Thursday, December 12, 2013
INFOCOM 2013 A Report...
A day I met many people including Mr. Surit Doss
who is among the few stall wards at ABP. His article are always
inspiring to all who reads them. My talk was on "Current and Future
trends and Challenges on Cyber Security" and it was my pleasure to share
the platform with Mr. Jotirmoyda. I hope the I lived upto the
expectation of the audience.
Friday, July 19, 2013
Web Application Penetration Testing Tools
Posted by Tab Pierce on Wed, May 29, 2013 @ 04:19 PM
As an information security consulting firm, we’re often asked what kinds of web application penetration testing tools
are available. For clarification, we’re not talking about ‘tools’ as in
people. We understand the confusion, because there is a fair amount of
web application testing ‘tools’ out there. But these are some of the web
application penetration testing tools we like, along with the in-house
ones we use (which are not listed here).
Burp
From the people at Portswigger, we bring you’re the free version of
the Burp Suite, which is an integrated platform for testing web
applications. We’re big fans of Burp, which we use for everything from
mapping to analysis of application surface attacks so we can better
discover exploitable vulnerabilities. Key features of Burp include (as
noted from Portswigger’s website):
- An intercepting Proxy, which lets you inspect and modify traffic between your browser and the target application
- An application-aware Spider, for crawling content and functionality
- A Repeater tool, for manipulating and resending individual requests
- A Sequencer tool, for testing the randomness of session tokens
Even the full version is affordable at $299.00 annually.
Arachni
Arachni
is another one of our favorites. It’s an open source web application
testing tool that is not only built on Ruby framework, but is rich in
features as well. It is also extremely versatile, with uses ranging from
a simple command line scanner to a global high performance grid of
scanner, as well as a Ruby library that allows for scripted audits.
Arachni also has a web user interface
that allows multiple users to perform and manage multiple scans, which
supports collaborative efforts between users to share scans and any
issues they might have logged. This makes it a simple method for
distributing a workload of many scans across a pool of dispatchers. One
other very handy feature of Arachni is that it trains itself by learning
from the HTTP responses it receives during the audit process and is
capable of performing meta-analysis using a number of factors to
correctly assess the trustworthiness of results and intelligently
identify false-positives.
OWASP Zed Attack Proxy Project
The Zed Attack Proxy (ZAP)
is an easy-to-use program that can be used effectively by anyone with
little or lots of prior security knowledge, including those who are new
to penetration testing tools. But don’t assume that ZAP is merely a
low-level product. It is robust enough to be utilized by even the most
experienced testers. One of ZAP’s primary uses is for automated scanning
and comes with tools that assist in manual vulnerability searches. It’s
designed to be a simple, integrated penetration testing tool for finding web application penetration vulnerabilities.
Saturday, May 25, 2013
Tuesday, February 5, 2013
UML Notes
Links to UML PDF:
https://docs.google.com/file/d/0B-n1lqqGWToXbFRFWmZmNFpSYUE/edit?usp=sharing
https://docs.google.com/file/d/0B-n1lqqGWToXeEU4b3RmRlFWQTQ/edit?usp=sharing
https://docs.google.com/file/d/0B-n1lqqGWToXbFRFWmZmNFpSYUE/edit?usp=sharing
https://docs.google.com/file/d/0B-n1lqqGWToXeEU4b3RmRlFWQTQ/edit?usp=sharing
Wednesday, June 6, 2012
Thursday, May 17, 2012
3rd International Conference
Technical
and Managerial Innovation in Computing and Communications in Industry and
Academia
Venue : Science City, Kolkata
Date : 18th -19th August, 2012
Conference URL: www.iem.edu.in/conference
Theme of the Conference
Innovative Ideas in National Skill Development vis-à-vis International Scenario
Setting the objectives and benefits
Background research and generating creative idea(s)
Feasibility and risk factors analysis
Design, development, prototypes and testing
Policies and strategies of new procedures and managements
Market research and analysis
Implementation
Important Dates
Paper Submission: 15th June, 2012
Acceptance Notification: 7th July, 2012
Camera Ready Paper Submission: 15th July, 2012
Paper Submission Link: https://www.easychair.org/account/signin.cgi?conf=tmiccia2012
Venue : Science City, Kolkata
Date : 18th -19th August, 2012
Conference URL: www.iem.edu.in/conference
Theme of the Conference
Innovative Ideas in National Skill Development vis-à-vis International Scenario
Innovative ideas in bridging skill gap and providing trained manpower
to various diversified service sectors of the country are the need of the hour.
These may be achieved through various national skill development programs and
job oriented structured courses that strive towards building a formidable work
force of international quality and standard in IT, ITES, Telecom, Finance,
Banking, Retail, Manufacturing, Insurance, Infrastructure industries and the
like that use technical and managerial approaches.
Innovation is the creation of better or more
effective products, processes, services, technologies, or ideas that are
accepted by markets, governments, and society. Innovation differs from
invention in that innovation refers to the use of a new idea or method, whereas
invention refers more directly to the creation of the idea or method itself.
Innovation
matters. It is a key characteristic associated with the success of any society.
Innovation is exploring new ideas based on existing technologies. The
continuous improvement and advancement of the previously known technologies can
result in developing new products, processes and systems which improves the
quality of life for the society as the whole.
Managing innovation consists of:
Identifying the opportunity for innovationSetting the objectives and benefits
Background research and generating creative idea(s)
Feasibility and risk factors analysis
Design, development, prototypes and testing
Policies and strategies of new procedures and managements
Market research and analysis
Implementation
For organizations that are competing globally,
innovation is the key for survival. Technological innovation requires a change
in processes and how companies do business. As an example, manufacturing
industry has been changing radically in order to reduce costs and waste,
increase variety and improve productivity. Technological innovation is a must
to maintain global competitiveness.
Important Dates
Paper Submission: 15th June, 2012
Acceptance Notification: 7th July, 2012
Camera Ready Paper Submission: 15th July, 2012
Paper Submission Link: https://www.easychair.org/account/signin.cgi?conf=tmiccia2012
Sunday, April 1, 2012
PERT Important Points
PERT
Complex projects require a series of activities, some of which must be
performed sequentially and others that can be performed in parallel with other
activities. This collection of series and parallel tasks can be modeled as a
network.
In 1957 the Critical Path Method (CPM) was developed as a network model for
project management. CPM is a deterministic method that uses a fixed time
estimate for each activity. While CPM is easy to understand and use, it does not
consider the time variations that can have a great impact on the completion time
of a complex project.
The Program Evaluation and Review Technique (PERT) is a network model
that allows for randomness in activity completion times. PERT was developed in
the late 1950's for the U.S. Navy's Polaris project having thousands of
contractors. It has the potential to reduce both the time and cost required to
complete a project.
The Network Diagram
In a project, an activity is a task that must be performed and an event is a
milestone marking the completion of one or more activities. Before an activity
can begin, all of its predecessor activities must be completed. Project network
models represent activities and milestones by arcs and nodes. PERT originally
was an activity on arc network, in which the activities are represented
on the lines and milestones on the nodes. Over time, some people began to use
PERT as an activity on node network. For this discussion, we will use the
original form of activity on arc.
The PERT chart may have multiple pages with many sub-tasks. The following is
a very simple example of a PERT diagram:
PERT Chart

The milestones generally are numbered so that the ending node of an activity
has a higher number than the beginning node. Incrementing the numbers by 10
allows for new ones to be inserted without modifying the numbering of the entire
diagram. The activities in the above diagram are labeled with letters along with
the expected time required to complete the activity.
Steps in the PERT Planning Process
PERT planning involves the following steps:
- Identify the specific activities and milestones.
- Determine the proper sequence of the activities.
- Construct a network diagram.
- Estimate the time required for each activity.
- Determine the critical path.
- Update the PERT chart as the project progresses.
1. Identify Activities and Milestones
The activities are the tasks required to complete the project. The milestones
are the events marking the beginning and end of one or more activities. It is
helpful to list the tasks in a table that in later steps can be expanded to
include information on sequence and duration.
2. Determine Activity Sequence
This step may be combined with the activity identification step since the
activity sequence is evident for some tasks. Other tasks may require more
analysis to determine the exact order in which they must be performed.
3. Construct the Network Diagram
Using the activity sequence information, a network diagram can be drawn
showing the sequence of the serial and parallel activities. For the original
activity-on-arc model, the activities are depicted by arrowed lines and
milestones are depicted by circles or "bubbles".
If done manually, several drafts may be required to correctly portray the
relationships among activities. Software packages simplify this step by
automatically converting tabular activity information into a network
diagram.
4. Estimate Activity Times
Weeks are a commonly used unit of time for activity completion, but any
consistent unit of time can be used.
A distinguishing feature of PERT is its ability to deal with uncertainty in
activity completion times. For each activity, the model usually includes three
time estimates:
-
Optimistic time - generally the shortest time in which the activity
can be completed. It is common practice to specify optimistic times to be
three standard deviations from the mean so that there is approximately a 1%
chance that the activity will be completed within the optimistic time.
-
Most likely time - the completion time having the highest
probability. Note that this time is different from the expected
time.
- Pessimistic time - the longest time that an activity might require. Three standard deviations from the mean is commonly used for the pessimistic time.
PERT assumes a beta probability distribution for the time estimates. For a
beta distribution, the expected time for each activity can be approximated using
the following weighted average:
Expected time = ( Optimistic
+ 4 x Most likely + Pessimistic ) / 6
This expected time may be displayed on the network diagram.
To calculate the variance for each activity completion time, if three
standard deviation times were selected for the optimistic and pessimistic times,
then there are six standard deviations between them, so the variance is given
by:
[ ( Pessimistic - Optimistic ) / 6
]2
5. Determine the Critical Path
The critical path is determined by adding the times for the activities in
each sequence and determining the longest path in the project. The critical path
determines the total calendar time required for the project. If activities
outside the critical path speed up or slow down (within limits), the total
project time does not change. The amount of time that a non-critical path
activity can be delayed without delaying the project is referred to as slack
time.
If the critical path is not immediately obvious, it may be helpful to
determine the following four quantities for each activity:
- ES - Earliest Start time
- EF - Earliest Finish time
- LS - Latest Start time
- LF - Latest Finish time
These times are calculated using the expected time for the relevant
activities. The earliest start and finish times of each activity are determined
by working forward through the network and determining the earliest time at
which an activity can start and finish considering its predecessor activities.
The latest start and finish times are the latest times that an activity can
start and finish without delaying the project. LS and LF are found by working
backward through the network. The difference in the latest and earliest finish
of each activity is that activity's slack. The critical path then is the path
through the network in which none of the activities have slack.
The variance in the project completion time can be calculated by summing the
variances in the completion times of the activities in the critical path. Given
this variance, one can calculate the probability that the project will be
completed by a certain date assuming a normal probability distribution for the
critical path. The normal distribution assumption holds if the number of
activities in the path is large enough for the central limit theorem to be
applied.
Since the critical path determines the completion date of the project, the
project can be accelerated by adding the resources required to decrease the time
for the activities in the critical path. Such a shortening of the project
sometimes is referred to as project crashing.
6. Update as Project Progresses
Make adjustments in the PERT chart as the project progresses. As the project
unfolds, the estimated times can be replaced with actual times. In cases where
there are delays, additional resources may be needed to stay on schedule and the
PERT chart may be modified to reflect the new situation.
Benefits of PERT
PERT is useful because it provides the following information:
-
Expected project completion time.
-
Probability of completion before a specified date.
-
The critical path activities that directly impact the completion time.
-
The activities that have slack time and that can lend resources to critical
path activities.
- Activity start and end dates.
Limitations
The following are some of PERT's weaknesses:
-
The activity time estimates are somewhat subjective and depend on
judgement. In cases where there is little experience in performing an
activity, the numbers may be only a guess. In other cases, if the person or
group performing the activity estimates the time there may be bias in the
estimate.
-
Even if the activity times are well-estimated, PERT assumes a beta
distribution for these time estimates, but the actual distribution may be
different.
- Even if the beta distribution assumption holds, PERT assumes that the probability distribution of the project completion time is the same as the that of the critical path. Because other paths can become the critical path if their associated activities are delayed, PERT consistently underestimates the expected project completion time.
The underestimation of the project completion time due to alternate paths
becoming critical is perhaps the most serious of these issues. To overcome this
limitation, Monte Carlo simulations can be performed on the network to eliminate
this optimistic bias in the expected project completion time.
Subscribe to:
Posts (Atom)