Skip to content

Instantly share code, notes, and snippets.

View anishdalvi's full-sized avatar
💤
Codinggggggggggggg

Anish Dalvi anishdalvi

💤
Codinggggggggggggg
View GitHub Profile
@anishdalvi
anishdalvi / cc_ia1.md
Last active May 27, 2024 23:25
CC IA-1 SEM 8

Components in cloud computing architecture

image

Cloud computing technology is used by both small and large organizations to store the information in cloud and access it from anywhere at anytime using the internet connection.

Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture.

Cloud computing architecture consists of two main components: the front end and the back end.

@anishdalvi
anishdalvi / cyber_ia1.md
Created March 12, 2024 18:39
Cyber Security SEM 8 IA-1

Module 1: Introduction to Application Security, Threats, and Attacks

1.1 Introduction to Web Application Reconnaissance: Web application reconnaissance involves gathering information about a target application to identify potential vulnerabilities. This phase is crucial for attackers as it helps them understand the application's architecture, endpoints, and potential weak points. Techniques for reconnaissance include scanning for subdomains, analyzing APIs for security flaws, and mapping out the application's structure.

1.2 Offense: Common Application Security Threats: This section covers various threats that modern web applications face:

  • Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages viewed by other users.
  • Cross-Site Request Forgery (CSRF): Attackers trick users into performing actions on a website without their consent.
@anishdalvi
anishdalvi / bda_ia1.md
Last active May 23, 2024 21:52
BDA IA-1 SEM 8

Core Hadoop Components

image

image

  1. Hadoop Common:
    • Description: Hadoop Common comprises libraries and utilities that provide foundational support for other Hadoop components. It includes common utilities, such as file systems and IO, that are used across various Hadoop modules.
    • Elaboration: Hadoop Common serves as the foundation of the Hadoop ecosystem, providing essential functionalities and APIs for building distributed computing applications. It includes libraries and utilities for file system operations, networking, security, and other core functionalities.
@anishdalvi
anishdalvi / blockchain_ia1.md
Last active May 13, 2024 21:23
Blockchain IA-1 SEM 8

CAP Theorem

Ref

CAP Theorem stands for Consistency, Availability, and Partition Tolerance. According to the theory, a distributed system cannot always ensure consistency, availability, and partition tolerance. When things go wrong, we must prioritize at most two distributed system features and trade-offs between them.

  • CAP Theorem or Brewer’s theorem states that it is feasible to provide either consistency or availability—but not both—in the event of a network failure on a distributed database, a theory from theoretical computer science about distributed data stores. In other words, according to the CAP theorem, a distributed database system that experiences a partition must choose between Consistency and Availability.
  • We must simultaneously communicate over the network and store data among several nodes in a distributed system. A distributed system frequently falls victim to network failures because of its reliance on network calls in a s
@anishdalvi
anishdalvi / PM-IA1.md
Last active May 29, 2024 23:26
PM-IA1 SEM 8

Stage Gate process

The Stage Gate process is a structured innovation management framework comprising several stages linked by gates, each serving a specific purpose in the product development journey. Depending on the project's size and complexity, 2, 3, or all 5 stages may be completed. Here's a breakdown of each stage:

image

Stage 0: Discovery This preliminary phase identifies feasible projects for the company. Ideas are generated through brainstorming involving employees, customers, and suppliers. The selected idea is then proposed, and if deemed unworthy, the gate closes.

Stage 1: Scoping

@anishdalvi
anishdalvi / sem7cyber.md
Last active January 4, 2024 22:55
Cyber SEM 7
  • HIPAA: Health Insurance Portability and Accountability Act.
  • GDPR: General Data Protection Regulation.
  • PCI DSS: Payment Card Industry Data Security Standard.

Module 1 - Basics of Information Security

The primary goals of information security are:

  1. Confidentiality:
  • Restricting access to authorized individuals/entities.
@anishdalvi
anishdalvi / mis_summary.md
Last active January 2, 2024 21:57
Summary Of MIS SEM 7

IA-1 QB

Show how IS can help organization to grow and benefit a society

  1. Enhanced Decision Making
  2. Improved Efficiency and Productivity
  3. Effective Communication and Collaboration
  4. Enhanced Customer Relationship Management (CRM)
  5. Strategic Planning and Competitive Advantage
  6. Global Reach and Market Expansion
@anishdalvi
anishdalvi / mis.md
Last active January 2, 2024 22:21
MIS SEM 7

Knowledge Management Cycle

A functioning KMS follows a cycle that consists of six steps . The reason the system is cyclical is that knowledge is dynamically refined over time.

The knowledge in an effective KMS is never finalized because the environment changes over time and knowledge must be updated to reflect these changes.

Knowledge management system follows a six steps process in a cycle. The reason the system is cyclical is that knowledge is dynamically refined over time. The knowledge in a good KM system is never finished because over time, the environment changes and the knowledge must be updated to reflect the changes. Today’s knowledge may become obsolete if the organization fails to update the knowledge. The knowledge management cycle works as follows:

image

@anishdalvi
anishdalvi / manetsem.md
Last active January 1, 2024 00:17
MANET

What are the objectives of transport layer protocol. Which protocol is used for ad hoc network

Objectives of the Transport Layer Protocol:

The Transport Layer in the OSI model serves several key objectives:

  1. End-to-End Communication:

    • Ensures reliable communication between two devices (endpoints) in a network, regardless of the underlying complexities.
  2. Segmentation and Reassembly:

  1. Explain Concepts of Identification, Authentication, Authorization and Accountability with example?
  2. Explain Access Control Models: Discretionary, Mandatory, Role based and Rule-based with an example.
  3. Explain Access Control Techniques: Constrained User, Access control Matrix, Contentdependent, Context – dependent with an example.
  4. Explain Access Control Methods: Administrative, Physical, Technical, Layering of Access control with an example.
  5. Explain Access Control Monitoring: IDS and IPS and anomaly detection with an example.
  6. Explain Calculating Availability, Mean Time Between Failure (MTBF), Mean Time to Repair (MTTR).