<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance</title>
	<atom:link href="http://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/aug-nov14</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:56:11 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>INDIAN LABOUR LAW REFORMS AND INDUSTRIUL GROWTH</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=958</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=958#comments</comments>
		<pubDate>Tue, 02 Dec 2014 09:10:15 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Abhivyakti]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=958</guid>
		<description><![CDATA[As, today is the International Labour Day ,which is celebrated over the United States on the first Monday of September as holiday dedicated to the social and economic achievements of the workers, while in other parts of the world on the 1st of May, interpreted as the International Workers Day. We know that, till the<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=958" title="Read INDIAN LABOUR LAW REFORMS AND INDUSTRIUL GROWTH">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>As, today is the International Labour Day ,which is celebrated over the United States on the first Monday of September as holiday dedicated to the social and economic achievements of the workers, while in other parts of the world on the 1st of May, interpreted as the International Workers Day. We know that, till the time, the NDA government has assumed the power in the centre, there is a large chunk of economists, such as Arvind Pangariya ,Ruchir Sharma and many more, have suggested to the government that Indian Labour laws need the great reforms ,if it wants to achieve the high growth as for as industry and manufacturing sector is concern.<br />
It is well invited by the prime minister of India Mr.Narendra Modi in his 15th august independence day speech, “come and make in India” and proposed the labour reforms very soon in the country. But the need of the hour is that, with these many archaic labour laws, is it possible to achieve such a manufacturing friendly environment in India? The tempting answer can be ,not. How these reforms in Indian labour laws are going to benefit the country and manufacturing industry is the topic of big debate.<br />
The Rajasthan and Haryana government have recently proposed to amend some Central Labour Laws. The Ministry of Labour and Employment has also circulated labour reform proposals. The Department of Industrial Policy and Promotion has issued an “advisory” to the state governments to institute reforms relating to inspection.<br />
Labour flexibility measures, especially in respect of hire and fire and contract labour, have caused industrial unrest and violence. Every company hesitates to form or establish any industry or firm in India , cause of stringent labour laws of the country. There are many trade unions within the companies those use to create time to time many troubles to companies at the minor disputes of few workers. Those need to be change, if we want to emerge as the manufacturing hub in the world or we will still remain dependent on Chaina for millions of imports of goods and products.<br />
The proposals by the government are mainly in three laws known as the Factory Act 1948, Apprentice Act 1961 and the Labour Law Act 1988 in which the main provisions are, the over time working hours will be increased from 50 hours to 100 hours , the women work force will be allowed to do night shifts in factories, the Trade Union formation will require the 30% consensus of total workers to form , company would be authorised to fire the 300 workers increased from 100 and many more.<br />
If the reforms as has been proposed, will be implemented, the more companies and manufacturing giants will be attracted to invest in the country and thus , the more employment will generated. The more productivity will increase, which will definitely be going to transform the industrial and manufacturing growth of the country. And we will emerge as the quality product exporter to the rest of the world. But requirement will be only to implement these laws and regulations effectively, by which it will not happen at the vast stake of poor and hardworking workers.</p>
<blockquote><p><strong><em>By Abhinav Shukla &#038; Ashutosh Rai<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=958</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>कलमानस</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=944</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=944#comments</comments>
		<pubDate>Tue, 02 Dec 2014 07:27:12 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Abhivyakti]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=944</guid>
		<description><![CDATA[Anjana Bajpai MBA-IT IIIT Allahabad]]></description>
			<content:encoded><![CDATA[<p><br/><br />
<a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/12/1.png"><img class="aligncenter size-full wp-image-945" title="1" src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/12/1.png" alt="" width="350" height="609" /></a><a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/12/2.png"><img class="aligncenter size-full wp-image-946" title="2" src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/12/2.png" alt="2" width="350" height="544" /></a><a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/12/3.png"><img class="aligncenter size-full wp-image-947" title="3" src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/12/3.png" alt="3" width="350" height="609" /></a><a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/12/4.png"><img class="aligncenter size-full wp-image-948" title="4" src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/12/4.png" alt="4" width="350" height="240" /></a><br />
<br/></p>
<blockquote><p><strong><em>Anjana Bajpai<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=944</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Detecting an Advanced Persistent Threat</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928#comments</comments>
		<pubDate>Mon, 17 Nov 2014 17:03:03 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928</guid>
		<description><![CDATA[Today the threat landscape has changed. Hackers and scammers have grown smarter. Organizations these days face a much larger threat: Advanced Persistent Threat. There is no rulebook for hackers to break into a system. However an organization must ensure they follow a security and monitoring framework which ensures all the boundaries and threat areas a<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928" title="Read Detecting an Advanced Persistent Threat">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Today the threat landscape has changed. Hackers and scammers have grown smarter. Organizations these days face a much larger threat: Advanced Persistent Threat.</p>
<p>There is no rulebook for hackers to break into a system. However an organization must ensure they follow a security and monitoring framework which ensures all the boundaries and threat areas a covered. It is a challenge today not only to detect and remediate advanced persistent threat, but also to effectively address the issue in a timely manner.</p>
<p>There are three basic areas which need to be monitored and analysed to detect an Advanced Persistent Threat:<br />
1.	Network Traffic Analysis<br />
2.	Payload Analysis<br />
3.	Endpoint Behaviour Analysis</p>
<p><strong>Network Traffic Analysis:</strong><br />
Network traffic is one of most important data the organization needs to analyse to detect any threat or a break in. By analysing the inbound and outbound traffic, any compromised system or network should be detected. This can include for example traffic patterns. Based on usage a baseline should be created of all the activities, and these can be compared to real time events to detect any anomaly. </p>
<p>To further strengthen this network forensics is an important activity that an organization should look into. Forensics would capture, store and analyse network traffic and provide data analytics to improve detection and remediation.</p>
<p><strong>Payload Analysis</strong><br />
It is often very difficult to detect the actual extent of damage even when the compromise has been detected. Payload analysis helps in further analysing a malware or a compromised system to study its behaviour and detect the extent of damage it could have caused. It also helps in reducing false positive and also increases the effectiveness of detection. This is very effective in detecting malwares which bypass signature based verification.</p>
<p>However payload analysis is a time taking process. Moreoever sandboxing and replicating the exact environment is also a common challenge which all organisations face.</p>
<p><strong>Endpoint Behaviour Analysis:</strong><br />
Endpoint Behaviour Analysis aims to detect any unwanted or suspicious activity within the endpoints. It can be a network related activity originating from the end point or an application behaviour anomaly.</p>
<p>One of the interesting technology is Application Containment. In this a suspicious application or a compromised application is allowed to function in a container (thus isolating it from accessing from any other data in the system). Its behavior is monitored and it is fed with some similar data to simulate its activity. However this is a resource consuming process and often not very user friendly.</p>
<p>As the threat scenario is changing, information security is no longer the work of individuals. An enterprise wide approach needs to be undertaken, taking into all key stakeholders, management, business and IT to achieve a collective goal to securing an organization.</p>
<blockquote><p><strong><em>Rahul Das<br />
Consultant | Cyber Security<br />
PwC, India<br />
(IIITA, MS-CLIS 2011-2013)<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=928</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Small Screen</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=917</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=917#comments</comments>
		<pubDate>Mon, 17 Nov 2014 04:26:53 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Vibes]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=917</guid>
		<description><![CDATA[Indian television is immature. So are the audiences. How else can serials with little or absolute illogical, monotonous and sometimes irritating themes manage to continue for years in a row? The same saas-bahu saga, packaged and repackaged, evacuated and refilled with little or no modifications what-so-ever, and the housewives with their eyes hooked on the<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=917" title="Read The Small Screen">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Indian television is immature. So are the audiences.</p>
<p>How else can serials with little or absolute illogical, monotonous and sometimes irritating themes manage to continue for years in a row? </p>
<p>The same <strong><em>saas-bahu</em></strong> saga, packaged and repackaged, evacuated and refilled with little or no modifications what-so-ever, and the housewives with their eyes hooked on the box laugh (to the most obvious jokes), cry (to the over dramaticised emotional sequences), get excited (to the more than obvious and predictable situations) and listen to the characters&#8217; self talking (which is obviously irritating, sometimes to excruciating extents). After-all, we all know what a vamp would think in that situation and how a courageous righteous <strong><em>bahu</em></strong> would be exercising her determination by making firmer resolutions at the same time. </p>
<p> Who talks like that?</p>
<p>The small screen celebrates womanhood. They (women) are everywhere. Almost every serial is woman centric, which shows her to be a determined, hard working, sacrificing and righteous when she is the good one and the exact opposite when not.</p>
<p>The plot is always over dramatized with the master <strong>&#8216;K&#8217;</strong> formula in place, which neither the makers or the writers do away with, nor do the audiences want to get over with. It has for so long kept the audiences in a limbo, the comfy cuddly environment of falsehood that is their only escape from reality. The reality they prefer to ignore.</p>
<p>Womanhood no doubt needs to be celebrated, but I seriously believe there are other better ways to do it. Why not show stories with working housewives as their protagonists and the day to day problems they face, right from getting up from a tiring yesterday in the morning, to preparing breakfast for her family before leaving for work and looking after a child. Working in the office, facing the wrath of seniors, gaze by perverts, covering the mistakes by juniors in the team she manages, to tackling stressful situations (sometimes with panache and sometimes with a style so silent that the most undercover won’t get a hint of!!). The portrayal of such characters in all the naive simplicity and substance and then broadcasting the message in a subtle sarcastic manner would definitely multiply the impact of an act and the series as a whole. It is better not to always have all-inclusive dialogues. Sometimes when things are kept mum, and the audience is given the task to make things out for themselves within the dynamics of a drama set up, the interest evoked is by and large encouraging and people start loving the show, who then long for every next episode and gasp for more at the end of it. The people start to live with the characters as they do with their companions. In the recent years, there have been serials which have made a promising start, even had a breath of fresh air with them, but once the honeymoon period ended, things got back to ground zero.</p>
<p>Time to time, the intellectual fuel of the creative team exhausts and gets mileage only when they take little hints from here and there. And that is when the rot creeps in.</p>
<p>In a stark contradiction, the small screen dramas in the west thrive on a more serious and intellect stimulating and smashingly entertaining stuff made with sheer brilliance on the part of the script, story, screenplay and execution. </p>
<p>They make stories in the center of which lies a chemist (Breaking  Bad), a serial Killer (Dexter), Scientists (Fringe), Medical Professionals (Dr. House), Lawyers (Suits), CIA (Homeland), Kings and Kingdoms (Game of Thrones), Supernatural stuff (Supernatural and Vampire Diaries) and many more. </p>
<p>They appeal equally to all, in spite of their dive into the technicalities of the profession of the characters they deal with. Such is the beauty of their content and display. The comedy shows are equally absorbing.</p>
<p>Indian television has been through a phase of evolution. <strong>YUDH</strong> &#8211; the story of the construction magnate with all his perfections and imperfections, family, life, fears, guilt, anxieties, plans, love, affection and foresight is just a beginning. </p>
<blockquote><p><strong><em>Divyanshu Ojha<br />
MBA-IT (2012-2014 Batch)<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=917</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Go For B&#8217;Accumen</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=907</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=907#comments</comments>
		<pubDate>Sun, 16 Nov 2014 08:22:06 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[B'Accumen]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=907</guid>
		<description><![CDATA[]]></description>
			<content:encoded><![CDATA[<p><center><br />
<br />
<script language="javascript">
<!--
function writeSwf(movie, width, height) {
  document.write('<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=7,0,19,0" width="' + width + '" height="' + height + '" ID="sf" VIEWASTEXT>');
  document.write('<param name="movie" value="' + movie + '" />');
  document.write('<param name="quality" value="high" />');
  document.write('<param name="wmode" value="window" />');
  document.write('<param name="allowScriptAccess" value="always" />');
  document.write('<param name="allowFullScreen" value="true" />');
  document.write('  <embed src="' + movie + '" quality="high" name="sf" allowScriptAccess="always" allowFullScreen="true" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" width="' + width + '" height="' + height + '" />');
  document.write('</object>');
}
  writeSwf("BAccumen/quiz.swf", 720, 540);
</script><br />
</center></p>
<p>Please Wait While the Quiz is Loading . . .</p>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=907</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responsive Web Designing</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=874</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=874#comments</comments>
		<pubDate>Fri, 14 Nov 2014 10:46:37 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Tech-Hive]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=874</guid>
		<description><![CDATA[Target readers: Website Designers and Developers, Programmers Keywords: CSS, HTML, Frameworks Introduction It is the web development approach, which emphasizes on user experience practices to make reading easier with minimum scrolling, clicks and resizing required. It is responding to the size of the browser window or the device, maintaining a single code. Why do we<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=874" title="Read Responsive Web Designing">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p><strong>Target readers:</strong> <em>Website Designers and Developers, Programmers</em><br />
<strong>Keywords:</strong> <em>CSS, HTML, Frameworks</em></p>
<p><strong>Introduction</strong></p>
<p>It is the web development approach, which emphasizes on user experience practices to make reading easier with minimum scrolling, clicks and resizing required. It is responding to the size of the browser window or the device, maintaining a single code.</p>
<p><strong>Why do we need RWD?</strong></p>
<p>Web development has been in market since internet is. But why suddenly a new concept, which led to redesigning of thousands of existing web sites, was introduced and welcomed by all designers. Emerge of RWD is basically an outcome of astonishing progress of smart phones and tablets in market. Each month there is an increasing amount of people who switch to using mobile and tablets instead of desktops, for surfing.</p>
<a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/11/11.bmp"><img src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/11/11.bmp" alt="RWD" title="RWD" class="aligncenter size-full wp-image-877" /></a>
<p>To make the same website look good across all devices, there can be two approaches<br />
<strong>1.</strong> <em>Maintaining different code base for these devices.</em> But here, you will have to develop different code base, which leads to high development and maintenance cost.<br />
<strong>2.</strong> <em>Use responsive web designing approach.</em> You design for three device sizes but develop a single code base in HTML that makes the same website look good on large desktop monitors and small smart phones and anywhere in between.</p>
<p><strong>How to create RWD?</strong></p>
<p>It is the same HTML used for all devices, using CSS (which determines the layout of webpage) to change the appearance of the page. It relies on proportion-based grids to rearrange content and design elements. For example, media queries are used to make certain css styles apply only for devices with screen width as small as mobiles:</p>
<p>@media only screen and (max-width:500px){<br />
	#wrapper #nav{ margin: 0 0 0 -160px;<br />
}</p>
<p><strong>Popular responsive css frameworks in market</strong></p>
<p>There are certain css frameworks available that make responsive development easier. The most popular are:<br />
1.	Bootstrap.<br />
2.	Foundation.<br />
3.	Gumby.<br />
4.	Skeleton.</p>
<blockquote><p><strong><em>Richa Deshwal<br />
Deloitte. |Bengaluru Area<br />
Email: deshwalricha8@gmail.com<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=874</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When heart bleeds and shells shock!!</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870#comments</comments>
		<pubDate>Fri, 14 Nov 2014 10:26:03 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870</guid>
		<description><![CDATA[In the past couple of months, many security bugs have shaken the cyber world to its very core. Some of these are said to be present and being exploited by attackers for many months and even years. While some need expert knowledge to exploit, you can exploit one attack on you own laptop. It does<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870" title="Read When heart bleeds and shells shock!!">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>In the past couple of months, many security bugs have shaken the cyber world to its very core. Some of these are said to be present and being exploited by attackers for many months and even years. While some need expert knowledge to exploit, you can exploit one attack on you own laptop. It does not always take a smart attacker to breach a security system, sometimes an improper implementation and design makes things really easy for an attacker. Knowing about these bugs could teach a lot to present days and upcoming developers and security professionals. Here is a summary of three such security bugs which have leaked our information to attackers round the world for years and have been identified recently.</p>
<p><strong>1.</strong> The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. Why is it called Heartbleed?, because the bug is in the OpenSSL&#8217;s implementation of the Transport Layer Security (TLS) protocols heartbeat extension (RFC6520). The attacker can grab memory from a server, without leaving any traces. This gives attacker a copy of information in memory including keys, usernames and passwords, etc. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users. Bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. The vulnerability is classified as a buffer over-read.</p>
<p><strong>2.</strong> The ShellShock is a vulnerability in widely used bash command shell. Since bash is used in many systems and in many different forms, this can be exploited in various ways. This bug causes bash to execute commands when they are concatenated to the end of function definitions in values of environment variables. A remote attackers utilizes this bug to execute arbitrary code and commands without having proper privileges. To test whether a system is vulnerable, you can try popping open a shell/terminal and running this command :<br />
env X=&#8221;() { :;} ; echo you might be vulnerable&#8221; /bin/bash -c &#8220;echo hello&#8221;<br />
If “you might be vulnerable” pops up, your system has an exploitable version of Bash installed. Exploitable bash are also used in MacOS X, android and Windows Cygwin. Attackers exploited Shellshock using botnets to carry out distributed denial of service attacks. Shellshock also has the potential to be turned into a worm — a self-replicating piece of code that automatically propagates to all Shellshock-vulnerable systems, potentially causing untold damage. Shellshock was compared to Heartbleed in its severity.</p>
<p><strong>3.</strong> POODLE attack, Padding Oracle On Downgraded Legacy Encryption attack, is a name given to exploit that takes advantage of way some browsers deal with encryption. Most of the browsers use TLS protocol for secure communication, but revert back to SSL 3.0 when TLS connection is not available for interoperability. An attacker takes advantage of this, using Man-in-the-middle attack, forcing use of SSL 3.0. POODLE is used to target browsers that uses SSL 3.0 protocol for encryption and authentication. Attacker exploits a design flaw in SSL 3.0, that allows the padding data at the end of a block cipher to be changed so that the encryption cipher become less secure each time it is passed.</p>
<p>POODLE is an example of a vulnerability that succeeds thanks to a mechanism designed for reducing security for the sake of interoperability. Such flaws call for extra care when designing systems in domains with high levels of fragmentation. In such domains graceful security degradation may become common.</p>
<p>Google researchers Bodo Moller, Thai Duong and Krzysztof Kotowicz discovered (and named) the POODLE vulnerability and warned the IT community that the only way to prevent POODLE attacks is to stop using SSL 3.0.</p>
<p>Out of the above three, Heartbleed was rated most serious vulnerability which affected systems for nearly 2 years. It resulted from improper input validation (due to a missing bound check) in the implementation of the TLS heartbeat extension. This shows that it was an implementation issue and not a design issue. POODLE as already mention resulted because of reducing security for interoperability. Since this was done intentionally, it can be mentioned in the category of design flaw. To avoid such incidents in future, we should think like both an implementer and an attacker while designing and implementing protocols and software.</p>
<p>The only solution to be protected against these and against many more unidentified vulnerabilities is to keep system updated and remain yourself updated about new vulnerabilities.</p>
<blockquote><p><strong><em>Anurag Shandilya<br />
M.Tech (CLIS)<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=870</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ethical Hacking</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866#comments</comments>
		<pubDate>Fri, 14 Nov 2014 10:19:04 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866</guid>
		<description><![CDATA[The term “Hacker” has two different meanings in the computer industry. Traditionally it is defined as “A geek who enjoys learning the computer systems in depth and how to increase their functionality” or “the one who enjoys doing programming and exploring new things in the computer system, either mechanically or electronically”. While on the other<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866" title="Read Ethical Hacking">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>The term “Hacker” has two different meanings in the computer industry. Traditionally it is defined as “A geek who enjoys learning the computer systems in depth and how to increase their functionality” or “the one who enjoys doing programming and exploring new things in the computer system, either mechanically or electronically”. While on the other hand, in past few years, this term has been reformed to take a new meaning, “hackers are someone who intrude in any system for personal gain especially for the passwords and the confidential information”. Now-a-days, in current scenario, if you ask anyone that you are a hacker then firstly he/she will request you to hack the facebook account of any of his/her friend. In technical terms, former one are called hackers while the latter one are called crackers or criminal hackers.</p>
<p>Hacking is legal, but cracking not. Crackers break into the system with some malicious intent for some personal gain. These personal gain may be for fame, profit or even revenge. They can modify, delete and steal critical and confidential information from the victim system. Hackers have quite advanced knowledge of operating systems and programming languages. They know different security holes within the system and the reasons for such holes. They are keen to seek further knowledge, share their discoveries without having intentions for damaging or stealing data. On the other hand, Crackers gain unauthorized access, destroy important data, or in short cause problems for their targets. Whatever the case may be, people give hacker a negative outline. A person can be a hacker regardless of age, gender or religion. It just depends on the technical skill of the person which vary from one hacker to other. Some of the hackers barely know to surf the internet, whereas other writes such software on which other hackers depend.</p>
<p><strong>Types Of Hackers</strong></p>
<p>Broadly speaking, hackers can be classified on the basis of their skills and knowledge or on the basis of type of work they perform. If we speak about the former one, we can rename hackers as Coders, Admins and Script Kiddies, while the latter one can rename a hacker into three more specific terms White Hat hacker, Black Hat Hacker and Grey Hat Hacker.</p>
<p><strong>Coders:</strong> They are the real hackers, the one who revise the methods and the write the codes for the tools available in the market. They can find security holes in the software to create their own exploits.</p>
<p><strong>Admins:</strong> They are the guys who use the tools developed by the coders. They don’t write their own code and techniques but explores the tools at their best to find different tricks and techniques.</p>
<p><strong>Script Kiddies:</strong> They are the persons who reads out something on Internet, find few scripts online and apply them exactly in the same manner as it is specified on the Internet. They are the most dangerous categories. They can cause more harm because they don’t know what those codes and script means, they are simply applying it. They take advantage of the hackers’ tools and documentations available freely on the Internet, but they don’t have knowledge of what is going behind the scene.</p>
<p><strong>White Hat hackers:</strong> In simple language, you can call them as good guy or Ethical Hacker. They focus on securing and protecting IT systems. They use their knowledge to locate braches in the system and find counter measures in the resource.</p>
<p><strong>Black Hat Hackers:</strong> They are the second type of hackers which I stated earlier as Crackers or criminal hackers. They use their skills for malicious purpose and illegal activities. They break into others’ system for some malicious intent and focus on data stealing and security breaching.</p>
<p><strong>Grey Hat Hacker:</strong> They are intermediate of White hat and Black hat hackers. They can act sometimes legally, for the goodwill, while sometimes not. They might not have malicious intent, but sometimes can commit crime during the course of their technical exploits.</p>
<p><strong>Hactivist:</strong> They are another type of hackers who generally broadcasts political or social message through their work on the web. Recent example includes “the photo of Modi on website of AAP”. We can cover such persons under grey hat hackers.</p>
<a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/11/11.png"><img src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/11/11-680x459.png" alt="Types" title="Types" width="625" height="421" class="aligncenter size-large wp-image-909" /></a>
<p><strong>Cyber Terrorists:</strong> They are the black hat hackers who generally attack govt. computers. They crash critical systems and steal confidential information from different specialized system specially govt. website.</p>
<p><strong>Why Hackers Hack??</strong></p>
<p>This is a quite good question for the argument, but we can’t specify the reason for the hackers to hack the system. It varies from one type of hacker to other.<br />
Some of the reasons may include:</p>
<ul>
<li>Exploring additional knowledge</li>
<li>Hacking for the hobby</li>
<li>Information stealing</li>
<li>Software cracking</li>
<li>And many more endless reasons…</li>
</ul>
<p><strong>Prevention from Hackers</strong></p>
<p>Ethical hacking in not illegal, it’s performed by the permission of the victim to explore something to the deeper level. If you ask me the way to prevent yourself from hackers then I’ll suggest only one thing: “don’t ever fight with any hacker. If you do, then please unplug your computer system and lock them away, so that no-one can touch your system, not even you!” But this is not the right way for the Information security, but this is important for you to protect your system from known vulnerabilities. You don’t have to protect your system from everything, In fact, you can’t even do so. However, we may adopt some techniques to prevent ourselves to a much better extent:</p>
<ul>
<li>Never share password with anyone, no matter how much he / she is close to you</li>
<li>Never click on any unknown / unwanted link that is sent to you through chats or emails</li>
<li>Avoid use of public computers</li>
<li>Avoid use of public networks, especially free wifi. Free may be dangerous.</li>
<li>Never use your personal online accounts such as emails or social accounts like facebook in any public network, NOT even in your office. Sniffers are all around.</li>
<li>Don’t hit open to any unknown software programs</li>
<li>Never let your PC be in touch with any of your friend who lies in any of the hacker categories mentioned earlier.</li>
<li>Use any good antivirus and spyware program</li>
</ul>
<p><strong>Different Phases in Hacking</strong></p>
<p>Here are the different steps that are performed by the hackers sequentially in order to attack the target.</p>
<ul>
<li>Information Gathering: Hackers seek to find out as much information about the victim as possible. They locate, identify and record information about their targets.</li>
<li>Scanning: In this phase, attackers scan the networks and ports to find out the vulnerable port.</li>
<li>Gaining access: This is the phase of real hacking. Once the hacker identifies about the vulnerable port, then they tries different methodologies to gain the access of that system.</li>
<li>Maintaining access: After gaining the access, it is very mandatory to maintain the access for at least the time being in which hacking is being performed. Interrupt in access will cause loss of data or even loss in the connection.</li>
<li>Performing required tasks: Once hacker gains access on the target system, they perform the required task on the target.</li>
<li>Clearing the logs and footprints: Last but not the least, hackers need to clear the footprints and all the logs from the victim system, so that it’s not easy for anyone to trace the hacker. This is the reason for which hackers are called as Anonymous.</li>
</ul>
<p><strong>Methods of Hacking</strong></p>
<p>Although there are countless methods for the hackers to hack into a system, and increasing day by day, major one includes the following, we are not going into the details as of now:</p>
<ul>
<li>Footprinting</li>
<li>Social Engineering</li>
<li>Denial of Service attack</li>
<li>Keyloggers</li>
<li>SQL Injection</li>
<li>XSS (Cross Site Scripting)</li>
<li>Spoofing</li>
<li>DNS Attack</li>
<li>Steganography</li>
<li>Reverse Engineering</li>
<li>Cryptography</li>
<li>Trojans and bombs</li>
</ul>
<p><strong>Laws in India for Hacking</strong></p>
<p>According to Pavan Duggal, Supreme Court advocate, First cyber law of India makes all cybercrimes punishable. These cybercrimes may include hacking, cracking, and publishing of information in the electronic form, damage to the computer source code, violation of confidentiality and privacy, and publication of false digital signature certificate. Different cases that gets covered in the laws include:</p>
<ul>
<li>Social media fake profile case</li>
<li>Email account hacking</li>
<li>Credit card fraud</li>
<li>Online share trading fraud</li>
<li>Tax evasion and money laundering</li>
<li>Source code theft</li>
<li>Theft of confidential information</li>
<li>Software piracy</li>
<li>Music piracy</li>
<li>Email scam</li>
<li>Phishing</li>
<li>Cyber Pornography</li>
<li>Online Sale of Illegal Articles</li>
<li>Virus attacks</li>
<li>And many others…</li>
</ul>
<blockquote><p><strong><em>Kamal Nayan<br />
Blogger at http://tipstricksandhacking.blogspot.in<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=866</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Kiss Of Reconciliation</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=861</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=861#comments</comments>
		<pubDate>Fri, 14 Nov 2014 09:56:31 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Vibes]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=861</guid>
		<description><![CDATA[Seems like the Indian youth has found a new cause to further its fight against violent forms of social repression as it takes stand against moral policing. The protests, which so far have been in the form of public display of affection like hugging or kissing demonstrations in the face of authorities, haven’t caused any<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=861" title="Read Kiss Of Reconciliation">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Seems like the Indian youth has found a new cause to further its fight against violent forms of social repression as it takes stand against moral policing. The protests, which so far have been in the form of public display of affection like hugging or kissing demonstrations in the face of authorities, haven’t caused any mass furore. But, as the volunteers maintain, they got their point duly noted.</p>
<p>The so called “Kiss of Love” movement started when some activists in Kochi decided to lodge their protests against the vandalization of a cafe’ in Kozhikode by BJP workers alleging “Immoral activities”. In Kolkata, on November 7, 2014, some 300 students from Javadpur and Presidency Universities also staged demonstrations in college campuses and some 50 volunteers staged protests at the gates of RSS headquarters in Delhi.</p>
<p>So far the movement has received mixed response. Satyani, a PHD student proclaims, “Time has come to safeguard our freedom of expression”. Whereas, Professor Amitav Gupta, JU though empathises with the cause, finds the protests silly. Prabir Mukherjee, a professor at PU finds the protests offensive and vulgar.</p>
<p>(Kochi to Kolkata: ‘Kiss of love’ unites students, divides teachers &#8211; See more at: http://indianexpress.com/article/cities/kolkata/kochi-to-kolkata-kiss-of-love-unites-students-divides-teachers/#sthash.uYh0ghF4.dpuf, 2014)</p>
<p>So, what we have is two sides crying foul, one rising concerns over encroachment of liberty in the name of moral policing and the other disgruntled over denigration of Indian values and norms by western culture. The critical question in such a scenario should be:”In the developed India that we look forward to, which side seems to occupy the prominent place?”</p>
<p>In reply, a case can be made out of U.S. transformation from a conservative, early 20th century nation to the techno economic giant of 21st century, equally pushing for libertarian, human rights based agenda. The present Indian youth, eager and impatient to leave their mark on the globe aren’t going to compromise with the notions of liberty and freedom to make choices for themselves.</p>
<p>But they need to learn to accommodate to the cultural sensitivities of common people who have been raised within security of cultural conformities. Change, doesn’t happen in a day. It’s a gradual process which takes time. At the same time, political outfits which have a knack of cracking down on people allegedly misusing their freedom need to tone their acts down and calibrate to the new social order which emphasizes on values of tolerance and openness to new ideas and alternate style of livings.</p>
<p>And, hopefully then we can look forward to the nation of our dreams, a nation advanced in every domain and where being modern is cherishing the treasure of Indian values as well as sustaining an open, liberal mindset.</p>
<blockquote><p><strong><em>Utkarsh Jaiswal<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=861</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Big Data &#8211; Bigger Risk</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817#comments</comments>
		<pubDate>Fri, 14 Nov 2014 09:12:31 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817</guid>
		<description><![CDATA[Big data analytics is among the current top three concerns of IT leaders, other important areas being IT Security and Mobile Device Management. With increasing thrust of organizations for catering more information, the size of data to be handled is getting bulkier. The idea of ‘Big data’is not mere expansion of traditional database but a<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817" title="Read Big Data &#8211; Bigger Risk">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Big data analytics is among the current top three concerns of IT leaders, other important areas being IT Security and Mobile Device Management.  With increasing thrust of organizations for catering more information, the size of data to be handled is getting bulkier. The idea of ‘Big data’is not mere expansion of traditional database but a lot more. It is not just data maintenance but also analysis and maneuvers of huge unstructured data using predictive techniques and other mathematical models and its conversion into insightful information adding business value.</p>
<p>Data being the most important and vulnerable asset for organizations is critical to kept secure. All the organizations are growing in terms of data they handle. From the inventory stocks to target and existing customer base, from social media content to web locks, each and every bit is adding to data to be stored and analyzed. Thus, leaving them with an only option of switching to Big Data. But, Big Data breaches will be big too, with the chances for even more serious reputational and legal damage than at present.</p>
<p>Big data is often characterized by 3Vs, Volume, Velocity and Variety of data. All the three attributes have their own challenges associated with them. Massive size of data is off course most prominent and coherent one. Velocity signifies both, rate at which data arrives and needs to be acted upon. Variety denotes the heterogeneous data, unstructured data and the issues related to it.The concept of Data has been highly evolved than the traditional times and so are the techniques to handle them. There has been a paradigm shift from traditional Relational databases where data was put into processor to BIG DATA where multiple processors are brought to the data. A technological shift has supported this change to happen. Platforms like Hadoop and frameworks like MapReduce and Storm. Several others technologies for real time analytics and graph computation are emerging as Hadoop has already proved unsuitable for many existing problems.<br />
Big data has resolved several issues like processing of adhoc queries and enormously flooding data through its parallel and powerful computational frameworks .Its distribution across variant silos and ability to tackle unstructured data makes it way superior than traditional analytic techniques. These scalabilities in turn lead to several bottlenecks for the analysts to handle. Following are certain vulnerable areas of BIG DATA which might lead to challenging situations if not tackled well.</p>
<p><strong>Heterogeneous Sources</strong><br />
End Point Input Validation is important to ensure integrity of data sources. Due to massive amount of data to be dealt, it becomes more challenging and increases the vulnerability. </p>
<p><strong>Insecure Data Storage</strong><br />
Data being stored at thousands of nodes, secure storage ensuring Confidentiality, Integrity and Availability of stored data itself becomes challenge.</p>
<p><strong>Insecure Data Processing and Computation</strong><br />
Untrusted computation programs can be submitted and used by the attacker to extract critical information from data sources or to manipulate the sensitive data. Several attacks like denial of service can also be initiated by the attacker.</p>
<p><strong>Data Mining and Analytics leading to Privacy Breeches</strong><br />
Monetizing of big data needs data mining, analyzing and ultimately sharing of results. This might lead to privacy breeches, invasive marketing and disclosure of sensitive information.</p>
<p><strong>Cloud Adoption</strong><br />
Switching to Cloud for storing enormous data proves to be a boon but at the same time it outsources the security of the owners’ critical data to a third party and hence becomes vulnerable.  </p>
<p><strong>Insecure Access Controls</strong><br />
Big data implementations include open source code leading to unrecognized back doors, intruders and default credentials. Also, authentication and access from various sources may not be secure enough.</p>
<p><strong>Auto- tiering</strong><br />
It creates two repositories of data ‘Hot data’ and ‘Cold data’. The data which is accessed less frequently is moved to Cold Data which is lesser secure medium. This might be risky if the cold data is sensitive one.   </p>
<p><strong>Compliance Monitoring</strong><br />
Real time monitoring of compliance is a big time issue that should be taken care of due to the excessive amount of data and alerts generated by big data.</p>
<p><strong>Audits</strong><br />
Regular audits and governance become even more necessary yet challenging due to highly distributed and unstructured nature. Timely audits in conformation with universal compliances are indispensible to ensure that the data is not yet compromised.  </p>
<p>Big data was initially thought and designed with a concept of scalability i.e. accommodating huge volume and variety of data and responding to the queries at earliest. Security issue was not much thought of, which is lacking and need to be made scalable with the amount of data being accommodated. </p>
<blockquote><p><strong><em>Sonika Singhal<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=817</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
