If you face any issues or have any questions, feel free to reach me at donotreachme@gmail.com
Today's Classes Overview:
Basic Outline of ISO27001.
She loves teaching, music. Explained about GPGPU and some fundamental thing about computers like cores and threads.
YouTube time
Made us enroll in NPTEL Course and explained some IoT basics and breadboard examples.
Blockchain Overview, Centralised and decentralised differences.
Eat I guess?
Sleep?
Today's Classes Overview:
Fundamentals of Operational Technology, IDS/SCADA
Pipelining Concept and Outline of Syllabus
YouTube time
Practical Washing Machine example of Pipelining
Class Cancelled
No classes scheduled for today.
Today's Classes Overview:
How're we supposed to make a diagram about something which we just heard about like atleast show us an example or something and also where is the DMZ in the network. OT Layout Image
This is my YouTube time but SS took class more like talk because all she did was to pass the time with some amateurs discussing bribe + her laptop kept turning off because the baterry is drained and she hasn't plugged it on but kept complaining about "company's laptop" Do I want to give ISO 27001? Question to myself. I guess I could never clear if I have a teacher like this
Blockchain is a decentralized digital ledger technology that securely and transparently records transactions across a network of computers (nodes). Each block contains a list of transactions and a unique cryptographic hash linking it to the previous block, forming a tamper-resistant, chronological chain. This ensures data integrity without a central authority and underpins cryptocurrencies like Bitcoin. Bitcoin is a decentralized digital currency enabling direct payments without intermediaries, with transactions verified and recorded on the blockchain by miners through a process called proof of work. Mining involves solving mathematical puzzles to find a nonce that meets network criteria, securing the network and preventing double-spending. Peer-to-peer (P2P) connection, exemplified by file-sharing protocols like BitTorrent, allows direct communication and resource sharing between computers without a central server. The key difference between blockchain and P2P is their primary functions: blockchain focuses on secure, transparent record-keeping, while P2P emphasizes direct, decentralized communication and resource sharing. These technologies collectively redefine digital transactions and record-keeping, with broad applications across various industries.
YouTube
Sleep
Today's Classes Overview:
Basic Introduction and keywords of blockchain
A time-pass lecture
Actually went to Library
Did not attend
Today's Classes Overview:
Differences between IT and OT explanation, Challenges in OT Security and Abbreviations of OT components.
Differences between Encryption and Hashing, Basics of cryptography and examples of Algorithms
AISMS Class shifted to this time period, Again she exhibited clear favoritism. Not much of a class
Sleep?
Today's Classes Overview:
ISO 27001: Focuses on establishing, implementing, maintaining, and improving an Information Security Management System (ISMS). It provides a framework of requirements that organizations can follow to manage their information security risks effectively. Certification is possible, demonstrating compliance with these standards.
ISO 27002: Provides detailed guidelines and best practices for implementing specific information security controls within an organization. It complements ISO 27001 by offering practical advice on how to select, implement, and manage security measures like access control, incident management, and physical security.
Pipelining involves breaking down a task into sequential stages where each stage processes a portion of the task concurrently. This allows for continuous throughput and reduces overall completion time by overlapping stages. Implicit parallelism refers to tasks or processes that are automatically executed in parallel by systems or compilers without explicit user direction. Examples include web browsers downloading multiple resources concurrently and multitasking operating systems managing multiple processes simultaneously. Explicit parallelism requires the programmer or user to explicitly define and manage parallel execution of tasks. Examples include using libraries like MPI for distributed memory systems, OpenMP for shared memory systems, or CUDA for GPU programming.
Break time
Various components of IoT, Uses of IoT
Proxy Lecture
Lunch break
Study or research time
Today's Classes Overview:
1. What is OT?
2. What is OT security?
3. What is network topology?
4. What is SCADA?
5. What is IoT?
6. Write down the names of OT Components.
7. What are the OT security challenges? Explain in detail.
8. Difference between OT and IT.
9. What is the importance of OT Security?
10. Draw the OT Security diagram for XYZ organization.
Topic to be covered
Study or research time
Topic to be covered
Topic to be covered
No classes scheduled for today.
Today's Classes Overview:
Topic to be covered
Study or research time
Topic to be covered
Study or research time
Topic to be covered
Today's Classes Overview:
Topic to be covered
Topic to be covered
Study or research time
Lab session
Today's Classes Overview:
Topic to be covered
Topic to be covered
Study or research time
Topic to be covered