Friday, January 20, 2017

Today we continue to read up on how Google protects data.Google has incredible expertise in this area. Security is an integral part of their operations. They scan for security threats using tools, they use penetration testing, quality assurance processes, security reviews and external audit. They have a rigorous incident management process for security events that affect the confidentiality, integrity or availability of systems of data. They apply defense-in-depth perspective to securing their custom-designed servers, proprietary operating systems and geographically distributed data centers.Data is encrypted in transit, at rest and on backup media, moving over the internet or traveling between the data centers. They build redundancy into their server design, data storage, network and internet connectivity and even the software services.Their audits cover compliance standards and we reviewed some of them.
Next we started reviewing some of the tools used to empower users and administrators to improve security and compliance.
These included User and authentication/authorization features such as 2-step verification which requires users to sign in with their username, password as well as one-time-password-tokens. In addition, a security key developed by Google as an actual physical key to use with the Google account is used to enhance the 2-step verification.  The purpose of the security key is to send an encrypted code rather than a code which means login cannot be phished. Services such as single sign-on enables user to use multiple services with the same login.  OAuth 2.0 and Open ID allows customers to configure this single sign on service to multiple cloud solutions.
In addition to securing user, data management features are also provided to users and administrators.
Data Management includes such things as securing information rights with driver audit log, driver content compliance, trusted domains for drive sharing and email security features such as secure TLS, phishing prevention, data loss prevention, content compliance, restriction to content and objectionable content.

#codingexercise
Find four elements a,b, c and d in an array such that a+b = c + d 
List<Tuple<int,int>> PairSums(List<intnumsint sum) { 
Var ret = new List<Tuple<int,int>>(); 
int left = 0; int right = nums.Count - 1; if (nums.Count <= 1) return ret; 
nums.Sort(); while (left < right) {          if(nums[left] + nums[right] == sum) 
{               var t = new Tuple<int,int>(nums[left], nums[right]); 
              ret.Add(t); 
              ret.Append(PairSums(nums.GetRange(left, right-left), sum); 
              ret.Append(PairSums(nums.GetRange(left+1, right-left, sum); 
              left++; 
              right--; 
}          else if (nums[left] + nums[right] < sum)               left++;          else               right--; } return ret; } 
CombinePairs(PairSums(nums,sum));

No comments:

Post a Comment