際際滷shows by User: AbdulQadir139 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: AbdulQadir139 / Sun, 23 Feb 2020 07:24:08 GMT 際際滷Share feed for 際際滷shows by User: AbdulQadir139 Attack graph generation for micro services architecture /slideshow/attack-graph-generation-for-micro-services-architecture/228932088 clousesecurityattackgraphgenerationformicroservicesarchitecture1-200223072408
Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis. When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack. ]]>

Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis. When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack. ]]>
Sun, 23 Feb 2020 07:24:08 GMT /slideshow/attack-graph-generation-for-micro-services-architecture/228932088 AbdulQadir139@slideshare.net(AbdulQadir139) Attack graph generation for micro services architecture AbdulQadir139 Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis. When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/clousesecurityattackgraphgenerationformicroservicesarchitecture1-200223072408-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis. When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack.
Attack graph generation for micro services architecture from Abdul Qadir
]]>
130 0 https://cdn.slidesharecdn.com/ss_thumbnails/clousesecurityattackgraphgenerationformicroservicesarchitecture1-200223072408-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fog computing /slideshow/fog-computing-128472998/128472998 fogcomputingpresentation-190119111537
fog computing description cloud versus fog computing comparison ]]>

fog computing description cloud versus fog computing comparison ]]>
Sat, 19 Jan 2019 11:15:37 GMT /slideshow/fog-computing-128472998/128472998 AbdulQadir139@slideshare.net(AbdulQadir139) Fog computing AbdulQadir139 fog computing description cloud versus fog computing comparison <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fogcomputingpresentation-190119111537-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> fog computing description cloud versus fog computing comparison
Fog computing from Abdul Qadir
]]>
2362 2 https://cdn.slidesharecdn.com/ss_thumbnails/fogcomputingpresentation-190119111537-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Saarc presetation /AbdulQadir139/saarc-presetation saarcpresetation-170512093218
this ppt is about saarc, its achievements, limitations, problems ]]>

this ppt is about saarc, its achievements, limitations, problems ]]>
Fri, 12 May 2017 09:32:18 GMT /AbdulQadir139/saarc-presetation AbdulQadir139@slideshare.net(AbdulQadir139) Saarc presetation AbdulQadir139 this ppt is about saarc, its achievements, limitations, problems <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/saarcpresetation-170512093218-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this ppt is about saarc, its achievements, limitations, problems
Saarc presetation from Abdul Qadir
]]>
7034 5 https://cdn.slidesharecdn.com/ss_thumbnails/saarcpresetation-170512093218-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/clousesecurityattackgraphgenerationformicroservicesarchitecture1-200223072408-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/attack-graph-generation-for-micro-services-architecture/228932088 Attack graph generatio... https://cdn.slidesharecdn.com/ss_thumbnails/fogcomputingpresentation-190119111537-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fog-computing-128472998/128472998 Fog computing https://cdn.slidesharecdn.com/ss_thumbnails/saarcpresetation-170512093218-thumbnail.jpg?width=320&height=320&fit=bounds AbdulQadir139/saarc-presetation Saarc presetation