Posts

Showing posts with the label security

Featured Post

How to Work With Tuple in Python

Image
Tuple in python is one of the streaming datasets. The other streaming datasets are List and Dictionary. Operations that you can perform on it are shown here for your reference. Writing tuple is easy. It has values of comma separated, and enclosed with parenthesis '()'. The values in the tuple are immutable, which means you cannot replace with new values. #1. How to create a tuple Code: my_tuple=(1,2,3,4,5) print(my_tuple) Output: (1, 2, 3, 4, 5) ** Process exited - Return Code: 0 ** Press Enter to exit terminal #2. How to read tuple values Code: print(my_tuple[0]) Output: 1 ** Process exited - Return Code: 0 ** Press Enter to exit terminal #3. How to add two tuples Code: a=(1,6,7,8) c=(3,4,5,6,7,8) d=print(a+c) Output: (1, 6, 7, 8, 3, 4, 5, 6, 7, 8) ** Process exited - Return Code: 0 ** Press Enter to exit terminal #4.  How to count tuple values Here the count is not counting values; count the repetition of a given value. Code: sample=(1, 6, 7, 8, 3, 4, 5, 6, 7, 8) print(sample

AWS to Understand EC2 Security

Image
Amazon Elastic Computing Cloud, you can call it EC2. Here're EC2 top security features and shared frequently asked interview questions on EC2. Based on your requirement, you can increase or decrease computing power. Before you enable the Autoscaling feature, you need to know its impacts since it's the Administrator's responsibility. AWS to Understand EC2 Security AWS EC2 Making your existing hardware to the requirement always is not so easy. So EC2 service in AWS helps you to allocate computing power according to your needs.  AWS EC2 instance acts as your physical server. It has a memory. You can increase the instance size in terms of CPU, Memory, Storage, and GPU.  EC2 auto scaling is a property, where it automatically increase your computing power. Security Features in EC2 Virtual Private Cloud. The responsibility of Virtual Private Cloud is to safeguard each instance separately. That means, you cannot access other instances, which are already created by other organiz

12 Top Hadoop Security Interview Questions

Image
Here are the interview questions on Hadoop security. Useful to learn for your data science project and for interviews.  12  Hadoop Security Interview Questions How does Hadoop security work? How do you enforce access control to your data? How can you control who is authorized to access, modify, and stop Hadoop MapReduce jobs? How do you get your (insert application here) to integrate with Hadoop security controls? How do you enforce authentication for users on all types of Hadoop clients (for example, web consoles and processes)? How can you ensure that rogue services don't impersonate real services (for example, rogue Task Trackers and tasks, unauthorized processes presenting block IDs to Data Nodes to get access to data blocks, and so on)? Can you tie in your organization's Lightweight Directory Access Protocol (LDAP) directory and user groups to Hadoop's permissions structure? Can you encrypt data in transit in Hadoop? Can your data be encrypted at rest on HDFS? How can

Here's Quick Guide on Hadoop Security

Image
Here is a topic of security and tools in Hadoop. These are security things that everyone needs to take care of while working with the Hadoop cluster. Hadoop Security Security We live in a very insecure world. For instance, your home's front door to all-important virtual keys, your passwords, everything needs to be secured. In Big data systems, where humongous amounts of data are processed, transformed, and stored. So security you need for the data . Imagine if your company spent a couple of million dollars installing a Hadoop cluster to gather and analyze your customers' spending habits for a product category using a Big Data solution. Here lack of data security leads to customer apprehension. Security Concerns Because that solution was not secure, your competitor got access to that data, and your sales dropped 20% for that product category. How did the system allow unauthorized access to data? Wasn't there any authentication mechanism in place? Why were there no alerts? Th