Posts

What is Cybersecurity?

Cybersecurity is a term with diverse definitions through multiple perspectives. The diversity in its definition satisfies the need of academia, industry and government and non-governmental organizations to manage the cybersecurity challenges. Simple said, cybersecurity is the practice of organizing and collecting resources, structures and processes to protect cyberspace and cyberspace-enabled systems for preventing occurrences of misalignment of true property rights. Cybersecurity is the protection of computer systems and networks from digital attacks, data theft and breach. Cybersecurity or IT security protects critical systems and sensitive information from cyberattacks. It is designed to fight threats against networked systems and applications. The threats may originate from inside or outside of an organization. Cybersecurity management is critical for small, medium and large organizations. In the current era of a plethora of technologies, it is crucial for organizations to hire...

AI in Banking Industry

Artificial Intelligence has played a disruptive role in traditional banking channels with exponential growth of technology. It has influenced the perception of people about banking and comfort of accomplishing banking activities. AI has emerged as an unavoidable and pioneering technology of the business world and AI applications are rigorously utilized in banking and financial services. This article discusses the transformation of banking system from traditional banking to modern digitized banking. It describes how financially excluded people are included into banking through AI-enabled operations. Lastly, the benefits of using AI in banking industry are outlined. Banking System Transformation Banking has evolved from traditional brick and mortar system to a completely transformed way of banking. The industry uses AI-enabled techniques like mobile banking, chatbots for customer service, robots for self-service in banking operations and customized services for customers. Banks use chatb...

IoT: Device Vulnerability & Security Concerns in Wearable Devices

Wearable IoT have broaden and improved the perspective of individuals about their surroundings. A successful IoT device has to be affordable as well as reliable. It should not interfere with other devices and should incorporate mechanisms to remain immune from interferences. It should further ensure effective battery life with perfect functionality and energy efficiency. However, the risks involved in attaining this ideal scenario are many. IoT include a plethora of devices or things like vehicles, smartphones, televisions, wearable devices like fitness tracking devices, smartwatch and Google Glass, etc. These devices are embedded with software applications, sensors and other components for receiving and sending data. A colossus of connected devices is created by inter-connectivity of those devices. This connectivity offers magnificent benefits to people’s lives but it entails certain security and privacy concerns. The most conspicuous among them are the wearable devices which are gain...

IoT and LoRaWAN

The internet of things in the current world needs a wide network to handle a great many nodes well connected to each other and accessing the internet. This requires a network which is capable of handling the huge interconnectivity. The sensors on wireless networks are dependent upon devices with limited energy. This has led the network industry to explore methods with which energy could be saved. Considering the plethora of nodes connected over the internet LoRaWAN is an optimum solution. LoRaWAN is a low range-low power wide area network protocol for internet of things. The Low range-low power technology is being adopted all over the world as it is a licensed, free, low power WAN ecosystem. This protocol can provide smooth connectivity among large numbers of nodes interconnected on the internet. It helps to address problems of bandwidth latency and coverage over large range. It is a feasible technology which allows communication for long-range apps. This review report illustrates th...

Cloud Migration using AWS Cloud-based Services

Image
 Cloud computing is the most trending technology that provides access to computing services over the internet which is mostly based on pay per use model. The characteristics of cloud computing offer elasticity and cost efficiency to the adopting business sectors such as healthcare, supply chain, etc.  This paper discusses Cloud based services offered by Amazon Web Services. The functional and non-functional requirements that a company generally needs are documented. A scalable cloud solution from AWS [3] supporting those requirements is described along with its benefits and disadvantages. A.      Functional Requirements The system requires access to company records whenever needed irrespective of the location of the user. It should allow the users to access, update and manage records. The unique requirements of an organization for using cloud services are enlisted below. AWS Cloud services and resources are capable of fulfilling each of them. Intercloud Connecti...

Wireless Sensor Network Protocol: Directed Diffusion

This protocol for WSN is a data centric query-based protocol where sink floods a query into the network through several routes between the sink and source. The sink supports one of those routes and receives data from that path within shorter time interval. Therefore, multipath delivery can be realized and significant achievement can be attained by adapting subset of network.  The four features of directed diffusion routing protocol include Interests, data, gradients and reinforcement. The query that determines the user’s requirements is the Interest. Processed information is the data. The direction state of node that gets the Interest is the gradient. Multiple gradient paths are used to transmit events from originators of interest. The attribute value pairs that are used to name task descriptions are  example:             type=wheeled vehicle                     //vehicle...

Wireless Sensor Network Protocol: Sensor Protocol for Information via Negotiation (SPIN)

Image
 A wireless sensor network is formed using multiple small sensors. Such a network is a self- organized infrastructure-less wireless network that monitors environmental conditions on its own and transmit data in a synchronized manner to main location called sink which analyses the data. Sink addresses the queries generated by users by collecting results and providing required information. Routing protocols play an important role in producing efficient and interruption less communication within the nodes of the WSN. Applications using WSN demand quick data transmission with minimum interruption. The service, performance and reliability of the WSN depends on the choice of its routing protocol. This article discusses Sensor protocol for information via negotiation (SPIN) which allow exchange of data effectively over a WSN. Sensor Protocol for Information via Negotiation (SPIN) This routing protocol is basically for exchanging data about the sensor data in network operation. It is a neg...