<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: AryanKoundal</title>
    <description>The latest articles on DEV Community by AryanKoundal (@aryankoundal).</description>
    <link>https://dev.to/aryankoundal</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F768959%2F7cbc7bde-96e6-4a78-b2b8-60a7b632280d.jpeg</url>
      <title>DEV Community: AryanKoundal</title>
      <link>https://dev.to/aryankoundal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aryankoundal"/>
    <language>en</language>
    <item>
      <title>"Cybersecurity Education In a Developing Nation"</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Thu, 06 Apr 2023 10:23:22 +0000</pubDate>
      <link>https://dev.to/aryankoundal/summary-of-cybersecurity-education-in-a-developing-nation-2592</link>
      <guid>https://dev.to/aryankoundal/summary-of-cybersecurity-education-in-a-developing-nation-2592</guid>
      <description>&lt;h2&gt;
  
  
  ABSTRACT
&lt;/h2&gt;

&lt;p&gt;The ability to prevent successful cyber attacks against a nation’s critical infrastructure depends on the availability of a skilled cyber-literate workforce, and therefore, on an educational system that can build such capabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  INTRODUCTION
&lt;/h2&gt;

&lt;p&gt;Many recent reports of cybersecurity attacks highlight the prevalence of a wide range of malicious activity and point to the growing sophistication of cyber threats. Frameworks designed to address the cybersecurity challenge at a national level focus on the need to build cybersecurity capabilities to achieve greater cyber readiness.&lt;br&gt;
Accordingly, nations have designed strategies to develop essential human talent, including cybersecurity education, training, and certifications. &lt;br&gt;
what are the challenges that universities face in order to provide cybersecurity education in a developing country?&lt;br&gt;
How can this country enhance cybersecurity education to support national cybersecurity capabilities?&lt;br&gt;
Over the last decade,the country has been experiencing a transformation of its educational system. The government has implemented a regulatory framework to assess, control, and improve the quality of higher education. Universities have been standardizing and updating their academic programs to comply with government requirements. However, these efforts are focused on improving general education, and are not specifically linked to education in cybersecurity methods&lt;br&gt;
and strategies. While some educational institutions have&lt;br&gt;
not even started initiatives in cybersecurity, others struggle, mainly because of a lack of instructors with the necessary skills.&lt;/p&gt;

&lt;h2&gt;
  
  
  LITERATURE REVIEW
&lt;/h2&gt;

&lt;p&gt;(i) countries at the forefront in cybersecurity, such as the USA, Canada, the UK, and Australia incorporate cybersecurity education at every stage of academic instruction; &lt;br&gt;
(ii) cybersecurity education has strong ties with military&lt;br&gt;
and security agencies––predominantly in the USA.&lt;br&gt;
(iii) there is a gap in both domains of education (formal and informal), and some countries have not even started their cyber educational development.&lt;/p&gt;

&lt;h2&gt;
  
  
  CURRENT CYBER SECURITY EDUCATION
&lt;/h2&gt;

&lt;h3&gt;
  
  
  ACADEMIC INSTRUCTION
&lt;/h3&gt;

&lt;p&gt;Many computer science students are educated in a combination of software engineering and systems engineering. Teaching at most universities has focused on computing applications development and computing networks.&lt;br&gt;
Often, security courses are offered during the final semesters of a student’s program. In some cases, a security course is an elective, which produces an unwanted effect because students avoid taking it during the last semester (when for example they are concerned with searching for a job).&lt;br&gt;
In approximate order of frequency, the topics respondents&lt;br&gt;
mentioned were:&lt;br&gt;
Generalizations of information security&lt;br&gt;
Security management&lt;br&gt;
Security in operating systems&lt;br&gt;
Network security (e.g., Wi-Fi)&lt;br&gt;
Perimeter security (e.g., firewalls)&lt;br&gt;
Attacks on applications (e.g., SQL injection)&lt;br&gt;
Auditing&lt;br&gt;
Legal informatics&lt;br&gt;
Ethical hacking&lt;br&gt;
Security in databases&lt;br&gt;
Security awareness&lt;br&gt;
Cryptography&lt;/p&gt;

&lt;h3&gt;
  
  
  PROFESSIONAL CERTIFICATIONS
&lt;/h3&gt;

&lt;p&gt;no university in our sample supports training that leads&lt;br&gt;
to cybersecurity certifications. Access to security equipment necessary to support such initiatives was reported to be expensive.&lt;/p&gt;

&lt;h3&gt;
  
  
  RESEARCH
&lt;/h3&gt;

&lt;p&gt;Although there had been a few research initiatives, we saw very little evidence of academic cybersecurity research.&lt;/p&gt;

&lt;h3&gt;
  
  
  SELF ASSESSMENT
&lt;/h3&gt;

&lt;p&gt;one academic department indicates security teaching is improving, another department at the same university thinks this is not the case, which indicates that some departments&lt;br&gt;
(Computer Science, Computer Networks, and Electronics Engineering) at the same universities have different levels of expectation and preparation in security&lt;/p&gt;

&lt;h3&gt;
  
  
  ONGOING CHANGES
&lt;/h3&gt;

&lt;h2&gt;
  
  
  FACTORS DRIVING CYBERSECURITY EDUCATION
&lt;/h2&gt;

&lt;h3&gt;
  
  
  LACK OF SECURITY SPECIALISTS
&lt;/h3&gt;

&lt;p&gt;There are few educators with formal education in cybersecurity. however, some specialists are&lt;br&gt;
not necessarily teaching security because they are pursuing higher degrees or teaching something else. As a result of this shortage, security instruction and supply of&lt;br&gt;
cybersecurity skills suffer. Cybersecurity courses cannot be incorporated into the curricula when desired, and the quality of security courses is compromised when taught by non-experts since security content is often constrained in scope and lacks integration of theory with practice.&lt;/p&gt;

&lt;h3&gt;
  
  
  LACK OF INTERACTION WITH THE INDUSTRY
&lt;/h3&gt;

&lt;p&gt;As a result of this lack of communication, opportunities for&lt;br&gt;
academia-industrial partnerships and understanding of cybersecurity demand have not developed. This barrier prevents collaboration concerning technical support and research funding. Also, universities have experienced difficulties learning what the industry needs in terms of cybersecurity skills.&lt;/p&gt;

&lt;h3&gt;
  
  
  INSUFFICIENT UNDERSTANDING OF CYBERSECURITY DEMAND
&lt;/h3&gt;

&lt;p&gt;Comprehensive knowledge about labor market demand for cybersecurity is not available, and there are different perceptions in universities across the country. Respondents&lt;br&gt;
(42%) felt that today demand for security in the business sector is very low, so they fear that creating security programs for specialists may saturate the labor market rapidly. We feel the need, but there is little demand. It is less than demand for software engineers. Most visible and potential sources of cybersecurity demand are in&lt;br&gt;
the financial services and government.&lt;/p&gt;

&lt;p&gt;Local demand for cybersecurity should be understood in two&lt;br&gt;
ways. First, institutions in the market need graduates with security knowledge incorporated into CS and CN training, which will allow them to perform their primary jobs while applying security principles. For instance, in the financial sector software engineers familiar with secure coding and systems engineers knowing secure implementation of IT infrastructure are desired [21]. Second, security know-&lt;br&gt;
ledge at the specialization level is wanted for positions such as security engineer. Most respondents believe specialization is more feasible at the MS graduate level as opposed to undergraduate level, but accurate knowledge about demand is necessary before this MS process can begin.&lt;br&gt;
While some employers are discovering&lt;br&gt;
that they need individuals with cybersecurity skills, especially because they have already had harmful security experiences, others do not know what they need in terms of cybersecurity workforce. As long as the market demand for security is not clear, it will be difficult to advocate for cybersecurity academic programs, even if resources become available. Hence, it is essential that employers and educators collaborate to identify the workforce competencies needed in the workplace.&lt;/p&gt;

&lt;h2&gt;
  
  
  LACK OF RESOURCES
&lt;/h2&gt;

&lt;p&gt;Most universities do not have a well-equipped laboratory to teach cybersecurity practice. Interviewees argued that specialized equipment suitable to teach security is very expensive, but they also recognized availability of open source tools to solve particular needs.&lt;br&gt;
Moreover, given economic limitations, ability to temporarily incorporate specialists to teach security content is even harder. Universities cannot match business sector salaries. On a few occasions, however, a few universities have obtained specialized support—especially for seminars or talks—because some specialists had motivations other than income. &lt;/p&gt;

&lt;h2&gt;
  
  
  LACK OF AWARENESS
&lt;/h2&gt;

&lt;p&gt;universities reported having academic programs dating&lt;br&gt;
from 10 years ago, when cybersecurity was not a prominent issue. Nevertheless, they emphasized that this fact has recently been changing. &lt;/p&gt;

&lt;h2&gt;
  
  
  OTHER FACTORS
&lt;/h2&gt;

&lt;h4&gt;
  
  
  Idiosyncrasy
&lt;/h4&gt;

&lt;p&gt;A tendency to simply accept cyber risk was occasionally mentioned. This is consistent with Target’s (2010) findings regarding attitude toward risk in developing countries.&lt;/p&gt;

&lt;h4&gt;
  
  
  Internal university policies
&lt;/h4&gt;

&lt;p&gt;Some university policies prevent improvements in cybersecurity teaching and collaboration&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zLbXB9vH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e33ex9o6gvep6v8as9h2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zLbXB9vH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e33ex9o6gvep6v8as9h2.png" alt="Image description" width="880" height="271"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  DISCUSSION OF FINDINGS
&lt;/h2&gt;

&lt;p&gt;It has recently been suggested that no country is fully prepared to meet the cybersecurity challenge. While some developed nations with a higher level of national cybersecurity performance have already started stronger workforce and educational programs to foster such  preparation, studies suggest that many less developed nations&lt;br&gt;
have moved slowly to develop cyber capacity. The challenges&lt;br&gt;
that cybersecurity education currently faces mainly involve structural capabilities (e.g., skills), community integration, uncertainty of demand, lack of awareness, economic resources, and governance. In undergraduate programs, most security content is integrated&lt;br&gt;
across several courses in CS and CN, but such integration is informal since, very often, academic instruction depends on instructors’ decisions, knowledge and security skills. Lack of coordination among faculty can foster redundancies and/or gaps in security content. Although some security courses do exist, in many cases they were reported to be incomplete in scope or depth, especially because of lack of expertise or resources such as labs.&lt;/p&gt;

&lt;p&gt;The results of the interviews suggest that there is a shared perception that university priorities, lack of specialists, lack of institutional flexibility, and lack of understanding of demand prevent academics from advancing cybersecurity education. In addition, introducing security content in curricula competes for resources and time allocation with other academic content inherent to CS or CN programs, which also discourages augmenting cybersecurity knowledge.&lt;br&gt;
although universities with the most advanced preparation have developed particular strategies to address aspects of cybersecurity (e.g., MS programs, research initiatives, and specialized security courses), substantial efforts to strengthen cybersecurity education need to be pursued nationwide. These efforts need to take into account multiple areas in which cybersecurity education evolves.&lt;/p&gt;

&lt;h2&gt;
  
  
  Strategies for advancing cybersecurity education
&lt;/h2&gt;

&lt;p&gt;The successful improvement of cybersecurity education cannot be achieved as an isolated effort pursued only by universities. Rather a community-based effort will be required. Examination of relevant literature shows that national initiatives to advance cybersecurity education (and workforce capabilities) involve six dimensions: capacity governance, academic programs, training, certification, research and development (R&amp;amp;D), and cybersecurity awareness.&lt;/p&gt;

&lt;p&gt;Relevant content must be strengthened in both approaches for formal education in undergrad programs: (i) cybersecurity content integrated across core courses of CS and CN; and (ii) security topics addressed in cybersecurity courses.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to Install Obsidian On Linux | Set it's $PATH variable</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Tue, 07 Mar 2023 10:09:42 +0000</pubDate>
      <link>https://dev.to/aryankoundal/how-to-install-obsidian-on-linux-set-its-path-variable-13km</link>
      <guid>https://dev.to/aryankoundal/how-to-install-obsidian-on-linux-set-its-path-variable-13km</guid>
      <description>&lt;p&gt;In this blog we will learn about&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How to download Obsidian App Image.&lt;/li&gt;
&lt;li&gt;How to install and set up the $PATH for obsidian.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Let's get started. &lt;/p&gt;

&lt;h2&gt;
  
  
  Downloading
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;First of all, install the AppImage from the &lt;a href="https://obsidian.md/download"&gt;link&lt;/a&gt;. This file will probably be downloaded in your &lt;code&gt;Home/Downloads&lt;/code&gt; folder.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Installing
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Now open a terminal in your &lt;code&gt;Home/Downloads&lt;/code&gt; folder.&lt;/li&gt;
&lt;li&gt;You have to make this AppImage an executable file by using
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo chmod +x Obsidian-1.1.9.AppImage
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;After that you have to rename the &lt;em&gt;Obsidian-1.1.9.AppImage&lt;/em&gt; to &lt;em&gt;obsidian&lt;/em&gt; using
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mv Obsidian-1.1.9.AppImage obsidian
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Then you'll have to create a new folder for obsidian at &lt;code&gt;usr/bin&lt;/code&gt; and then copy the &lt;em&gt;obsidian&lt;/em&gt; file to that folder.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo mkdir /usr/bin/obsidian
sudo cp obsidian /usr/bin/obsidian/obsidian
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Now to add the PATH. You have to set the variable name in  ~/.profile. This can be done by using
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;gedit ~/.profile (any text precessor)
export PATH=$PATH:/usr/bin/obsidian
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;in the terminal to open the file. Then adding line &lt;code&gt;export PATH=$PATH:/usr/bin/obsidian&lt;/code&gt; at the end of your ~/.profile file.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Save and then close the file. You also have to restart the device to use these changes. &lt;/li&gt;
&lt;li&gt;Now you can run obsidian from Application Launcher by Alt + F2 then typing obsidian. And from terminal by Ctrl + Alt + T then typing obsidian.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>obsidian</category>
      <category>ubuntu</category>
      <category>linux</category>
      <category>path</category>
    </item>
    <item>
      <title>Computer Graphics | Program to Draw Graphics Objects using built-in C++ functions</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Thu, 23 Feb 2023 14:40:44 +0000</pubDate>
      <link>https://dev.to/aryankoundal/computer-graphics-program-to-draw-graphics-objects-using-built-in-c-functions-2m1e</link>
      <guid>https://dev.to/aryankoundal/computer-graphics-program-to-draw-graphics-objects-using-built-in-c-functions-2m1e</guid>
      <description>&lt;p&gt;By the end of this blog you will be able to draw Pixels, Lines, Circles, Rectangles and Ellipses. To get started with Computer Graphics using C++, you have to import the graphics library.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Graphics Library for C++&lt;/span&gt;
&lt;span class="cp"&gt;#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;graphics.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After this. you can start the methods/functions available in this graphics library. &lt;br&gt;
Inside &lt;code&gt;main()&lt;/code&gt; function before using the functions for all those objects you have to initialize the Graphics mode on your computer. This is necessary step, so that you can change your computer display mode to generate image.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// gm is Graphics mode, a computer display mode to&lt;/span&gt;
    &lt;span class="c1"&gt;// generate image&lt;/span&gt;
    &lt;span class="c1"&gt;// DETECT is a macro defined in "graphics.h" header file&lt;/span&gt;
    &lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;gd&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;DETECT&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;gm&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

    &lt;span class="c1"&gt;// initgraph initializes the graphics system by loading a&lt;/span&gt;
    &lt;span class="c1"&gt;// graphics driver from disk, path can be empty&lt;/span&gt;
    &lt;span class="n"&gt;initgraph&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;&amp;amp;&lt;/span&gt;&lt;span class="n"&gt;gd&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&lt;/span&gt;&lt;span class="n"&gt;gm&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;""&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This completes your setup for using any of the methods listed in graphics library. Let’s draw a pixel first.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// putpixel(x,y,color): plots a pixel at location (x, y)&lt;/span&gt;
    &lt;span class="c1"&gt;// of specified color&lt;/span&gt;
    &lt;span class="n"&gt;putpixel&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;YELLOW&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This will create a new window on your screen on which a pixel a drawn. In addition to it, you can also print a string on the screen using,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;&lt;span class="c1"&gt;// outtextxy(x,y,"string"):  displays the text or&lt;/span&gt;
    &lt;span class="c1"&gt;// string at a specified point (x, y) on the screen&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;35&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"PIXEL"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaa4zivkwkuf33ksdx3p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaa4zivkwkuf33ksdx3p.png" alt=" " width="73" height="101"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For drawing a line along a string “LINE” above it, you’ll need,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// line(x1, y1, x2, y2):  draws a line from a point(x1,y1) to point(x2,y2)&lt;/span&gt;
    &lt;span class="n"&gt;line&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;90&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;170&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;170&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;130&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"LINE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F82549r8fxm6osctm82p9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F82549r8fxm6osctm82p9.png" alt=" " width="120" height="191"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For drawing a circle along a string “CIRCLE” above it, you’ll need,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// circle(x,y,r): Draws a circle having center at x,y and having radius as r&lt;/span&gt;
    &lt;span class="n"&gt;circle&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;240&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;40&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;215&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"CIRCLE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepgmip2ocrwqh6pibley.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepgmip2ocrwqh6pibley.png" alt=" " width="125" height="166"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For drawing a rectangle along a string “RECTANGLE” above it, you’ll need,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// rectangle(left, top, right, bottom): Draws a rectangle&lt;/span&gt;
    &lt;span class="c1"&gt;// having coordinates of left top and right bottom corner&lt;/span&gt;
    &lt;span class="n"&gt;rectangle&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;300&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;90&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;400&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;140&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;310&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"RECTANGLE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hlawqx7kfbqll4y1zui.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hlawqx7kfbqll4y1zui.png" alt=" " width="171" height="138"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For drawing a ellipse along a string “ELLIPSE” above it, you’ll need,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// ellipse(xCenter, yCenter, startAngle, endAngle, xRadius, yRadius):&lt;/span&gt;
    &lt;span class="c1"&gt;// Draws an ellipse for a given center, starting and ending angle&lt;/span&gt;
    &lt;span class="c1"&gt;// and horizontal and vertical radius.&lt;/span&gt;
    &lt;span class="n"&gt;ellipse&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;500&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;360&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;70&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;35&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;470&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"ELLIPSE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8bbvbjd15s2xtqf3cvm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8bbvbjd15s2xtqf3cvm.png" alt=" " width="207" height="185"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After these function calls, you will need two additional function calls. First one is getch() and another one is closegraph()&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;        &lt;span class="c1"&gt;// getch() is a nonstandard function and is present in&lt;/span&gt;
    &lt;span class="c1"&gt;// conio.h header file&lt;/span&gt;
    &lt;span class="c1"&gt;// it pauses the Output Console until a key is pressed&lt;/span&gt;
    &lt;span class="n"&gt;getch&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;

    &lt;span class="c1"&gt;// closegraph function closes the graphics&lt;/span&gt;
    &lt;span class="c1"&gt;// mode and deallocates all memory allocated&lt;/span&gt;
    &lt;span class="c1"&gt;// by graphics system .&lt;/span&gt;
    &lt;span class="n"&gt;closegraph&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That’s all you need to draw these objects. The complete code is below,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;&lt;span class="cp"&gt;#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;iostream&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
&lt;/span&gt;&lt;span class="c1"&gt;// Graphics Library for C++&lt;/span&gt;
&lt;span class="cp"&gt;#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;graphics.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;conio.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
#include&lt;/span&gt; &lt;span class="cpf"&gt;&amp;lt;dos.h&amp;gt;&lt;/span&gt;&lt;span class="cp"&gt;
&lt;/span&gt;&lt;span class="n"&gt;using&lt;/span&gt; &lt;span class="n"&gt;namespace&lt;/span&gt; &lt;span class="n"&gt;std&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="p"&gt;{&lt;/span&gt;   
    &lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;gd&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;DETECT&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;gm&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="n"&gt;initgraph&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;&amp;amp;&lt;/span&gt;&lt;span class="n"&gt;gd&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&lt;/span&gt;&lt;span class="n"&gt;gm&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;""&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

    &lt;span class="n"&gt;putpixel&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;YELLOW&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;35&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"PIXEL"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

    &lt;span class="n"&gt;line&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;90&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;170&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;170&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;130&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"LINE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

    &lt;span class="n"&gt;circle&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;240&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;40&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;215&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"CIRCLE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

    &lt;span class="n"&gt;rectangle&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;300&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;90&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;400&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;140&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;310&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"RECTANGLE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

    &lt;span class="n"&gt;ellipse&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;500&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;120&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;360&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;70&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;35&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;outtextxy&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;470&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;55&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s"&gt;"ELLIPSE"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;getch&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
    &lt;span class="n"&gt;closegraph&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;

    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The output produced will be:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj3p7bnibbtqm82qlyr0n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj3p7bnibbtqm82qlyr0n.png" alt=" " width="798" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>react</category>
      <category>vue</category>
      <category>careeradvice</category>
      <category>inspiration</category>
    </item>
    <item>
      <title>Presentation on Cyber Security</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Thu, 02 Feb 2023 16:28:08 +0000</pubDate>
      <link>https://dev.to/aryankoundal/presentation-on-cyber-security-1jb6</link>
      <guid>https://dev.to/aryankoundal/presentation-on-cyber-security-1jb6</guid>
      <description>&lt;h2&gt;
  
  
  IT Fundamentals of Cyber Security
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The Internet in India is growing rapidly. There are two sides to a coin. Internet also has it’s own disadvantages is cyber crime-illegal activity committed on the Internet. &lt;br&gt;
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cyber crime is an activity done using computers and the internet.&lt;br&gt;
Cyber security refers to the technologies and processes designed to protect computers,networks and data from unauthorized access and attacks delivered via the internet by&lt;br&gt;
cyber criminals. Though, cyber security is important for the network, data and application security.&lt;br&gt;
The objective of cyber security is to establish rules and measure to use against attacks over the internet.&lt;/p&gt;

&lt;h2&gt;
  
  
  WHAT IS CYBER SECURITY?
&lt;/h2&gt;

&lt;p&gt;Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.&lt;br&gt;
In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. &lt;br&gt;
Information security, which is designed to maintain the&lt;br&gt;
confidentiality, integrity and availability of data, is a subset of cybersecurity.&lt;/p&gt;

&lt;h2&gt;
  
  
  THE CIA TRIAD OF INFORMATION SECURITY
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Confidentiality:
&lt;/h3&gt;

&lt;p&gt;Ensures that data or an information system is accessed by only an authorized person.&lt;/p&gt;

&lt;h3&gt;
  
  
  Integrity:
&lt;/h3&gt;

&lt;p&gt;Integrity assures that the data or information system can be trusted. Ensures that it is edited by only authorized persons and remains in its original state when at rest.&lt;/p&gt;

&lt;h3&gt;
  
  
  Availability:
&lt;/h3&gt;

&lt;p&gt;Data and information systems are available when required.&lt;/p&gt;

&lt;h2&gt;
  
  
  Categories of Cyber crime
&lt;/h2&gt;

&lt;p&gt;We can categorize cyber crime in two ways:-&lt;/p&gt;

&lt;h3&gt;
  
  
  The computer as a target:
&lt;/h3&gt;

&lt;p&gt;Using a computer to attacks other computer e.g. Hacking, Virus/Worms attacks, DoS attack etc.&lt;/p&gt;

&lt;h3&gt;
  
  
  The computer as a weapon:
&lt;/h3&gt;

&lt;p&gt;Using a computer to commit real world crime e.g. credit card fraud etc.&lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Cyber crime
&lt;/h2&gt;

&lt;p&gt;﻿Hacking&lt;br&gt;
Phishing&lt;br&gt;
Types of Cyber Crime&lt;br&gt;
Denial of Service&lt;br&gt;
Spam Email&lt;br&gt;
Spyware, Adware&lt;br&gt;
Malware (Trojan, Virus, Worms etc.)&lt;br&gt;
ATM Skimming and Point of Scale Crimes&lt;br&gt;
Ransomware&lt;/p&gt;

&lt;p&gt;﻿&lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Cyber Attack by Percentage
&lt;/h2&gt;

&lt;p&gt;(Source-FBI)&lt;br&gt;
Financial fraud 11%&lt;br&gt;
Sabotage of data/networks 17%&lt;br&gt;
Theft of proprietary information  20%System penetration from the outside 25%&lt;br&gt;
Denial of Service 27%&lt;br&gt;
Unauthorized access by insiders 71%&lt;br&gt;
Employee abuse of internet privileges 79%&lt;br&gt;
Viruses 85%&lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Security tools
&lt;/h2&gt;

&lt;p&gt;﻿Understanding CVE, CWE, CVSS, OWASP Top 10, SANS Top 25.&lt;br&gt;
Wireshark demonstration.&lt;br&gt;
Nmap demonstration.&lt;br&gt;
Nessus - Vulnerability Assessment scanning tool.&lt;/p&gt;

&lt;h2&gt;
  
  
  Advantage of Cybersecurity
&lt;/h2&gt;

&lt;p&gt;It will defend us from hacks and virus. It helps us to browse the safe website.&lt;br&gt;
Internet Security process all the incoming and outgoing data on our computer.&lt;br&gt;
The cyber security will defend us from critical attacks.&lt;br&gt;
The application of cyber security used in our PC needs update every week.&lt;br&gt;
The security developers will update their database every week once. Hence the new virus also detected.&lt;/p&gt;

&lt;h2&gt;
  
  
  Safety tips to Cyber crime
&lt;/h2&gt;

&lt;p&gt;Use Antivirus Software.&lt;br&gt;
 Insert Firewalls.&lt;br&gt;
 Uninstall unnecessary software.&lt;br&gt;
 Maintain backup.&lt;br&gt;
 Check security settings.&lt;br&gt;
 Never give your full name or address to strangers.&lt;br&gt;
 Learn more about the internet privacy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reference
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.embroker.com/blog/cyber-attack-statistics/" rel="noopener noreferrer"&gt;https://www.embroker.com/blog/cyber-attack-statistics/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>crypto</category>
      <category>cryptocurrency</category>
      <category>blockchain</category>
      <category>web3</category>
    </item>
    <item>
      <title>Summary of THE CASE FOR DEPTH IN CYBERSECURITY EDUCATION</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Thu, 02 Feb 2023 14:08:03 +0000</pubDate>
      <link>https://dev.to/aryankoundal/summary-of-the-case-for-depth-in-cybersecurity-education-opf</link>
      <guid>https://dev.to/aryankoundal/summary-of-the-case-for-depth-in-cybersecurity-education-opf</guid>
      <description>&lt;p&gt;the People’s Liberation Army (PLA) of China has developed a&lt;br&gt;
cadre of 30,000 cyberspies, who are supplemented by more than&lt;br&gt;
150,000 “private sector” cyberexperts “whose mission is to steal American military and technological secrets and cause mischief in government and financial services”. &lt;/p&gt;

&lt;p&gt;There are numerous examples in addition to literature support for the notion that cybersecurity education needs to refocus on depth as opposed to breadth. However, adding some elements of depth to the current model&lt;br&gt;
of teaching cybersecurity is inadequate. We need to begin developing and measuring cybersecurity skills well before college to develop cybersecurity experts.&lt;/p&gt;

&lt;h1&gt;
  
  
  HOW DEPTH IS ACHIEVED TODAY
&lt;/h1&gt;

&lt;h2&gt;
  
  
  The Case for Depth in Cybersecurity Education
&lt;/h2&gt;

&lt;p&gt;examples of a few people who started cybersecurity very early in life.&lt;/p&gt;

&lt;h1&gt;
  
  
  EXPANDING DEPTH TO MEET CURRENT NEEDS
&lt;/h1&gt;

&lt;p&gt;tells how much hour of work needs to be done in order to get to the 1000 hrs time goal&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kvfnvvg8vmaah9ms2re.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kvfnvvg8vmaah9ms2re.png" alt="Image description" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;tells about various competitions held for high schoolers to get started with hacking.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CyberFoundations&lt;/li&gt;
&lt;li&gt;CyberPatriot&lt;/li&gt;
&lt;li&gt;National Collegiate Cyber Defense Competition&lt;/li&gt;
&lt;li&gt;National Cyber League&lt;/li&gt;
&lt;li&gt;DC3 Forensics Challenge&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  ANALOGY
&lt;/h1&gt;

&lt;p&gt;compares the cyber security with sports and says how every day practise results in good professionals.&lt;/p&gt;

&lt;h1&gt;
  
  
  INTEGRATING EXTRACURRICULAR AND CURRICULAR DEPTH IN CYBERSECURITY
&lt;/h1&gt;

&lt;p&gt;Turning cybersecurity into a team competition sport has advantages of learning through real-world simulations with the ability to track performance. &lt;/p&gt;

&lt;h1&gt;
  
  
  THE NIST CYBERSECURITY WORKFORCE FRAMEWORK
&lt;/h1&gt;

&lt;h1&gt;
  
  
  DEPTH AND BREADTH IN CURRICULAR AND EXTRACURRICULAR DEVELOPMENT
&lt;/h1&gt;

&lt;p&gt;Schwartz et al. studied more than 8,000 students at 45&lt;br&gt;
universities and found compelling evidence demonstrating that&lt;br&gt;
students whose high school science courses focused on depth as opposed to breadth outperformed the students whose preparation was breadth-oriented.&lt;br&gt;
The selected articles&lt;br&gt;
ranged in dates from 1961 to 2012 and two underlying messages&lt;br&gt;
were consistent throughout, namely the fact that teachers and&lt;br&gt;
some students prefer breadth but external measures indicate that depth has greater value.&lt;/p&gt;

&lt;h1&gt;
  
  
  DEPTH AND ITS IMPLICATIONS FOR SELF-EFFICACY
&lt;/h1&gt;

&lt;p&gt;self-efficacy, a person’s belief in his or her ability to execute a task at a required level of performance, is an important factor affecting one’s ability to attain a goal. High self-efficacy also encourages increased attention and effort on a task, increased persistence when facing obstacles or adverse experiences and heightened performance accomplishment.&lt;/p&gt;

&lt;h1&gt;
  
  
  CONCLUSION
&lt;/h1&gt;

</description>
      <category>async</category>
      <category>tutorial</category>
      <category>programming</category>
      <category>howto</category>
    </item>
    <item>
      <title>3.1 Finalized Orgs | GSoD 2023 Series</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Tue, 27 Dec 2022 11:55:42 +0000</pubDate>
      <link>https://dev.to/aryankoundal/31-finalized-orgs-gsod-2023-series-1ndn</link>
      <guid>https://dev.to/aryankoundal/31-finalized-orgs-gsod-2023-series-1ndn</guid>
      <description>&lt;p&gt;&lt;strong&gt;27/12/22&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Sr&lt;/th&gt;
&lt;th&gt;Orgs&lt;/th&gt;
&lt;th&gt;setup&lt;/th&gt;
&lt;th&gt;find issue&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;The R project&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Sym.py&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;p5.js&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;td&gt;[]&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

</description>
      <category>ai</category>
    </item>
    <item>
      <title>2. IMPORTANT DEADLINES | GSoD 2023 series</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Wed, 14 Dec 2022 15:15:07 +0000</pubDate>
      <link>https://dev.to/aryankoundal/2-important-deadlines-gsod-2022-series-16df</link>
      <guid>https://dev.to/aryankoundal/2-important-deadlines-gsod-2022-series-16df</guid>
      <description>&lt;h2&gt;
  
  
  Eventwise
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Program announcement     : February 3, 2022&lt;/li&gt;
&lt;li&gt;Organizations announced  : April 14 ( &lt;em&gt;Finalize organization&lt;/em&gt; )&lt;/li&gt;
&lt;li&gt;Doc development begins   : April 14, 2022( &lt;em&gt;Consider as a deadline for hiring&lt;/em&gt; )&lt;/li&gt;
&lt;li&gt;Doc development          : April 14, 2022 - November 15, 2022&lt;/li&gt;
&lt;li&gt;TW hiring deadline       : May 16, 2022 at 18:00 UTC&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Monthly
&lt;/h2&gt;

&lt;p&gt;DECEMBER  :   &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Choose 3 orgs came in 2022&amp;amp;2021&lt;/li&gt;
&lt;li&gt;Check their proposal page&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;JANUARY   :   &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Contribute
&lt;/li&gt;
&lt;li&gt;Create a proposal before organizations announced&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;FEBRUARY  :&lt;/p&gt;

&lt;p&gt;MARCH     :&lt;/p&gt;

&lt;p&gt;APRIL     :   &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Absolute Deadline for proposal submission&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>beginners</category>
      <category>career</category>
      <category>learning</category>
      <category>programming</category>
    </item>
    <item>
      <title>1. Basic planning | GSoD 2023 Series</title>
      <dc:creator>AryanKoundal</dc:creator>
      <pubDate>Wed, 14 Dec 2022 15:13:57 +0000</pubDate>
      <link>https://dev.to/aryankoundal/1-basic-planning-gsod-series-2022-3iha</link>
      <guid>https://dev.to/aryankoundal/1-basic-planning-gsod-series-2022-3iha</guid>
      <description>&lt;ol&gt;
&lt;li&gt;Check Deadlines/Timeline. ☑&lt;/li&gt;
&lt;li&gt;Go through the whole website. ☑ &lt;a href="https://developers.google.com/season-of-docs/docs/tech-writer-guide"&gt; Technical writer guide
&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Compare organizations. ☑&lt;/li&gt;
&lt;li&gt;Choose any 3. ☑&lt;/li&gt;
&lt;li&gt;Find technical writing course.(Not doing on basis of talking to others, instead working on things listed in &lt;a href="https://dev.to/aryankoundal/21-things-todo-to-improve-portfolio-gsod-2022-series-2g7o-temp-slug-9229925?preview=b33b8d1eecb574532f36a7288515f1365e84d00b48572ec59564854e6492d55ef680e59a4c0e194e1803c41211bc73fa7f694035901a8e0e58c57020"&gt;Things todo to improve portfolio | GSoD 2023 Series &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Contact the organizations.
 a. The R project
 b. sympy
 c. p5js
&lt;/li&gt;
&lt;li&gt;Setup project
 a. The R project
 b. sympy
 c. p5js
&lt;/li&gt;
&lt;li&gt;Start contributing.
 a. The R project
 b. sympy
 c. p5js
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>gsod</category>
    </item>
  </channel>
</rss>
