Reshma Ashok Bhalekar has over 4 years of experience developing applications using SharePoint 2010, 2013, InfoPath, and .NET. She has worked on projects involving custom forms, workflows, and interfaces for clients in various industries. Her responsibilities include requirements gathering, design, development, testing and documentation. She is proficient in technologies like ASP.NET, C#, HTML, CSS, JavaScript, and databases like SQL Server.
Reshma Ashok Bhalekar has 4 years of experience developing applications with SharePoint 2010, 2013, InfoPath and .NET. She has skills in technologies like ASP.Net, C#.Net, SQL Server and tools like Visual Studio. She has worked on projects involving building portals and management systems for various organizations using SharePoint and InfoPath. She has experience in designing forms, creating lists and libraries, developing pages and providing documentation.
The document is a resume for Reshma Ashok Bhalekar summarizing her professional experience developing applications with technologies like SharePoint 2010, 2013, InfoPath, and .NET. Over 4 years of experience, she has worked on projects involving portals, planning systems, and other applications for clients. Her responsibilities included designing and developing pages, lists, libraries and more while coordinating with clients and users.
This document identifies vulnerabilities in PKL Autoparts' network infrastructure and provides recommendations to address them. It finds that PKL lacks firewalls, VPN access, strong wireless security, network monitoring tools, and other critical security controls. The document then outlines a restructured network topology with separate subnets for each site to prevent broadcast storms. It recommends implementing a Cisco firewall to detect and prevent intrusions. Finally, it defines several new security policies around wireless devices, remote access, servers, and passwords to secure the network and prevent future breaches.
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
?
The document discusses the CryptoLocker ransomware threat and strategies to defend against it. CryptoLocker infects systems by tricking users into executing malicious files, then encrypts files using a randomly generated key. It threatens to delete the encryption key unless a ransom is paid. The best defenses include application whitelisting, limiting administrator privileges, firewalls, intrusion detection systems and keeping systems patched and backed up. In the event of infection, the affected machine should be isolated while restoring data from backups. Ongoing user education and security policies are also important to mitigate the ransomware risk.
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
?
This document discusses the CryptoLocker ransomware threat and strategies to defend against it. CryptoLocker infects systems by tricking users into executing malicious files. Once installed, it encrypts files using a randomly generated key that is sent back to the infected machine. The best defenses include application whitelisting, limiting administrator privileges, firewalls, intrusion detection systems and keeping systems patched and backed up. In the event of infection, the infected machine should be isolated and restored from backup. Ongoing user awareness training and security policies are also important non-technical strategies to mitigate the CryptoLocker threat.