AAD is Microsoft’s cloud-based identity and access management service. It is used by organizations to enable their employees, guests, and others to sign in and access the resources they need. There are two such as:
Internal resources, such as apps on your corporate network and intranet, and cloud apps developed by your own organization.
External services, such as Microsoft Office 365, the Azure portal, and any SaaS applications used by your organization.
Azure AD also allows organizations to securely enable the use of personal devices, such as mobiles and tablets, and enable collaboration with business partners and customers.
Azure AD is available in four editions such as Free, Office 365 Apps, Premium P1, and Premium P2.
Azure Active Directory Free – The free version allows you to administer users and create groups, synchronize with on-premises Active Directory, create basic reports, configure self-service password changes for cloud users, and enable single sign-on across Azure, Microsoft 365, and many popular SaaS apps.
Office 365 Apps – The Office 365 Apps edition allows you to do everything included in the free version, plus self-service password reset for cloud users, and device write-back, which offers two-way synchronization between on-premises directories and Azure AD.
Azure Active Directory Premium P2 – The Premium P2 offers all the Premium P1 features, and Azure Active Directory Identity Protection to help provide risk-based Conditional Access to your apps and critical company data.
OT is the practice of using hardware or software that is used to control physical processes, devices and infrastructure. It includes systems that are used in manufacturing, energy, medicine, building management, and other industries.
OT monitors and manages industrial processes and manufacturing equipment’s and keep them running.
Components for OT
Industrial Control System (ICS)
ICS are the main component of OT that includes different types of devices, systems, controls, and networks that manage a variety of industrial processes.
Supervisory Control and Data Acquisition (SCADA)
SCADA is a data collecting system from sensors, often at distributed sites which sends it to a central computer that manages and controls the data.
Challenges for OT security
Lack of risk mitigation and remediation
Lack of awareness among OT staff
Hard to test production environments
Limited security awareness
How IT is different from OT Network Solution
IT mainly focuses on the user experience, performance of the transmission, ease of operation based on standards. Secondly, IT focuses on integrity, availability of system and confidentiality whereas OT focuses on the safe operation of plants having reliable data transmission for time-critical applications and also controls equipment’s, information technology and controls data.
Products of Operational Technology (OT)
Following are the products of OT marketed by different companies:
Products In Operational Technology (OT) Security Market by Darktrace
Nozomi Networks Guardian by Nozomi Networks
Kaspersky Industrial CyberSecurity (KICS) by Kaspersky
Explicit Knowlege : Knowledge i.e eazy to write down & share
Implicit Knowledge: Applied Knowledge
Tacit Knowledge: Knowledge i.e. gained through personnal experience
Knowledge Management Process
Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.
Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.
Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.
Although Cryptocurrency is an ocean itself, here we are trying to understandthe basis of it, lets see some technical terms related to cryptocurrency.
What is Cryptocurrency?
Cryptocurrency is a type of digital currency which uses digital files as money.
In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.
What is the role of Blockchain in cryptocurrency?
Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.
If you want toknowmore about it, then justdrop an email to email@example.com or contact the undersigned.
Splunk is a tool that is used for monitoring, searching, analyzing and visualizing machine-generated data in real-time. It helps improve velocity, quality and the business impact of app delivery. It is commonly used for information security and development operations and more advanced use cases for custom machines, the Internet of Things, and mobile devices.
How it Works?
It indexes and correlates information in a container that makes it searchable and possible to generate alerts, reports, and visualizations.
What is Splunk in DevOps?
For IT teams adopting DevOps, Splunk software helps improve velocity, quality, and app delivery’s business impact.
SIEM:Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.
How do SIEM works?
It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins.
SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.
By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management systemimproves investigative efficiency and reduces time wasted on false positives.
The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.
Main features of SIEM
Time to respond
SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.
If you want tomore about it, then justdrop an email to firstname.lastname@example.org or contact the undersigned.
As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.
So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.
Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website Amazon.com
There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .
What are Robots?
Robots are the intersection of science, engineering and technology that produces machines.
Types of Robots
Uses of Robots
Differences between Cobots & Robots
Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.
As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine is out and its dosage has been started. So we hope we all get the vaccine and we start engaging in our day to day normal life activities as it was before the COVID19 days.
It seems that Mark Zuckerberg’s security norms still needs some more modifications as its recently acquired WhatsApp the king in messenger platform has been in news due to some data leakage reasons yet again.
In the recent notification issued by WhatsApp where they have mentioned the recent update on their application which has taken the world with a storm, as it show cast the vulnerabilities it lacks.
So here at DocTooLss we compare our three Messengers which are in news and compare with eachother:
WhatsApp has kept end-to-end encryption. Plus, E2E on WhatsApp is available on every single mode of communication that the app enables such as messages, video calls, voice calls, photos, and anything else you share is E2E encrypted on WhatsApp.
What does E2E means?
E2E meaning that you and the recipient are the only people who can read the messages you send to them. WhatsApp can’t decrypt the contents of your messages, calls, photos, etc, thus ensuring your security and privacy.
“WhatsApp uses the E2E protocol developed by Open Whisper Systems, which is the name behind Signal messenger. That’s a good thing, because the Signal protocol is open source, widely peer-reviewed, and is generally considered one of the best protocols for implementing end-to-end encryption in messaging platforms.”
What is the issue with WhatsApp?
Although WhatsApp uses E2E encryption but the company does not encrypt backups (cloud and local). Also, it does not encrypt the metadata which is used to carry communication between two endpoints. This is one of the major criticisms of WhatsApp’s security model. While metadata does not allow anyone to read your messages but it lets authorities to know whom and when you messaged someone, and what was the duration for it.
What is Metadata?
Metadata is “data that provides information about other data” such as author, date created, date modified, file size, video logs , call logs , and chat history etc.
Incase of Telegram which does offer some protections to its users but however, there are some multiple pain points in the way Telegram encrypts your messages and other information.
Such as Telegram supports E2E encryption, but it’s not enabled by default and enabling it is not a cake walk as the only way to use E2E encryption on Telegram is by its secret chats feature.
The regular chats happening on Telegram are not E2E encrypted but messages sent in a secret chats are E2E encrypted. This means that the messages are encrypted on your device and but they are decrypted on Telegram’s server.
Note: So all the powers remains with Telegram that has the encryption keys on the server-side and can, in theory, access your normal chats.
Signal uses the open-source Signal Protocol to implement end-to-end encryption. And just like WhatsApp, the E2E encryption covers all forms of communication on Signal.
Why to choose Signal over WhatsApp and Telegram?
Signal has an edge over the both as WhatsApp which encrypts all the messages and calls (and that’s enough for most users), but Signal goes one step further and encrypts the metadata too.
There are some incredible amazing privacy features with Signal that is going to make your messaging experience even more private and secure. Such as one can lock Signal with a passcode or biometrics. There is 2FA (Two-factor Authentication) and an option to block screenshots within the app and the recent screen.
IMPORTANT: Not even that recently Signal has added a new feature to blur faces automatically before sending images. which is one of the USPs for Signal Messenger application.
Wait we are not done, Signal by default encrypts all the local files with a 4-digit passphrase. And if you want to create an encrypted local backup then you can do that as well. The app now also supports encrypted group calls .
So if you have read our complete blog, you are able to understand that how Signal is cut above WhatsApp and Telegram.
Although WhatsApp is loaded with lot many features and to us messaging means WhatsApp and its a part of our lifeline today even from Generation Z to Baby Boomers all are on WhatsApp. So it will take lot of time to move out of WhatsApp to Signal and till that time WhatsApp would have rectified its issues and load up with many more goodies so lets hope for the best and leave the rest .