It is important to define the various levels of access to an information technology system individuals require. The levels of access given to individuals are determined on two primary factors: The individual's role within the organization. The sensi...
In this series, we are going to talk about the basic principles of information security & the fundamental frameworks that are used to protect data and systems. The CIA Triad In 1998 a security model called the CIA triad started being used for creatin...
Introduction The basic idea of blockchain is very simple: a distributed immutable ledger that maintains a continuously growing list of records. the ledger is distributed among multiple peers Distributed Consensus Now, some of these peers might be evi...
In this article I will be talking about the basic concepts that are used within a Blockchain. Hash Functions A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function a...
You would have been living in an underground cave for the past 10 years if you havn't heard about cryptocurrencies. We all heard about Bitcoin, Ethereum and the rest of the crypto currencies. At the time of writing (2021-12-05) the price of 1 Bitcoin...
One of the problems that we come up against when designing scalable & highly available systems is how can we partition and replicate data in our systems. Data partitioning is the process of distributing data across a set of nodes while Data Replicati...