Tuesday, January 25, 2022

Robotic Process Automation or RPA

Robotic Process Automation or RPA

Automation

Automation is nothing but using machines to replace the human works only, not humans.

Automation is known in various ways such as;

Bots, Business process automation, RPA, email automation, software robotics, intelligent automation, digital labor, artificial intelligence, robots taking jobs.

Many of us heard, RPA will replace our jobs and we will be job less. But that is just a false statement by a robot. 

RPA or Robotic Process Automations does not have actual involvements of machinery or mechanical robots. It is software robot that optimizes business processes by minimizing the human errors and duplicating the human actions in digital applications.

It is a software technology that makes it easy to build, deploy and manage robots that duplicate human actions. Now it came to social media platform also, where you can sleep at night and your chat bot can work for you. 

A Software that mimics human behavior. This human behavior is rule based and requires digital inputs for the software. 

Below is the list of RPA functions based on  use cases

  • An RPA can log in to an application
  • File Management including moving files and folders 
  • Developing Chat Bot chat with predefined options 
  • Copy and paste data 
  • It can complete online forms
  • Help in email processing
  • It can answer to telephones
  • Can understand screen contents
  • It can navigate systems
  • It can identify and extract data  
  • Candidate recruitment Process
  • HR system
  • Time and Attendance Management System
  • Education and Training purpose
  • Supply and Demand Planning
  • Social Media Handle

In contrast to traditional software, RPA can work across multiple sectors such as Power and utility Sector, Healthcare Sector, Telecom and IT and can operate various applications through one single user interface.

Benefits:

The benefits of RPA is as mentioned below:

  • RPA streamlines workflows which leads to organizations make more profit.
  • It can help many industries to address their specific operational issues in new ways.
  • It become flexible and more responsive.
  • Enables in decreasing operational cost.
  • Improves compliance and customer satisfaction.
  • You have more time to think how you can further develop.
  • It can help in accelerating the transformation with greater resilience.
  • More accuracy and boosted productivity. 

Example of RPA tools such as UiPath, BluePrism, Automation Anywhere, work fusion, Kofax, Edgeverve, Kryon Systems etc. Further you can search these software company’s own websites and refer to their white papers. 

So these software bots work instead of human to do repetitive and lower value work so that, human are free to focus on the things they do best, think more on innovation. 

Note that RPA is not Artificial Intelligence (AI). But if we mix AI in to RPA, it can result us more output and increases the work capacity. 

So this is just a overview and you can refer other sources for further understandings. 

-DR

Tuesday, January 18, 2022

What is Blockchain Technology

Blockchain Technology

A Blockchain is a type of database used for digital ledger. It is distributed over a computer network. Blockchain stires information in digital format. The best example is Crypto currency is being utilized through the Blockchain Technology.

Blockchain is identified as a technology or concept that has helped in revolutionizing the activities carried out in the digital world. It ideally contributes in enhancing the level of trust between the parties involved in a transaction.

In the Blockchain, the data are structured and kept in groups or known as blocks. Each block have their own storage capacity and each block is linked to an another block through a logical chain. Each block in the chain have their own timestamp. Each of the different data blocks are  secured and also linked to each other based on the application of cryptographic rules or chains.

Components of a Block

In Blockchain, the block is divided in to two parts such as Header & Body.

Header in the block contains the identity of the block, transaction information, hashing of previous block header and timestamp. In body the transaction data is basically stored in a structural form in a tree format with different types of nodes.

In Case of traditional database, all data are connected and stored to a centralized database or location. But in case of Blockchain, all data are interconnected and decentralized. So in traditional database, if one node fails the entire database becomes inaccessible whereas, in Blockchain if one or more nodes fail, still the database remains accessible.

Another prime component of Blockchain is Distributed Ledger. The Distributed Ledger is known as a database that has its presence across diverse locations and thereby is used by

large number of users. This Distributed Ledger in comparison to Centralized Ledger operates in decentralized manner. The files stored in the distributed ledger have their own timestamp and are also embedded with an unique cryptographically designed signature.

Presently the Blockchain Technology is used at multiple areas such as in Dispute Management, Policy impositions, Tax Management, Creation of data repository, Financial Transaction processing, Management of rules, Electoral or voting process, Medical records management, Land records, Education, certificate issuance.

In India, Government at many states have started implementing blockchain at many sectors. Below is a referral image from twitter.


Advantages of using Blockchain

  • Transaction Transparency
  • Not a single point of failure
  • Collaboration
  • Audit supporting
  • Reliability

Risk

There is one risk associated with the Distributed Ledger Technology (DLT) i.e. Cyber Risk. As this system does not spontaneously check and rectify the storage of data sets, there are possible many incorrect data being stored in the system. These incorrect data tends to weaken the system and can lead to data leak in case of cyber attack occurs. 

-DR

Saturday, January 15, 2022

Log4j Vulnerability overview

Log4j Vulnerability

In 2021 before the year-end holiday begins, the Log4j vulnerability came in to knowledge as an extensively active cyber attack happened across globe. It was a Zero-day vulnerability affecting the widely used Apache Log4j Java-based logging library that could be weaponized to execute malicious code or malware or in form of ransomware and allows a complete takeover of a vulnerable system.

As per Microsoft’s research it was came in to understand that, the vulnerabilities allow remote code execution by an unauthenticated attacker to gain complete access to a target system. It can be triggered when a specially crafted string is parsed and processed by the vulnerable Log4j 2 component. This could happen through any user provided input. Successful exploitation allows for arbitrary code execution in the targeted application.

This vulnerability was identified as remote code execution vulnerability with a critical to moderate rating and with a CVE code assigned as CVE-2021-44228.

A Zero-Day vulnerability is a flaw in a software or application for which no official patch or security update has been released or software manufacturer / vendor may or may not be aware of the vulnerability.

On December 14, 2021, it was noticed that Apache Log4j use cases are affected in versions 2.15.0 and earlier. Many OEM, software manufacturers were impacted due to this vulnerabilities including Cisco, Microsoft, Oracle. Many organization has published and shared their advisory for the Log4j vulnerability.

Similarly attackers have again released a false patch to support the above vulnerability loaded with ransomware and malwares. 

So again some advisory were published not to go for patch update immediately. After waiting certain period, there must be update. So All systems, including those that are not internet facing, are also potentially vulnerable to these vulnerabilities, so backend systems including all micro services should also be upgraded.  No Java version patch can mitigate these vulnerabilities. The recommended action is to update Apache Log4j. Systems that have already been updated to 2.15.0 should move to 2.16.0 or later asap for extra protection against other possible vulnerabilities.

This was just a basic knowledge about the vulnerability. Please refer to vulnerability database, specific guidelines, advisories or contact the vendor before updating any security patches.

Thanks!

-DR

Saturday, January 1, 2022

Welcome to New Year 2022

Hello world !

A warm welcome to everyone to the beginning of a new year.

Wishing everyone a Happy New Year 2022. Stay Blessed and Happy.

May this year brings lots of changes and filled with more excitements.

This year I am planning to bring more and more technology contents if the time allows. 

Note, this blog is always an updating one. Whenever I find useful info, I update it in my own way whether in older post or newer post. So Just check-in, walkthrough and read as per your interested posts. 

Many post are in draft mode and under edit. Due to lack of time, it is delayed. But surely it will come. So Stay tuned. 

This year I have a thought to add new disruptive technology information. How the world is changing with technology such as RPA, Machine Learning, Business Intelligence, Blockchain, 3D printing etc. Although these technology have introduced since couple of years back and development is ongoing too in different aspects and areas.

So Just walkthrough to understand the concepts and fundamentals.

Thanks once again for trusting me and reading this blog!

Stay Safe.

Take Care.

-DR

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....