’s? Equipment’s required for mining bitcoin. Best strategy for mining bitcoins. 1. What is crypto currency? It is a digital form of currency designed for exchange of money securely and anonymously by fulfilling specific conditions. These conditions are being created on the basis of the cryptographically created hashes , so complex that makes it almost impossible to crack. These can be transferred across 7 oceans without any transportation costs and saving time concurrently. This modernization in the way of sharing money made crypto currency quite famous in this technical world converting legible information into an almost uncrackable code, to help track purchases and transfers. For simple ,you could take an example of a puzzle game that is being played

CISSP,The most reputed exam of Information Security?

Image
CISSP is the most reputed exam of Information Security Domain 1: Security and Risk Management 15% Domain 2: Asset Security 10% Domain 3: Security Architecture and Engineering 13% Domain 4: Communication and Network Security 14% Domain 5: Identity and Access Management (IAM) 13% Domain 6: Security Assessment and Testing 12% Domain 7: Security Operations 13% Domain 8: Software Development Security 10% Total 100% CISSP (Certified Information Systems Security Professional) is the gold standard defined by (ISC)². This professional certification is universally accepted as validating the proficiency of security professionals. Ranging from basic security design to addressing the most crucial security challenges, CISSP certification training is a hands-on course that covers all vital domains of the security practice area. Codec Networks provides best CISSP training in Delhi has the following domains as per new curriculum help you gain in-depth understanding of all aspects

Enhance Your Data Security and Business Performance using ISO 27001

Image
ISO 27001 Information Security Management System is an International Standard to strengthen the Information Security of any organisation. This is a powerful framework which helps the organisation to protect their data. An ISO certification is an external assurance to improve trust with both new and existing customers. While it’s impossible to guarantee security against a wide variety of intrusions, ISO 27001 greatly increases your odds of success. Why You Need ISO 27001 Information security and Cyber Security is the main concern of the organisation’s now a days. Data has become the most crucial asset .Since data is available in both electronic and non-electronic format ISMS gives control to safeguard both of them. Companies typically seek ISO 27001 because they do business overseas and in many cases are required to get the certification. In addition to being able to do business overseas, ISO 27001 has side benefits such as productivity and efficiency gains throughout the wh

Bug Bounty Hunting, it’s pros and cons

Image
What is bug bounty? Why bug bounty programs are held? How can one earn money by bug bounty hunting? What is the scope of bug bounty hunting? What are the pre requisite to become a successful bug bounty hunter? Sites that host bug bounty programs. Some best sources to start career bug bounty hunting. Pros and Cons of bug bounty hunting. What is bug bounty hunting? Bug bounty programs are a col-lab of companies and white-hat hackers to work    together exposing security vulnerabilities and bugs in a company’s technology. Most importantly, the companies executing bug bounty programs can set ground rules and limitations of how they want hackers to test their site, how far they can go breaking their website and what kind of compensation hackers can expect to receive for reporting vulnerabilities. Why bug bounty programs are held? Developers at companies develops the code but sometimes some mistakes or flows are made and left unseen. Mistake can be as small

Entry widgets with Python

Image
Entry widgets are the basic widgets of Tkinter used to get input, i.e. text strings, from the user of an application. This widget allows the user to enter a single line of text. If the user enters a string, which is longer than the available display space of the widget, the content will be scrolled. This means that the string cannot be seen in its entirety. The arrow keys can be used to move to the invisible parts of the string. If you want to enter multiple lines of text, you have to use the text widget. An entry widget is also limited to single font. The syntax of an entry widget looks like this: w = Entry(master, option, ... ) "master" represents the parent window, where the entry widget should be placed. Like other widgets, it's possible to further influence the rendering of the widget by using options. The comma separated list of options can be empty. The following simple example creates an application with two entry fields. One for entering a last name

Create a MessageBox in Python

Image
To show a message box using Tkinter, you can use messagebox library like this: from tkinter import messagebox showinfo('Message title' , 'Message content') Pretty easy!! Let’s show a message box when the user clicks a button.  The output of the above code is shown below: And when you will press the created button, a messagebox will appear on the screen as shown below: ABOUT : The programming language you will learn is Python . Python is an example of a highlevel language; other high-level languages you might have heard of are C, C++, Perl, and Java. There are also low-level languages, sometimes referred to as “machine languages” or “assembly languages.” Loosely speaking, computers can only run programs written in low-level languages. So programs written in a high-level language have to be processed before they can run. This extra processing takes some time, which is a small disadvantage of high-level languages. The advantages are enorm

How an effective ISO 27001 can help you achieve GDPR?

Image
Overview ISO 27001:2013 is Information Security Management System (ISMS). This is an international standard which has framework of policies and procedures that includes all technical, physical, legal and administrative controls involved in an organisation's information risk management processes. General Data Protection Regulation ( GDPR ) is meant for protection of all the European citizen's personal data. It is a Regulation in European Union Law on Data Protection and privacy for all individuals within the European Union. Structure ISO 27001:2013 has 7 strategic clauses 14 generic clauses and 114 controls which covers end to end information security of organisations GDPR consists of 99 articles, which is further grouped into 11 chapters and an additional 171 recitals with explanatory remarks. The basis of both ISMS and GDPR is integrity, availability and confidentiality. How ISO 27001 helps If we look at Article 32(Security in processing) of the GDPR there requirem

ISACA Certifications

Image
Information technology is an exploring career where we can choose a variety of specialization as we get more and more experienced. IT also presents exciting opportunities and challenges from time to time. However, one thing to note is that IT is not stagnant. As professionals working in this industry, we     need to keep up with these changes and one of the way we do so is turn to IT certifications When it comes to the value of certifications in the technology industry there are mixed reactions. While some see them as validation of their skills and proof of their ability, some senior workers hold the opposite point of view. Nevertheless, one thing for sure is that once we get an IT certification, we join a select group of individuals with demonstrated skills. This shows that apart from possessing comprehensive knowledge of the technology, we also care enough about our own career to spend the time and money to get certified. ISACA is a not-for-profit, independent authority that r