ESM

@scis-esm

Enterprise Solution Management

Public team

Community (0)
No community contribution yet

Joined on Mar 4, 2024

  • To rewrite the instruction more clearly for undergraduate students, especially considering the context of IT Service Management - Change Management, the following version could be more accessible: Submit Your Change Milestone Documentation As part of your coursework in ESM, you will be completing a Change Milestone during class. This milestone is a critical component of your learning and assessment. Here's what you need to do: Complete the Change Milestone in class: Work on this milestone during the designated class time. Your task is to implement the changes that your team proposed. Capture Evidence: Take screenshots/video that show whether you were able to complete the changes successfully or not. If some changes were not completed, include evidence and a brief explanation.
     Like  Bookmark
  • Personal notes and extracts from a conversation with PerplexityAI PerplexityAI. (March, 2024). Perplexity [Large language model]. https://www.perplexity.ai devops-loop-illustrations DevOps Loop by Atlassian DevOps Overview: DevOps is a practice that integrates development, quality assurance, and operations into a continuous set of processes, aiming to improve product delivery and foster a collaborative culture. Core Advantages: By adopting DevOps, companies can achieve faster product releases, quicker responsiveness to customer needs, and a better working environment. Principles and Practices: The CAMS model (Culture, Automation, Measurement, Sharing) outlines the key values of DevOps, emphasizing the importance of collaboration, automation, and sharing within teams.
     Like  Bookmark
  • In DevSecOps, SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), SCA (Software Composition Analysis), and MPT (Manual Penetration Testing) are Software Security Methods that complement each other by covering different aspects and stages of the software development lifecycle (SDLC), providing a comprehensive approach to application security. How They Complement Each Other SAST is used early in the SDLC to analyze source code, byte code, or binaries for vulnerabilities without executing the program. It provides immediate feedback during coding, which helps developers fix issues proactively and reduces security technical debt[1][4]. DAST tests running applications from the outside, simulating attacks to find vulnerabilities. It complements SAST by identifying vulnerabilities that are only apparent when the application is running, such as those related to deployment configuration and business logic[4][5]. SCA focuses on identifying known vulnerabilities in open source components used within an application. It complements SAST by covering third-party code that SAST does not analyze, ensuring that these components do not introduce new vulnerabilities or licensing issues[3][6]. MPT involves human testers who attempt to find and exploit vulnerabilities, complementing automated tools by catching complex vulnerabilities like authorization issues and business logic flaws that automated assessments may miss[1]. Integration in DevSecOps Early Detection: By integrating SAST and SCA early in the development process, vulnerabilities can be detected and remediated before they become more costly and difficult to fix[6].
     Like  Bookmark
  • Static Application Security Testing (SAST) What it is: SAST tools analyze source code, byte code, or binaries for vulnerabilities without executing the program. Pros:Can be used early in the development process, making it easier and cheaper to fix issues[2]. Provides complete code coverage and can detect theoretical issues[10]. Cons: May produce false positives and require expert tuning[10]. Cannot identify runtime vulnerabilities or third-party interface defects[15].
     Like  Bookmark
  • Creating visual representations for different levels of chef expertise in Asian cuisine involves showcasing the complexity, presentation, and ingredients of the dishes. Beginner Level image For a beginner level, the focus is on simplicity and basic cooking techniques. A suitable dish could be a simple stir-fry or fried rice, which requires minimal ingredients and straightforward steps. Dish Example: Vegetable Stir-Fry or Chicken Fried Rice. Key Characteristics: Use of basic ingredients like vegetables, chicken, or eggs, and simple sauces such as soy sauce. The presentation is homely and straightforward. Image Concept: A colorful plate of fried rice with visible chunks of egg, peas, carrots, and chicken. The cooking environment could be a regular kitchen, emphasizing that no advanced equipment is needed. Image Source: Leonardo Diffussion XL by leonardo.ai prompt by Rafael J. Barros.
     Like  Bookmark
  • A conversation with PerplexityAI PerplexityAI. (March, 2024). Perplexity [Large language model]. https://www.perplexity.ai Context: image Unusual events that may cause global disruptions in Cloud Services include: Cloud Outages and Service Degradations: These can be caused by a variety of factors, including hardware failures, power outages, network issues, and software bugs. For instance, Microsoft and AWS experienced significant outages in 2023, affecting global connectivity and leading to service degradations across multiple services such as Azure, Teams, Outlook, and SharePoint. These outages were attributed to high levels of packet loss and BGP route changes, highlighting the complexity and interdependence of cloud infrastructure[1][2][6]. Cloud Attacks and Security Breaches: Security breaches in cloud services can lead to widespread disruptions. Common causes for these breaches include publicly accessible storage buckets, misconfigured access control lists (ACLs) and bucket policies, unencrypted storage data, and vulnerabilities exploited by attackers. Such incidents underscore the importance of robust security measures and configurations to protect cloud storage and services from unauthorized access and data exfiltration[3].
     Like  Bookmark