Stochastic Processes and Related Terms

What is a Random Variable?
Ans: "In probability and statistics, a random variable, random quantity, aleatory variable, or stochastic variable is described informally as a variable whose values depend on outcomes of a random phenomenon."

In probability theory, "a random variable is understood as a measurable function defined on a probability space whose outcomes are typically real numbers"
https://en.wikipedia.org/wiki/Random_variable

What Is the Central Limit Theorem (CLT)?
"In the study of probability theory, the central limit theorem (CLT) states that the distribution of sample means approximates a normal distribution (also known as a “bell curve”), as the sample size becomes larger, assuming that all samples are identical in size, and regardless of the population distribution shape."
https://www.investopedia.com/terms/c/central_limit_theorem.asp

"The Central Limit Theorem and Means
An essential component of the Central Limit Theorem is that the average of your sample means will be the population mean. In other words, add up the means from all of your samples, find the average and that average will be your actual population mean. Similarly, if you find the average of all of the standard deviations in your sample, you’ll find the actual standard deviation for your population. It’s a pretty useful phenomenon that can help accurately predict characteristics of a population. Watch a video explaining this phenomenon, or read more about it here: The Mean of the Sampling Distribution of the Mean." https://www.statisticshowto.datasciencecentral.com/probability-and-statistics/normal-distributions/central-limit-theorem-definition-examples/

What is stochastic behavior?
"The word "stochastic" means "pertaining to chance" (Greek roots), and is thus used to describe subjects that contain some element of random or stochastic behavior. For a system to be stochastic, one or more parts of the system has randomness associated with it. https://www.cds.caltech.edu › courses › cds101 › faq › 02-10-07_stochastic

What is the meaning of stochastic process?
"A stochastic process means that one has a system for which there are observations at certain times, and that the outcome, that is, the observed value at each time is a random variable. Stochastic Processes – an overview | ScienceDirect Topics"
https://www.sciencedirect.com › topics › neuroscience › stochastic-processes

Stationary ergodic process
"In probability theory, a stationary ergodic process is a stochastic process which exhibits both stationarity and ergodicity. In essence this implies that the random process will not change its statistical properties with time and that its statistical properties (such as the theoretical mean and variance of the process) can be deduced from a single, sufficiently long sample (realization) of the process.""

What is a stationary process?
"Stationarity is the property of a random process which guarantees that its statistical properties, such as the mean value, its moments and variance, will not change over time. A stationary process is one whose probability distribution is the same at all times. For more information see stationary process."

Several sub-types of stationarity are defined: first-order, second-order, nth-order, wide-sense and strict-sense. For details please see the reference above.

What is a Ergodic process
"An ergodic process is one which conforms to the ergodic theorem. The theorem allows the time average of a conforming process to equal the ensemble average."" https://en.wikipedia.org/wiki/Stationary_ergodic_process

Ergodic Process:
"In econometrics and signal processing, a stochastic process is said to be ergodic if its statistical properties can be deduced from a single, sufficiently long, random sample of the process. … Conversely, a process that is not ergodic is a process that changes erratically at an inconsistent rate."
https://en.wikipedia.org › wiki › Ergodic_process

A correlation function
"A correlation function is a function that gives the statistical correlation between random variables, contingent on the spatial or temporal distance between those variables."
https://en.wikipedia.org › wiki › Correlation_function

What is energy spectral density?
"Energy spectral density describes how the energy of a signal or a time series is distributed with frequency. Here, the term energy is used in the generalized sense of signal processing; that is, the energy of a signal is. Spectral density – Wikipedia"
https://en.m.wikipedia.org › wiki › Spectral_density

Spectral density estimation
"In statistical signal processing, the goal of spectral density estimation (SDE) is to estimate the spectral density (also known as the power spectral density) of a random signal from a sequence of time samples of the signal.[1] Intuitively speaking, the spectral density characterizes the frequency content of the signal. One purpose of estimating the spectral density is to detect any periodicities in the data, by observing peaks at the frequencies corresponding to these periodicities."
https://en.wikipedia.org/wiki/Spectral_density_estimation

Markov Process — from Wolfram MathWorld
mathworld.wolfram.com › … › Interactive Demonstrations
"Markov Process. A random process whose future probabilities are determined by its most recent values."

Poisson Process
"A Poisson Process is a model for a series of discrete event where the average time between events is known, but the exact timing of events is random. The arrival of an event is independent of the event before (waiting time between events is memoryless).""

Poisson Distribution
"The Poisson Process is the model we use for describing randomly occurring events and by itself, isn’t that useful. We need the Poisson Distribution to do interesting things like finding the probability of a number of events in a time period or finding the probability of waiting some time until the next event." https://towardsdatascience.com/the-poisson-distribution-and-poisson-process-explained-4e2cb17d459

Statistical signal processing
"Statistical signal processing is an approach which treats signals as stochastic processes, utilizing their statistical properties to perform signal processing tasks. Statistical techniques are widely used in signal processing applications.""
https://en.wikipedia.org › wiki › Signal_processing

Linear MMSE Estimation
https://www.probabilitycourse.com/chapter9/9_1_6_linear_MMSE_estimat_of_random_vars.php

Harmonic analysis
"Harmonic analysis is a branch of mathematics concerned with the representation of functions or signals as the superposition of basic waves, and the study of and generalization of the notions of Fourier series and Fourier transforms (i.e. an extended form of Fourier analysis)."
https://en.wikipedia.org › wiki › Harmonic_analysis

By

Sayed Ahmed

BSc. Eng. in Comp. Sc. & Eng. (BUET)
MSc. in Comp. Sc. (U of Manitoba, Canada)
MSc. in Data Science and Analytics (Ryerson University, Canada)
Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

Get access to courses on Big Data, Data Science, AI, Cloud, Linux, System Admin, Web Development and Misc. related. Also, create your own course to sell to others to earn a revenue. http://sitestree.com/training/

If you want to contribute to the operation of this site (Bangla.SaLearn) including occasional free and/or low cost online training (using Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education/health/social service sector), you can financially contribute to: safoundation at salearningschool.com using Paypal or Credit Card (on http://sitestree.com/training/enrol/index.php?id=114 ).

Affiliate Links: Deals on Amazon :
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Stock Market Today

Stock Market Today (Mostly up, also lately mostly up). XUS ETF price increase: $20 to $52 in 6 years

https://www.morningstar.ca/ca/report/etf/performance.aspx?t=0P0000YUAU&lang=en-CA

By

Sayed Ahmed

BSc. Eng. in Comp. Sc. & Eng. (BUET)
MSc. in Comp. Sc. (U of Manitoba, Canada)
MSc. in Data Science and Analytics (Ryerson University, Canada)
Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

Get access to courses on Big Data, Data Science, AI, Cloud, Linux, System Admin, Web Development and Misc. related. Also, create your own course to sell to others to earn a revenue.
http://sitestree.com/training/

If you want to contribute to the operation of this site (Bangla.SaLearn) including occasional free and/or low cost online training (using Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education/health/social service sector), you can financially contribute to: safoundation at salearningschool.com using Paypal or Credit Card (on http://sitestree.com/training/enrol/index.php?id=114 ).

Affiliate Links: Deals on Amazon :
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Stock market is up today. lately mostly up

Stock market is up today. Lately, mostly up. Though, I had a gut feeling that it will go down temporarily on December, 2019 at one point. However, until 2020 USA election, the market will be kind of good (my wild gut feeling and wish, no logic)

Image Reference: morningstar.ca, at around 10:00 am, Nov 25, 2019

How To Set Up Apache Virtual Hosts on Ubuntu 16.04

How To Set Up Apache Virtual Hosts on Ubuntu 16.04

https://www.digitalocean.com/community/tutorials/how-to-set-up-apache-virtual-hosts-on-ubuntu-16-04

Yes, implemented these in the past at work. Also, did for myself..

By

Sayed Ahmed

BSc. Eng. in Comp. Sc. & Eng. (BUET)
MSc. in Comp. Sc. (U of Manitoba, Canada)
MSc. in Data Science and Analytics (Ryerson University, Canada)
Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

Get access to courses on Big Data, Data Science, AI, Cloud, Linux, System Admin, Web Development and Misc. related. Also, create your own course to sell to others to earn a revenue.
http://sitestree.com/training/

If you want to contribute to the operation of this site (Bangla.SaLearn) including occasional free and/or low cost online training (using Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education/health/social service sector), you can financially contribute to: safoundation at salearningschool.com using Paypal or Credit Card (on http://sitestree.com/training/enrol/index.php?id=114 ).

Affiliate Links: Deals on Amazon :
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Do you want to be an information security professional?

Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing/practicing/analyzing/thinking/applying/building/relating) for sure will help.

What you might need to know for Ethical Hacking (CEH Foundation)

First some Operating System Basics

What is an Operating System? What is a kernel?

How do Windows Kernel and Linux Kernel differ?

What is ring or layered architecture for Kernel?

What is a file system? Give examples of File System. Give some details on the File Systems that you just mentioned.

What are device drivers?

Difference between stacks and heaps?

Types of windows authentication? Local and Central

How can you backup and restore windows registry?

What is windows event viewer? What can you use to identify security incidents?

What are windows services?

Where can you see windows security policies?

What is the shell command wf.msc ?

What do the following commands do? Is there any relation to security ? tasklist, tracert, ipconfig, driverquery, cipher, assoc

What are the permission groups in Linux?

What is a IPTable in Linux? Give some IPTable related commands? Also give some related concepts. How can you use them to ensure/check security? What are input chain, output chain, forward chain?

What do the following files do in Linux/Unix? /etc/hosts.allow, /etc/hosts.deny

What do the following commands do? uname, sudo, last, diff, history, uptime, w, crontab, lsof, kill

What are TCP wrappers?

What is uid, gid in Linux? Also, what is sticky bit? What is SELinux? What is LDAP? What is Active Directory?

How can you dump all password hashes in windows? and do similar in Linux?

How can you set password policy?

What is Powershell Integrated Scripting Environment?

what does netsh.exe do?

What do the following powershell cmdlets do? Stop-Process, Get-Process, Get-eventlog, Export-csv, Get-Service, Get-Help, Get-CimInstance, Get-WmiObject

What is a Hypervisor? Types of Hypervisors?

What is a Type 1 Hypervisor? What is a Type 2 Hypervisor?

What are snapshots? How can you use this for the integrity of the Operating System and the installed software?

What are common security issues with Virtual Machines?

Unpatched Hypervisor, Insecure Management Console, Dormant virtual machines: What are these?

What are the commercial/free software to create virtual machines?

What is docker? What is Software Containerization? How can docker help? Any other alternatives to Docker?

What is Kubernetes?

What are SaaS, PaaS, IaaS?

What are cloud security considerations?

How the following can happen in Cloud? What can you do about these?
Data Loss, Account Hijacking, Insecure APIs, Denial of Service Attack, Legal Issues, Abuse by malicious insiders.

Define Confidentiality, Integrity, Availability.

Give examples of attacks that affect confidentiality?

Give examples of attacks that affect Integrity?

Give examples of attacks that affect Availability?

How do Functionality, Usability, Security interact/influence each other? Define them as well.

Define Authentication, Authorization, and Accounting (AAA)? How are they related?

What is nonrepudiation?

What is a vulnerability?

What is a zero day vulnerability?

What is an exploit? What is a Risk? What is Threat?

What are some Natural, Physical, and Human threats to Information Security?

What is Defense in Depth architecture for Information Security? (layered … )

What are the types of hackers? How do they differ?

Black Hats, White Hats, Gray Hats, Suicide Hats, Script-Kiddies, Spy Hacks, Cyber Terrorists, State Sponsored Hacks : what are these?

Difference between Hacking and ethical Hacking?

What are the steps in Incident Management?

What is a penetration testing? Does it apply to the infrastructure or the software?

What is security assessment? Is it required?

What are the types of Penetration Testing? Black, gray, White,

What are other testing for security? Announced, manual, automated

What are the steps in Penetration Testing?

What should you do in the pre-attack phase, attack phase, post-attack phase.?

Define False Positive and False Negative Security alarms?

What is Footprinting?

What are the ways hackers collect information about your organization (assets)?

How do hackers use Pipl?

What is Enumeration in the hacking process?

How can you use Maltego? https://www.paterva.com/buy/maltego-clients/maltego-ce.php . How hackers use this?

What do the following commands do? Finger, Netscan tools, superscan, nmap,

what is https://www.shodan.io/?

What is nbtstat tool?

what can you find on www.sec.gov/edgar.shtml?

Where can you trace emails? www.traceemail.com/trace-email-header.html

readnotify.com what does it do?

What are attack vectors when it comes down to web-application hacking?

Give some examples of web-application flaws?

Give some examples of web-application authentication flaws?

Give some examples of web-application authorization flaws?

Give some examples of web-application session management flaws?

Give some examples of web-application input validation flaws?

Give some examples of web-application configuration management flaws?

What are the steps in Web Application Hacking Methodology?
Analyze web-app, identify entry and exit points, break down components, test for vulnerability, automated security scanning, remove false positives, reporting with remediation

What can you do to mitigate and prevent the security flaws mentioned above? authentication flaws, authorization flaws, session management flaws, input validation flaws, configuration management flaws, auditing and logging flaws?

What are some advantages and risks of Wireless Networking?

What do you know about OSA authentication, Shared Key authentication and centralized authentication for Wireless Networks? At least give some examples?

What are some common Wireless Threats?

What are the steps in Wireless Hacking Methodology?
Discover Wi-fi networks, GPS Mapping, Wireless Traffic Analysis, execute attacks (), break wi-fi encryption
attacks: Fragmentation, MAC-spoofing, De-authentication, Man-in-the-middle, Evil twin

What is Spectrum Analysis? How can Bluetooth hacking happen? What is Bluetooth pairing?

What are common Bluetooth Threats?
loss personal data, hijacking, sending SMS, use airtime, malicious code, bluejacking,, blue sniffing, bluesmacking, bluesnarfing

How can you defend against bluetooth attacks? PIN change, go to hidden mode, monitor pairing, enable only when needed, review pairing requests

What are common Mobile Attack Vectors? Malware, Jailbreak, application modification

Jailbreak: enable to run all 3rd party applications, corrupt kernel

Provide some Android, and iOs security guidelines?

What is IDS? How does it work? Can IDS be used for Anomaly Detection?

What are the different types of IDS? Network Host, Log, File

What are the approaches to evade IDS? Insertion attack, DoS, Obfuscating/Encoding, Session Splicing, invalid packets, polymorphic shellcodes

What are the common Symptoms of an Intrusion?

DMZ what is it?

What are the following concepts for Firewall architecture? Bastion Host, Screened subnet, multi-homes subnet

What are the different types of firewalls? Packet, circuit, application level, stateful inspection

How to detect firewalls in the target system? What is Port Scanning? How can it help in this case?

What is firewalking? What is the purpose?

What are some possible ways to evade firewalls? IP Address spoofing, source routing, use a proxy to bypass firewalls, tunneling

What are Honeypots? What are the types? High, Low -> interactions

How can you detect Honeypots? HPING, Port Scan detect all services, Send Safe Honeypot Hunter,

What are the different types of Encryption?

What is the concept: Key Escrow?

What are DES, AES, RSA, Private key cryptography, Public Key Cryptography?

What is the Advanced Encryption Package?

Give some details on how Message Digests are used in securing and also in hacking?

What is PKI?

What is Splunk?

By

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide

Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Reference: Certified Ethical Hacker Guide, S. A. Rahalkar

Must know for an Information Security Professional (A CISSP professional will know these in general)

Must know for an Information Security Professional (A CISSP professional will know these in general) . Want to be a security professional, learn these as well.

What is a security policy?

What are policies in general?

What are the different types of Security Controls?

Give examples of Audit Trail.

Give examples of security guard.

Difference between authentication and authorization

Can SSO be decentralized? How can you implement that? Just examples are good.

What is the least privilege policy?

What is a job rotation policy?

TACAS, RADIUS what are these? Does your organization need to use these? In what cases? Is it a good fit?

Give examples of access control attacks?

Give examples of Social Engineering?

What is your experience with reviewing the access configurations?

What TCP/IP, OSI, ATM, QoS?

Give examples of Network Access Control Devices?

Give examples on how Network Access Control Devices are used in your organization? How can you configure them?

Is Endpoint security a good practice? What is Endpoint security anyway?

POTS, PBX, VoIP – does your organization use these? What are the related security risks?

How can attackers inject data into video stream (video conferencing)?

Give examples of Tunneling Protocols? esp. the secured ones?

Is VPN a tunneling concept? What protocols are used on VPN?

How is IpSec data formatted? What is AH ? What is ESP?

What is the primary purpose of SSL and TLS?

What is a Syn Flood Attack.

What is spoofing?

What is VLAN? Will you implement VLAN in your organization? When?

What is the concept of Risk when it comes to organizational IT resource security?

Can your security measures mitigate all risks?

What is the relation between a security policy and local laws and regulations?

Does your organization conduct Due care and Due diligence for security?

How do you ensure confidentiality, integrity, and availability?

How is managing information lifecycle important for an organization?

To which organizations HIPAA apply?

What are Risk Avoidance, Risk transference, Risk Mitigation, Risk Acceptance?

Can Risk Acceptance be acceptable policy? Give examples…

How can you apply and ensure security in the software development lifecycle?

What are backdoors in software?

What is XSS security risk? How can you prevent XSS?

What is security testing?

Can you use white box testing as a security measure?

Should you encrypt all sensitive – data files?

Define Symmetric and Asymmetric cryptography? Give examples. Which one is more secure?

What is Hybrid cryptography, What is Hashing?

What is Social Engineering for Key Discovery?

What is a rainbow table attack?

What is PKI? How does PKI work?

What are security models?

What is Bell-Lapadula model?

What is Biba model?

what is Clark-Wilson access model.

How can XML traffic be protected?

OWASP what is it? Who sponsors OWASP?

How can Separation of duties and responsibilities help with security?

What is the last step in incident response?

What is root cause analysis?

What is change management?

How do software configuration, and configuration management help with security?

What you know About RAID? Describe in your own way.

Give example ways you can make your servers fault tolerant.

Give an example of a backup strategy for a hypothetical organization.

Give types and examples of computer crimes.

What is Shrinkwrap contract?

Give some example guidelines from ISC code of Professional Ethics.

Give examples of forensic procedures.

Give examples of Site and facility design considerations for security?

By
Online and Offline Traininghttp://Training.SitesTree.com 
 
If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide   
 
Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz
Hottest Deals on Amazon CA: http://tiny.cc/bgnddz
Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Part-2: If you want to learn security, or if you already are a security professional/engineer, can you answer the following questions on Security? Do you know (and can do) the answers to the following questions on Security?

What are the important concepts to know and implement for Infrastructure security? Consider only the software side.

What are patching, hardening, enabling encryption, filtering connections in regards to network infrastructure? What is the relation with security? What will you do in regards to these?

How is software patching different for Network Hardware than the computers/servers?

How does patching differ for consumer grade and enterprise grade network infrastructure devices?

What is a service in a network device? What are the security risks with services for network devices? How will you ensure secure services?

what does nmap do?

How does SNMP help in security? What does SNMP stand for?

You DoS and DDos for sure? What are the differences?

Are network protocols encrypted in general? i.e. do they support encrypted communications? Will it be a great idea to have all Network Protocol supporting Encrypted Communications when it comes down to configuring and administering at least?

Bastion Hosts – what are they? How does they help in ensuring security? What are the disadvantages?

How important are configuring ACLs in routers for security? What are the important considerations? Can you provide examples on how you did implement these?

What is Egress Filtering?

Name sone tunneling Protocols?

What are Teredo, 6in4, 6to4, 6rd? Are they still in use?

What is TACAS+? Give examples of use cases and purpose?

To what extent Password management software are useful? What are the drawbacks? What can be the consequences when the password for the password manager is leaked? or Anyone having access to your workstation/PC can get easy access to your Password manager (probably shoulder surfing for pass, or could access your session from remote)?

What are encryption, Hashing, and Salting for securing passwords?

How will you enforce for Password Policies to ensure password security?

What is 2FA? What is multi factor Authentication? At least give some examples?

is 2FA sufficient enough for security? Why and why not?

How to ensure endpoint security?

What are the Endpoints/Endpoint devices in your organization? How do you or how will you ensure security for those devices?

How can you Harden the endpoints?

Is desktop firewall important to increase security?

Will you recommend full-disk encryption for security? What are the drawbacks? What can be the worst case if you use full-disk encryption for the endpoints? How can you mitigate those risks?

What can you use to encrypt entire disk in Windows and MacOs?

What is Bitlocker?

What is Filevault?

Is centralizing the keys for encrypted disks a great idea? what can go wrong? Is it always the best or feasible solution? What will you do or did?

What is the most secure operating system? Is there any such thing? Why — why not? Does it depend on how it is configured or there is something inherent to the operating systems that make them secure or not? more or less secure (provided after you tried your best)?

Is keeping software and services a very important aspect of securing operating systems i.e. servers?

How do you update software and services in Windows, MacOS, Linux, Unix? Give Linux/Unix commands to update software and services?

What is the difference update and upgrade in Linux/Unix?

How to update many many servers such as 1000s of them? What approach will you take?

What is SELinux for security in Linux/Unix?

What is mask?

How will you utilize chmod, chown, chroot for security in Linux/Unix?

How will you configure file permissions in Linux/Unix? Give example use cases?

How will you ensure file integrity?


What is Open Shares? How does it affect security?

What is EMET? What does EMET stand for?

What is SCCM? How can you use SCCM for Enterprise Deployment Strategies? What are the impact/related concepts for security?

How can you Physicall your your environment/organization?

What Physical security measures that you can take?

What is PCI-DSS? What does it have to do with Security?

Explain security considerations in relation to:
— Health Insurance Portability and Accountability Act
— Gramm-Leach Bliley Act
— Family Educational Rights and Privacy Act
— Sarbanes-Oxley Act

What is NIST Cybersecurity Framework?

What will you do to ensure that you do not lose data and information in case of security breach?

What are the disaster recovery approaches that you used or can use for IT Security?

What is Warm standby?

What are the backup approaches that you can use for Disaster recovery?


What will you use for Post-Incident (i.e. after security incident) Process?

Define, explain, give examples how will you use the following Post-Incident Tools and Technologies?
–Log Analysis
–Disk and File Analysis
–Memory Analysis
–PCAP Analysis

Does user education important to ensure organizational security? Why? How will you do that? How did you do that?

What are the User Education and Training strategies and Tools that you can use for security?

How will you track the impact of user education?

What do Policies, Standards, and procedures have to do with Security? How did you utilize them? What were the outcome? Any challenge in the process (i.e. related)?

How does asset management and documentation help with security? What procedure and steps you will follow for that?

How will you plan your organization’s security program? What are the team members and security functions that you will utilize?
Online and Offline Traininghttp://Training.SitesTree.com 
 
If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide   
 
Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz
Hottest Deals on Amazon CA: http://tiny.cc/bgnddz
Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz
 
Reference: Defensive Security handbook

If you want to learn security, or if you already are a security professional/engineer, can you answer the following questions on Security? Do you know the answers to the following questions on Security?

Defensive Security

If you want to learn security, or if you already are a security professional/engineer, can you answer the following questions on Security? Do you know the answers to the following questions on Security?

True or false, all email servers in the Internet are configured properly?

What can you used to check if an email server is configured properly? What tools, and software?

How will you use? What are the steps that you will follow?

What is MXToolbox?

Is MXToolBox still a good security tool? mxtoolbox.com?

When it comes to email server security can you explain what are the following and how they help in security? or what will you do with them when it comes down to Security?
–Open mail relay, server hello, mail reverse DNS, email aliases/group nesting, DNS Servers?

Is outsourcing email server is a great idea? when, when not? why, why not?

How can you secure a DNS server?

Should you allow DNS recursive queries in your organization’s DNS server?

What does segregation mean when it comes down to DNS servers? How will you use Segregation?

What is an internal DNS server? What is an external DNS server? Will you segregate them from security reasons? Why? Why not? What can go wrong?

What is passive DNS? Is it a good idea to implement passive DNS?

SinkHole DNS and Blackhole DNS what are these?

How can you obscure your organizations internal resources from the outside?

Can you configure your SMTP-SSL of 4043? Is it a good move?

What is logging?

What is monitoring?

What are the Logging software that might be great for security?

Did you use a software tool called Nagios? What is this for? How did you use this? Did you see any flaws? Is it easy to use?

What will you log? and why? What is your experience on your approaches?

Will you log everything or just the required stuff? why, why not? when? can you or will you switch to the other from one? What steps will you follow?

Where will you save/store the log data? and why? what are the risks? What are the related approaches?

What is SIEM?

What are the steps in SIEM?

What is log analysis when it comes down to security? What do you want to get out of Log Analysis?

Can you give the names of some important and/or common logging practices for security purposes?

What are user login logging, repeated login failures, login from unusual places/IPs/locations?

Proxy and Firewall logs — what are these?

What is log aggregation?

How can log help to identify brute force attack, data exfiltration, impossible or unlikely user movements, and ransomware?

What are IDS, IPS, and NIDS?

What are snort, suricata, bro?

What is Host Based IDS? How is it different from NIDS? What will you use and why? Will you use both? What are the drawbacks of each one of them?

Where do you put NIDS and IPS? and why? is there any particular strategy that worked for you?

Give some examples of encrypted protocols? How do they relate to NIDS/IDS/IPS?

What is defensive security?

What is offensive security?

What is purple teaming? What is read team and what is blue team?

What is OSINT i.e. Open Source Intelligence?

What are Dumpster diving, Shoulder surfing? What are the related security concepts?

What does the tool Maltego do? Is there any free version?

What is recon-ng? What is Metasploit? What are the different modules of recon-ng? What do they do? How can you use them for security?

What is the Harvester.py?

What is the Responder tool? hint. NetBios, Link Local Multicast Name Resolution

What is RAWr? What does it stand for?
Rapid Access Web Resources

What is the best programming language considering security i.e. when you are developing for your organization what programming language should you use?

Is PHP a secure programming language? How does it compare with Java or Python or C/C++?

Is security is integral to the programming language? or it might depend on the programmer as well? As PHP might be known to be not-a-very secure language: does it come from PHP or from the programmers who do not implement stuff in PHP considering security?

Can a Java/Python/C/C++ software be less secure than PHP?

What is security testing of a software? How does your organization do it?

What is penetration testing?

What is port scanning?

What is vulnerability scanning?

What is Network segmentation? What does it have to do with Security?

What are Physical and logical segmentation?

What is Demilitarized zone (DMZ)?

How VLANs, ACLs, NACs, VPNs help with security? What are risks/limitations in each cases?

What is SDN? Is it good considering security?

By

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide

Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Reference: Defensive Security Handbook

Misc. Statistics, Engineering, and Sensors

Learn more about Nonparametric Test
https://www.sciencedirect.com/topics/medicine-and-dentistry/nonparametric-test

Sensor Management for Large-Scale Multisensor-Multitarget Tracking," in Integrated Tracking, Classification, and Sensor Management: Theory and Applications
http://download.e-bookshelf.de/download/0000/7142/31/L-G-0000714231-0002366034.pdf

Approaches to Multisensor Data Fusion in Target Tracking: A Survey
https://www.computer.org/csdl/journal/tk/2006/12/k1696/13rRUxBa56w

Sensor fusion
https://en.wikipedia.org/wiki/Sensor_fusion

Sensor Fusion: Sensor fusion is the process of merging data from multiple sensors such that to reduce the amount of uncertainty that may be involved in a robot navigation motion or task performing.
https://www.sciencedirect.com/topics/engineering/sensor-fusion

Sensor Fusion Tutorials and Applications
http://fusion.isif.org/conferences/fusion2017/Tutorials.html

By

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide

Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Real Estate vs Stock Investment

Toronto Property Investors Take Note: Stocks Performed Better

https://www.bloomberg.com/news/articles/2019-11-07/toronto-property-investors-take-note-stocks-performed-better?srnd=premium-canada

Vancouver Real Estate Crackdown’s Next Step: A Big Watchdog

https://www.bloomberg.com/news/articles/2019-11-12/vancouver-real-estate-crackdown-s-next-step-a-big-watchdog