Security of Naval Base

This writing is in response to and continuation of Prof. Ross Anderson’s book’s first chapter topic – i.e. Example of MilitaryBase [1].The security of the Naval base is also as important as the security of other military bases. However, one needs to investigate it from the perspective of a Naval war strategist. Imagine a war […]

PHD Proposal – Privacy Enhancing Technologies to Support Anonymous Communication

In year 2011, after coming from the United Kingdom I submitted a PHD Proposal to the Security Group of Cambridge University (to Dr. Steven J. Murdoch) which was rejected by him (Reason: not known. But probably my PHD research proposal was not well written in the eyes of Dr. Steven J. Murdoch). Dr. Murdoch [7] […]

Shadow IT

Quite recently, I submitted an assignment on “Shadow IT”. I want to share some of its data with the blog readers. According to [1], “Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval”. E.g. BYOD, use of cloud services like Dropbox, Google Drive, One […]

How to distribute time in a day?

A few days ago, I was reading a post on Linkedin which was about the distribution of a day. To be honest, I really liked it and I would like to share with the viewer of my site. Pratik Thakker shared Ridhi Bansal’s words about distribution of a day. “Distribute your day into 8+8+8 hrs […]