Giter Site home page Giter Site logo

nowmozillaclub / now-mozilla-blog Goto Github PK

View Code? Open in Web Editor NEW
6.0 1.0 0.0 9.91 MB

Official NOW Mozilla Blog page where we will be having weekly blogs on various topics ranging from technical to personal! Stay tuned for more.

Home Page: http://nowmozilla.club/NOW-Mozilla-Blog

License: MIT License

HTML 2.69% JavaScript 75.20% CSS 22.11%
blogs mozilla-blog topics-ranging technical sharing sharing-platform

now-mozilla-blog's Introduction

NOW Blogs

NOW-Mozilla-Blog

Official NOW Mozilla Blog page where we will be having weekly blogs on various topics ranging from technical to personal! Stay tuned for more.

NOW was founded in 2018 with one purpose - well technically, three interwoven principles:

  • Teach
  • Build
  • Protect

To back that thought we have bought a new way of sharing information and teaching people using the help of our blogs!

We're committed to everything Open Source and all things Secure!

Check out the website and stay tuned for more updates!

How to write a blog?

  • Make an issue on this repo itself
  • Add your content, make sure you've styled it using markdown
  • Preview your changes
  • All good? Post your issue
  • Add the label name 'blog' for your blog to appear on the website!

The site was made with React:

Designs by:

now-mozilla-blog's People

Contributors

aajinkya1203 avatar pratit23 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

now-mozilla-blog's Issues

Test Blog

This is a test blog


Hello there, Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

This is a code:

<p> test </p>
  • Lorem Ipsum

I like your cut g

BRRRRRRRRRRR

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec imperdiet pulvinar efficitur. Sed sed vestibulum nisi. Ut convallis sapien non libero lobortis convallis id vitae libero. Sed id risus quis nisl vestibulum aliquam vel sed sapien. Sed hendrerit ultrices suscipit. Quisque sed ligula rhoncus, tincidunt purus id, pulvinar quam. Sed magna ante, cursus sollicitudin pretium id, tincidunt nec est. Proin velit tortor, bibendum in nisi a, aliquam lacinia eros. Nulla porta congue tincidunt.

Mauris in fermentum leo. Suspendisse fermentum felis velit, non sagittis dolor fringilla nec. Etiam tincidunt sem vitae dui viverra auctor. Maecenas malesuada quam in felis imperdiet consequat. Pellentesque quis dictum magna. Pellentesque eget ipsum ut elit fringilla rhoncus non ac erat. Aenean sagittis malesuada urna vitae ornare. Nullam egestas euismod odio nec
omen

Cyber Security : Learning and Careers in Future

Note this is an article written by Prathamesh Churi, NOW Mozilla's Mentor.


0

Some random chats from my students with me:*

“Cyber security ? Huh ! So boring. World is going with Machine learning, Data analytics . . . So cool stuff on Internet ;), Cyber Security is very old area”

“Sir can we do our project in AI ? , I mean we should go with advance technology, right ?”

Sir, in which field I should pursue my masters? AI, ML ?




Surprisingly, Cyber security is not in their list. Secondly, Cyber security is only “hacking and attacks” for most of them. Students wants to learn attacks and try them with their friends for FUN! The destructive nature of harming someone’s resources makes me feel restless sometimes! Out of 100 students, hardly 10 students have little-bit interest in cyber security and that too in learning attacks and NOT about control measures on these attacks.

I always say through my quote -

Don’t blame Technology, blame people for their mindset !




This destructive nature itself is the reason, why cyber security is important today as a career option. We must understand that- with the advent of technologies and innovations in AI, ML, Data Analytics, IoT, we require to secure all the assets from malicious things/people/systems. The motivation of learning and pursuing cyber security as a career option is to be smarter in controlling the attacks instead of learning them and use them for bad intentions.

Nobody is talking about considering Cyber Security as their career option ! I don’t know why? The big companies like Google, Facebook, IBM, Amazon hires many cyber security professionals and pay them a big money in return. Such companies have a big Security team which works silently to secure companies data from malicious contents. Cybersecurity professionals work behind the scenes to protect civilian, business, and government data from hackers.The Cybersecurity subject prepares students for employment in a variety of entry level careers in Cybersecurity with practical hands-on training, necessary to equip students with the skills employers expect.

In general, students learn :

  1. Configure, troubleshoot and maintain computer systems, virtualised environments and secure network communications.
  2. Protect computer networks/systems against unauthorised access, modifications and/or destruction.
  3. Analyse and recommend counter measures to mitigate security threats to systems/networks.
  4. Develop scripts for automating configuration and management of system/access controls.



Job perspective in Cyber Security Area:

Cybersecurity professionals work in every size company and industry to protect organisations from data breaches and attacks. And the demand for cybersecurity professionals is growing at a breakneck speed. Job postings for cybersecurity positions have grown three times faster than openings for IT jobs overall. Here are some career pathways you can pursue as a cyber-security professional.

  1. Security Software Developer

Security Software Developers build security software and integrate security into applications software during the design and development process. Depending on the specific position and company, a security software developer might oversee a team of developers in the creation of secure software tools, develop a company-wide software security strategy, participate in the lifecycle development of software systems, support software deployments to customers, and test their work for vulnerabilities.

  1. Security Architect

If you’re enthusiastic about problem-solving and formulating big-picture strategies, the security architect career path is for you. A security architect is meant to create, build and execute network and computer security for an organisation. Security architects are responsible for developing complex security framework and ensuring that they function effectively. They design security systems to counter malware, hacking and DDoS attacks.

  1. Information Security Analyst

Information Security Analysts are the front-line defence of networks, Information Security Analysts put firewalls and encryption in order to protect breaches, constantly monitor and audit systems for unusual activities.

  1. Ethical Hackers and forensic analysts:


Ethical hackers normally hold a CEH certificate and are given license by their employers to try and infiltrate the security of their system. The idea is that they use the same techniques as malicious black hat hackers to test existing security protocols; if they are successful, upgrades can then be developed and implemented.

Forensics analysts focus on cyber-crime, an ever-growing phenomenon. They work with law enforcement agencies in both public and private sector organisations and are asked to undertake a wide variety of tasks, such as Recovering deleted files, Interpreting data linked to crime, Analysing mobile phone records, Pursuing data trails etc. Computer forensic analysts must keep a well — detailed records of their investigations, and often provide evidence for official purpose .

  1. Chief Information Security Officer (CISO)

The Chief Information Security Officer is normally a mid-executive level position whose job is to manage the affairs operations of a company’s or organisation’s IT security division. CISOs are usually responsible for planning, coordinating and directing all computer, network and data security needs of their employers. CISOs work directly with the management to determine an organisations’ custom cybersecurity demands. The CISOs are usually saddled with the responsibility of assembling an effective staff of security professionals, which means that the position requires an individual with a strong background in IT security architecture and strategy, as well as effective communication and human resource skills.

  1. Penetration Tester

Penetration testing is the proactive authorised employment of testing procedures on the IT system to identify system flaws. A penetration tester usually attempts to (with permission) hack into a computer and network systems to pre-emptively discover operating system vulnerabilities, service and application problems, improper configurations and more, before an intruder cause real damage. Penetration testers must be highly skilled, often using testing tools of their own design, to “break into” the systems under watch. Penetration testers are required to keep accurate records of their activities and discovered vulnerabilities.

  1. IT Security Consultant


IT security consultants meet with clients to advise them on how to protect their organizations’ cybersecurity objectives best efficiently and cost-effectively. IT Security Consultants are often employed by smaller firms and agencies that cannot afford to handle their security issues in-house but are also employed by big corporation to supplement their security teams and provide an impartial outside perspective to current systems challenges.

  1. Security Systems Administrator

A security systems administrator’s responsibility is a bit similar to many cybersecurity jobs i.e., installing, administering, maintaining and troubleshooting computer, network and data security systems. The main distinction between security systems administrators and other cybersecurity professionals is that the security systems administrator is normally the person in charge of the daily operation of those security systems. The regular tasks include systems monitoring and running regular backups, and setting up, deleting and maintaining individual user accounts. Security systems administrators are usually often involved in developing organisational security procedures.

In conclusion, As you can see, there are endless paths your cybersecurity career can lead you down. But first, you have to start somewhere. Doing basic certifications, you tube videos and reading some white papers written by cyber security industry people will help you to explore this area more better.

To end this article, I would like state a quote by Schneier Maxim

Security is not a product, it’s a process!


— Prof. Patrick

References:

Testing with image

La la la lalalala La la la lalalala La la la lalalala La la la lalalala La la la lalalalaLa la la lalalalaLa la la lalalalaLa la la lalalalaLa la la lalalalaLa la la lalalala La la la lalalala La la la lalalala La la la lalalalaLa la la lalalalaLa la la lalalala La la la lalalala La la la lalalala
wp6012288-valorant-wallpapers

Is Privacy of Indian Healthcare System is a Myth

Note this is an article written by Prathamesh Churi, NOW Mozilla's Mentor.


1

According to the one of the renowned and Oscar award-winning American actor and film director Marlon Brando who once said -

“Privacy is not something that I’m merely entitled to, it’s an absolute prerequisite.”




According to the definition from the Cambridge dictionary, "Someone's right to keep their matters and relationships secret". Privacy is the fundamental right of the human being and the same has been repeated a number of times by many of the juridical systems of various countries. Privacy threatening and Data breach are happening every day in this world and countries are mitigating the consequences happening due to privacy and data breaches.

More than 200 million surveillance cameras are installed around china's country with the help of improved facial recognition and artificial intelligence technology. The purpose of installing this technology is to identify malpractices happening around cities. Through it is on pedestrian, luxury retail stores, inside classrooms to identify students’ malpractices- the privacy of identifying an individual is always compromised.

The healthcare industry is one of the largest and rapidly developing industry in recent years. According to IBM Global Business Services, Executive Report-2012, the overall healthcare management is changing from disease centric to patient-centric. While on one side, the analysis of healthcare data plays an important role in healthcare management, on the other side, the privacy of patient's records must be of equal concern.

Preserving the privacy of medical data is not only an ethical but also a legal requirement, posed by several data-sharing regulations and policies worldwide, such as the Privacy Rule of the Health Insurance Portability and Accountability Act in the USA, and the Data Protection Act in the UK. Besides, we are witnessing a wealth of approaches for preserving privacy in many phases of the healthcare information lifecycle, including data collection, communication, and sharing, as well as the knowledge management of healthcare information. To achieve privacy goals, these approaches employ various techniques, such as cryptography, access control, and data anonymization, generalization, and perturbation.

Privacy issues in healthcare-specific to India are due to prevalent complacency, culture, politics, budget limitations, huge population and the infrastructure present. Due to these factors, data security takes a backseat allowing for easy access to confidential information. The culture prevalent also affects healthcare disclosure in India. In many cultures, the disclosure of sensitive personal healthcare data is looked down upon. This leads to discrepancies in the healthcare data recorded as well as a decrease in the level of treatment meted out. Research and statistics of treatment given then don’t match the records due to inaccurate reporting of data.



India is a country of large democracy and large populations. Maintaining standard infrastructure is another issue of implementing privacy. The cost required to implement a privacy model is substantial and requires funding from the government and individuals. To make the privacy model a success, it involves the work of specialists in the field of privacy and the field of healthcare. Budget constraints may lead to an ineffective model getting implemented which won't be secure and safe from attacks.

Context to this- Privacy issues to Indian Healthcare System must be addressed first. Surprisingly, there were hardly any research documents who were speaking on the privacy issues of the Indian healthcare system. Very few researchers had a keen interest in solving the privacy threats and data breaching issue on Indian healthcare data. This motivation forced us to consolidate the privacy and data breaching issues in India and make it available as an open-access manuscript. According to the limited available research, the Indian healthcare data which is already published on public platforms - does not have any procedure to de-identify the individual patient’s record.

Data Publishing is one of the states of the art technique of publishing healthcare data in tabular format on either public platform such as blogs/websites/public columns OR publishing selective data to selective people which can be only accessed based upon authentication. Since Indian healthcare data contains sensitive information of an individual, the privacy concern of the user must treat equally important.

According to the recent news, India’s health ministry has proposed a law to govern data security in the healthcare sector that would give individuals complete ownership of their health data. Individuals can access, share and deny the healthcare records. The draft Digital Information Security in Healthcare Act was proposed by the health ministry on March 11, 2018. The committee suggested the following key-points and developed privacy framework:


The law must be flexible and must be adhered to changing technologies.

  1. Law must be applied to public and Private sector entities.
  2. Entities controlling the data should be accountable for any data processing.
  3. Consent must be Structured and Genuine.
  4. Processing and analysis of healthcare data must be minimal.
  5. Enforcement of the hdata protection framework should be by a high-powered statutory authority.




One of the fruitful observation that can be drawn from above perspective is that - Indian published health data is very diverse and collected from different heterogeneous sources, there are nor do regulations over the authorship of the health data, due to which any third party can take access among the sensitive data and can misuse the data. The re-identification attack is the most common attack of health data wherein with the help of a group of some identifiable entities (Called as quasi-identifiers), an identity of an individual can be easily determined. The proposed law mentioned in the above paragraph has guidelines and technological aspects of preserving the privacy of healthcare data.

According to our research, the proposed solution may include the awareness of understanding the procedure of how healthcare data is stored and processed. The backup of healthcare data, distribution of data among data publishers, working of consent, etc. must be clearly understood by every Indian who has healthcare records. Assurance of an individual's healthcare data is a fundamental right of every Indian citizen. The surety can be only be increased if the technology can be implemented in publicly available Indian healthcare data. Another aspect of awareness that we must bring is to have proper authentication for accessing healthcare data. The trust of Indian individuals to any organization is very vacillating as far as healthcare data sharing is concerned. Every client should be properly verified before granting access to the information and should be immediately taken back if there is some suspicious activity from the user side. Verification can be done from UID/AADHAR authentication. Strong anonymization technique is still needed in heterogeneous, diverse healthcare data which guarantees the fact that - Indian healthcare data is not only privatized but equally can be used for utility analysis for further research in Indian healthcare for the betterment of the society.


Another angle of the story is the cultural and sociological view of the said problem. Literacy and awareness should be spread about the need to disclose healthcare information accurately and promptly. Healthcare privacy models can only be successful when the Indian citizens change their mindset and are willing to share their information correctly. Trust must be from both the side. Indians should be emphasized that disclosing medical data is not a weakness and shouldn’t be looked down upon. Education and awareness camps should be held to inform citizens about the privacy model and the need to disclose healthcare information in a secure data environment

The sociological view is to combat slackness and laxness prevalent in India, promotion to levels of authority should be based on merit. Corruption should be eliminated and bureaucrats should be held responsible for their failures. A strict work ethic should be established and deadlines should be met. This can be done only if the mindset of bureaucrats changes from doing something only for themselves to a mindset of doing something for the citizens and the country


The research article is concluded by saying- “Privacy is not a product, It is a process ” The product can be 100% Secure, Process cannot be!


written by prof. Patrick ( PhD research Scholar @Symbiosis University and faculty member @NMIMS University)


I warmly thank my brother Yash Joshi who curated this article before published on linked in

Two images test

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec imperdiet pulvinar efficitur. Sed sed vestibulum nisi. Ut convallis sapien non libero lobortis convallis id vitae libero. Sed id risus quis nisl vestibulum aliquam vel sed sapien. Sed hendrerit ultrices suscipit. Quisque sed ligula rhoncus, tincidunt purus id, pulvinar quam. Sed magna ante, cursus sollicitudin pretium id, tincidunt nec est. Proin velit tortor, bibendum in nisi a, aliquam lacinia eros. Nulla porta congue tincidunt.
jgq2tgxm5zq41

Mauris in fermentum leo. Suspendisse fermentum felis velit, non sagittis dolor fringilla nec. Etiam tincidunt sem vitae dui viverra auctor. Maecenas malesuada quam in felis imperdiet consequat. Pellentesque quis dictum magna. Pellentesque eget ipsum ut elit fringilla rhoncus non ac erat. Aenean sagittis malesuada urna vitae ornare. Nullam egestas euismod odio nec convallis. Suspendisse aliquam aliquet nulla eu facilisis. Phasellus arcu purus, egestas id odio vel, vulputate blandit turpis. Duis scelerisque consequat mi. In mollis nibh sit amet enim dictum fermentum sit amet a neque. Nullam cursus, nibh sed tincidunt auctor, mi metus porttitor purus, ut interdum sapien ipsum at mauris. Ut laoreet consequat sem, nec porttitor mi hendrerit in. Pellentesque viverra felis gravida gravida semper. Vivamus a pharetra arcu, eget pellentesque libero.
macOS-Big-Sur-Daylight-Wallpaper-iDownloadBlog-2

Sixth one bruhh

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec imperdiet pulvinar efficitur. Sed sed vestibulum nisi. Ut convallis sapien non libero lobortis convallis id vitae libero. Sed id risus quis nisl vestibulum aliquam vel sed sapien. Sed hendrerit ultrices suscipit. Quisque sed ligula rhoncus, tincidunt purus id, pulvinar quam. Sed magna ante, cursus sollicitudin pretium id, tinc
omen2
eque. Nullam cursus, nibh sed tincidunt auctor, mi metus porttitor purus, ut interdum sapien ipsum at mauris. Ut laoreet consequat sem, nec porttitor mi hendrerit in. Pellentesque viverra felis gravida gravida semper. Vivamus a pharetra arcu, eget pellentesque libero.

Challenges of Implementing Technology in Education in India

Note this is an article written by Prathamesh Churi, NOW Mozilla's Mentor.


3

The entire world is a fan of technology 😎. Education sector has no exception in this . It is the fact that- Technology is whole and sole responsible for reducing the efforts taken by students and instructors in terms of gathering useful information , printed notes and journals , writing assignments , use of offline compilers for code execution etc.

Use of Technology in learning process also results into increase in student's focus on more important knowledge gathering process. Technology can represent education in ways that help students understand latest concepts and ideas.

Project based learning ( PBL) is the another gift that is given by technology. It enables instructors to integrate real world problems into problem based learning . With guidance from active instructors , students at different levels can use the tools to construct knowledge and develop skills required in modern society such as presentation skills and analytical skills.

3 5

In India , the use of technology is not reached upto the mark. Despite early implementation of technologies in education system, India still faces teething problem for the new technologies in education.


Few of the major problems are explained below :


Adequate Infrastructure and Resources : Major educational institutes of india are in villages. Villages are having a basic problems of electricity and fast internet connectivity . Technology will not run without use of electricity and internet . Rural development is the major threat to india. The rural institutes either does not have enough or have limited access to computer hardware and software.


Insufficient knowledge to handle technology oriented teaching learning : It is a high time that we need trainers to train the trainers . i.e. we require to train the teachers first instead of students. Many of instructors still prefers the traditional teaching and encourages students for rote learning. The training opportunities for teachers are still not enough . Its high time to change the mindset of teachers as well. Teaching to millennial generation is the major challenge in the field of education.


Mapping of Curriculum and technology : There is a lack of knowledge about ways to integrate technologies to enhance curriculum. Educational technologies integration is not a priority in many institutes. Starting from designing a curriculum to its execution , the interference of technology is very less in india.


Timing constraints: In the regular schedule of school / colleges , there is always a lack of time in schedule for projects involving use of technologies. On the other hand there is lack of adequate technical support for education institutes. I personally feel that , there is no specific or ideal time for learning . You can learn the things any time and any where.


However, there are many ethical issues arise with this use of the latest technologies in education.

4

  1. Ctrl + C and Ctrl + V – Many a times students, even instructor copies content from web resources without even understanding the concept. All the resources available on internet are not trustworthy .

  • Copying the assignments , case studies from internet and other resources results into wastage of time with gain of 0% of knowledge. It ultimately turns into a rote learning for students . Many a times Students just do this assignment work for the sake of marks where actual purpose of learning is not proved.

  • Many of the teachers downloads the slides from internet and use it as a teaching material . Every teacher has different style of teaching . The downloaded slides restricts you to teach specific contents which are there on downloaded slides . Teachers are advice to refer slides online and make their own slides for teaching

  1. Distortion of reality – Search engines gives the information about particular content based on the ranks. There is the real danger that their view of reality is distorted by the website, by the fact that someone with enough money can influence what is written or ranked. The trust issue on the online contents is always there with advancement of technology. We cant disbelieve on a particular content just because it's rank is lower than other contents or vice versa.

  2. Trustworthiness of the Information- Not all information is correct on website. Many a times we get different knowledge on same concept on internet. The central question here is that : on which content I should believe?We must check its trustworthiness before used it as teaching or learning material.


Today, the student is not considered as an empty vessel to be filled in by facts and figures. They are now expected to use so many media and materials and to get learning experience from all sides. Education is regarded as a process of interaction and interpersonal communication. The modern teacher has to help, to guide and facilitate the learner’s development. The teacher has to inspire and motivate the young leaners and assist the adult learners in their quest for knowledge and skills. The teachers can find the means to engage students more quickly in learning and to cater to the various needs of different students.


No doubt that if , we manage to remove / resolve the issues which are addressed , then technology with teachers can prove best concept in the field of Education Technology.

By prof. patrick ( happy researching ! 😎✌🏽)

Another one

Sample text lalalalalala alalalalal Sample text lalalalalala alalalalalSample text lalalalalala alalalalal
Sample text lalalalalala alalalalalSample text lalalalalala alalalalal

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.