Posts

Showing posts with the label security

Featured Post

SQL Interview Success: Unlocking the Top 5 Frequently Asked Queries

Image
 Here are the five top commonly asked SQL queries in the interviews. These you can expect in Data Analyst, or, Data Engineer interviews. Top SQL Queries for Interviews 01. Joins The commonly asked question pertains to providing two tables, determining the number of rows that will return on various join types, and the resultant. Table1 -------- id ---- 1 1 2 3 Table2 -------- id ---- 1 3 1 NULL Output ------- Inner join --------------- 5 rows will return The result will be: =============== 1  1 1   1 1   1 1    1 3    3 02. Substring and Concat Here, we need to write an SQL query to make the upper case of the first letter and the small case of the remaining letter. Table1 ------ ename ===== raJu venKat kRIshna Solution: ========== SELECT CONCAT(UPPER(SUBSTRING(name, 1, 1)), LOWER(SUBSTRING(name, 2))) AS capitalized_name FROM Table1; 03. Case statement SQL Query ========= SELECT Code1, Code2,      CASE         WHEN Code1 = 'A' AND Code2 = 'AA' THEN "A" | "A

AWS to Understand EC2 Security

Image
Amazon Elastic Computing Cloud, you can call it EC2. Here're EC2 top security features and shared frequently asked interview questions on EC2. Based on your requirement, you can increase or decrease computing power. Before you enable the Autoscaling feature, you need to know its impacts since it's the Administrator's responsibility. AWS to Understand EC2 Security AWS EC2 Making your existing hardware to the requirement always is not so easy. So EC2 service in AWS helps you to allocate computing power according to your needs.  AWS EC2 instance acts as your physical server. It has a memory. You can increase the instance size in terms of CPU, Memory, Storage, and GPU.  EC2 auto scaling is a property, where it automatically increase your computing power. Security Features in EC2 Virtual Private Cloud. The responsibility of Virtual Private Cloud is to safeguard each instance separately. That means, you cannot access other instances, which are already created by other organiz

12 Top Hadoop Security Interview Questions

Image
Here are the interview questions on Hadoop security. Useful to learn for your data science project and for interviews.  12  Hadoop Security Interview Questions How does Hadoop security work? How do you enforce access control to your data? How can you control who is authorized to access, modify, and stop Hadoop MapReduce jobs? How do you get your (insert application here) to integrate with Hadoop security controls? How do you enforce authentication for users on all types of Hadoop clients (for example, web consoles and processes)? How can you ensure that rogue services don't impersonate real services (for example, rogue Task Trackers and tasks, unauthorized processes presenting block IDs to Data Nodes to get access to data blocks, and so on)? Can you tie in your organization's Lightweight Directory Access Protocol (LDAP) directory and user groups to Hadoop's permissions structure? Can you encrypt data in transit in Hadoop? Can your data be encrypted at rest on HDFS? How can

Here's Quick Guide on Hadoop Security

Image
Here is a topic of security and tools in Hadoop. These are security things that everyone needs to take care of while working with the Hadoop cluster. Hadoop Security Security We live in a very insecure world. For instance, your home's front door to all-important virtual keys, your passwords, everything needs to be secured. In Big data systems, where humongous amounts of data are processed, transformed, and stored. So security you need for the data . Imagine if your company spent a couple of million dollars installing a Hadoop cluster to gather and analyze your customers' spending habits for a product category using a Big Data solution. Here lack of data security leads to customer apprehension. Security Concerns Because that solution was not secure, your competitor got access to that data, and your sales dropped 20% for that product category. How did the system allow unauthorized access to data? Wasn't there any authentication mechanism in place? Why were there no alerts? Th