AAD is Microsoft’s cloud-based identity and access management service. It is used by organizations to enable their employees, guests, and others to sign in and access the resources they need. There are two such as:
Internal resources, such as apps on your corporate network and intranet, and cloud apps developed by your own organization.
External services, such as Microsoft Office 365, the Azure portal, and any SaaS applications used by your organization.
Azure AD also allows organizations to securely enable the use of personal devices, such as mobiles and tablets, and enable collaboration with business partners and customers.
Azure AD is available in four editions such as Free, Office 365 Apps, Premium P1, and Premium P2.
Azure Active Directory Free – The free version allows you to administer users and create groups, synchronize with on-premises Active Directory, create basic reports, configure self-service password changes for cloud users, and enable single sign-on across Azure, Microsoft 365, and many popular SaaS apps.
Office 365 Apps – The Office 365 Apps edition allows you to do everything included in the free version, plus self-service password reset for cloud users, and device write-back, which offers two-way synchronization between on-premises directories and Azure AD.
Azure Active Directory Premium P2 – The Premium P2 offers all the Premium P1 features, and Azure Active Directory Identity Protection to help provide risk-based Conditional Access to your apps and critical company data.
OT is the practice of using hardware or software that is used to control physical processes, devices and infrastructure. It includes systems that are used in manufacturing, energy, medicine, building management, and other industries.
OT monitors and manages industrial processes and manufacturing equipment’s and keep them running.
Components for OT
Industrial Control System (ICS)
ICS are the main component of OT that includes different types of devices, systems, controls, and networks that manage a variety of industrial processes.
Supervisory Control and Data Acquisition (SCADA)
SCADA is a data collecting system from sensors, often at distributed sites which sends it to a central computer that manages and controls the data.
Challenges for OT security
Lack of risk mitigation and remediation
Lack of awareness among OT staff
Hard to test production environments
Limited security awareness
Limited patching
How IT is different from OT Network Solution
IT mainly focuses on the user experience, performance of the transmission, ease of operation based on standards. Secondly, IT focuses on integrity, availability of system and confidentiality whereas OT focuses on the safe operation of plants having reliable data transmission for time-critical applications and also controls equipment’s, information technology and controls data.
IT Requirements
OT Requirements
Products of Operational Technology (OT)
Following are the products of OT marketed by different companies:
Products In Operational Technology (OT) Security Market by Darktrace
Nozomi Networks Guardian by Nozomi Networks
Kaspersky Industrial CyberSecurity (KICS) by Kaspersky
Explicit Knowlege : Knowledge i.e eazy to write down & share
Implicit Knowledge: Applied Knowledge
Tacit Knowledge: Knowledge i.e. gained through personnal experience
Knowledge Management Process
Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.
Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.
There are lot of buzz going around on the crypto market, here there is something that many crypto investors were waiting to hear & holding on to their breath.
The Indian panel court are NOT Banning Cryptocurrency, yes you heard it right there is “No Ban on Crypt” but it will be regulated by none other than the SEBI government body.
The Cryptocurrency and Regulation of Official Digital Currency Bill, 2021 brings regulation not ban, industry sources told the Indian Electronic Media.
These are the following 10 points which are the “The Big Story”:
It was learnt on Tuesday that the Centre could bring a Bill in the winter session of Parliament to bar all cryptocurrencies in India, barring a few exceptions, and create a framework to regulate digital currency issued by the Reserve Bank of India (RBI).
In response, all major digital currencies saw a fall of around 15 per cent and more, with Bitcoin down by around 18.53 per cent, Ethereum fell by 15.58 per cent, and Tether down by 18.29 per cent.
But as the news of regulation, not ban, came out, markets seem to be stabilising.
India’s has had a hot-cold relationship with crypto. The RBI had banned it in 2018 voicing “serious concerns” about private cryptocurrencies.
Then the Supreme Court of India had lifted the ban in 2020 and now in 2021 negotiations are on between industry stakeholders and the Centre to bring in a regulation that will put corrupt practices to check.
According to Blockchain and Crypto Assets Council, India holds about ₹ 6 lakh crore in crypto assets.
Last week, the Standing Committee on Finance, chaired by BJP member Jayant Sinha, met the representatives of crypto exchanges, blockchain and Crypto Assets Council (BACC), among others, and arrived at a conclusion that cryptocurrencies should not be banned, but it should be regulated.
Delivering a keynote address at the Sydney Dialogue on November 18, Prime Minister Narendra Modi had urged all countries to ensure that cryptocurrency does not “end up in the wrong hands”.
Private digital currencies have gained popularity in the past decade or so. However, regulators and governments have been sceptical about these currencies and are apprehensive about the associated risks.
Recently, there have been a rising number of advertisements promising easy and high returns on investments in cryptocurrencies, amid concerns over such currencies being allegedly used for luring investors with misleading claims.
Sources: NDTV News : click the link for more information.
If you want to know more about what’s happening in the world of Crypto, then stay connected with DocTooLss , or just drop an email to info@doctoolss.com or contact the undersigned.
Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.
Although Cryptocurrency is an ocean itself, here we are trying to understandthe basis of it, lets see some technical terms related to cryptocurrency.
What is Cryptocurrency?
Cryptocurrency is a type of digital currency which uses digital files as money.
In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.
What is the role of Blockchain in cryptocurrency?
Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.
If you want toknowmore about it, then justdrop an email to info@doctoolss.com or contact the undersigned.
Whenever we are in a group surrounded by Cyber experts somewhere or the other talk there is a discussion on this tool known as SPLUNK. Some get goosebumps and don’t understand what is this greek talking about either we start turning back our mind pages or mostly we do Google.
So here we talk about in gist as what exactly is SPLUNK:
SPLUNK
What is Splunk?
Splunk is a tool that is used for monitoring, searching, analyzing and visualizing machine-generated data in real-time. It helps improve velocity, quality and the business impact of app delivery. It is commonly used for information security and development operations and more advanced use cases for custom machines, the Internet of Things, and mobile devices.
How it Works?
It indexes and correlates information in a container that makes it searchable and possible to generate alerts, reports, and visualizations.
What is Splunk in DevOps?
For IT teams adopting DevOps, Splunk software helps improve velocity, quality, and app delivery’s business impact.
SIEM:Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.
How do SIEM works?
It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins.
SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.
By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management systemimproves investigative efficiency and reduces time wasted on false positives.
The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.
Main features of SIEM
Threat Detection
Investigation
Time to respond
SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.
If you want tomore about it, then justdrop an email to info@doctoolss.com or contact the undersigned.
Day in day out we talk about the cloud and the services provided by them. The market today is led by AWS followed by Azure and catching up are GCP (Google Cloud Platform).
There are around 160+ services provided by AWS and counts are adding up whereas in Azure the services are lesser than AWS but are also getting added up with time.
Let’s have a sneek peek at some of the important services by these market leaders:
AWS Rekognition/Lex/Polly/TranscribeVsAzure Cognitive Service
For more information on the above AWS services, click here
For more information on the above Azure services, click here
We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS& Azureongoing cloud services.
We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email toinfo@doctoolss.com or contact the undersigned .
As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.
SMS Rule
Social Distancing
Masking
Sanitizing
So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.
Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website Amazon.com
There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .
What are Robots?
Robots are the intersection of science, engineering and technology that produces machines.
Types of Robots
Pre-Programmed Robots
Humanoid Robots
Autonomous Robots
Teleoperated Robots
Augmenting Robots
Uses of Robots
Manufacturing
Logistics
Home
Travel
Healthcare
Differences between Cobots & Robots
Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.
As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine is out and its dosage has been started. So we hope we all get the vaccine and we start engaging in our day to day normal life activities as it was before the COVID19 days.
It seems that Mark Zuckerberg’s security norms still needs some more modifications as its recently acquired WhatsApp the king in messenger platform has been in news due to some data leakage reasons yet again.
In the recent notification issued by WhatsApp where they have mentioned the recent update on their application which has taken the world with a storm, as it show cast the vulnerabilities it lacks.
So here at DocTooLss we compare our three Messengers which are in news and compare with eachother:
WHATSAPP
WHATSAPP
WhatsApp has kept end-to-end encryption. Plus, E2E on WhatsApp is available on every single mode of communication that the app enables such as messages, video calls, voice calls, photos, and anything else you share is E2E encrypted on WhatsApp.
What does E2E means?
E2E meaning that you and the recipient are the only people who can read the messages you send to them. WhatsApp can’t decrypt the contents of your messages, calls, photos, etc, thus ensuring your security and privacy.
“WhatsApp uses the E2E protocol developed by Open Whisper Systems, which is the name behind Signal messenger. That’s a good thing, because the Signal protocol is open source, widely peer-reviewed, and is generally considered one of the best protocols for implementing end-to-end encryption in messaging platforms.”
What is the issue with WhatsApp?
Although WhatsApp uses E2E encryption but the company does not encrypt backups (cloud and local). Also, it does not encrypt the metadata which is used to carry communication between two endpoints. This is one of the major criticisms of WhatsApp’s security model. While metadata does not allow anyone to read your messages but it lets authorities to know whom and when you messaged someone, and what was the duration for it.
What is Metadata?
Metadata is “data that provides information about other data” such as author, date created, date modified, file size, video logs , call logs , and chat history etc.
TELEGRAM
TELEGRAM
Incase of Telegram which does offer some protections to its users but however, there are some multiple pain points in the way Telegram encrypts your messages and other information.
Such as Telegram supports E2E encryption, but it’s not enabled by default and enabling it is not a cake walk as the only way to use E2E encryption on Telegram is by its secret chats feature.
The regular chats happening on Telegram are not E2E encrypted but messages sent in a secret chats are E2E encrypted. This means that the messages are encrypted on your device and but they are decrypted on Telegram’s server.
Note: So all the powers remains with Telegram that has the encryption keys on the server-side and can, in theory, access your normal chats.
SIGNAL
SIGNAL
Signal uses the open-source Signal Protocol to implement end-to-end encryption. And just like WhatsApp, the E2E encryption covers all forms of communication on Signal.
Why to choose Signal over WhatsApp and Telegram?
Signal has an edge over the both as WhatsApp which encrypts all the messages and calls (and that’s enough for most users), but Signal goes one step further and encrypts the metadata too.
There are some incredible amazing privacy features with Signal that is going to make your messaging experience even more private and secure. Such as one can lock Signal with a passcode or biometrics. There is 2FA (Two-factor Authentication) and an option to block screenshots within the app and the recent screen.
IMPORTANT: Not even that recently Signal has added a new feature to blur faces automatically before sending images. which is one of the USPs for Signal Messenger application.
Wait we are not done, Signal by default encrypts all the local files with a 4-digit passphrase. And if you want to create an encrypted local backup then you can do that as well. The app now also supports encrypted group calls .
So if you have read our complete blog, you are able to understand that how Signal is cut above WhatsApp and Telegram.
Although WhatsApp is loaded with lot many features and to us messaging means WhatsApp and its a part of our lifeline today even from Generation Z to Baby Boomers all are on WhatsApp. So it will take lot of time to move out of WhatsApp to Signal and till that time WhatsApp would have rectified its issues and load up with many more goodies so lets hope for the best and leave the rest .