Posts

Showing posts from 2022

HOME LAB : HANDS-ON

Image
HOME LAB : HANDS-ON Disclaimer Home LAB Security Audit : GRC (Governance Risk Compliance) Overview Security Assessment reviews Identifying and analyzing Targets  Planning Technical Security Assessments  Executing the Technical security  Post testing activities  ISO 27001 AND 27002 What key insights can be gained from learning about ISO 27001: How to create and implement the Information System Management within the organization. Discuss on the Framework based on the ISO 27001 Three pillars: Confidentiality, Integrity and Availability I SO 9001 & AS9100 Comparison between ISO 9001 and AS9100 Additional requirements for As9100 Risk Management Demystifying risk management: My insights on what it is, how to recognize it, and strategies for mitigation.  Dashboard Transform data into insights with Excel dashboards. My latest blog post guides you through building a sample dashboard using pivot tables & graphs, explaining each parameter choice. Plus, explore alternative tools like Power

Plagiarism

Image
Plagiarism      Plagiarism score or similarity score is obtained by the tool ( Turnitin ) to check,  whether the  s ubmitted documents contains any copied & pasted as it is from any sources. The plagiarism is  used to check the similarity of the phrases and sentence that are used in the document are they copied as it is and used in the  report. Even when the credit is provided for referencing these source under the reference section. One must use the quotations to use the same sentence or phrases, that are copied & pasted in the document. When the filter is applied to ignore the quoted sentenced, these are ignored by the tool to obtain the similarity score.       The image below displays an example of a plagiarism or similarity score, which is obtained by Turnitin, a tool used to check whether submitted documents contain any copied and pasted content from other sources. The similarity score indicates how similar the phrases and sentences in the document are to existing sources,

Links for useful websites, job portals, cyber security, and more

  Useful Websites   Refer to latest Link:  https://www.gouti1454.com/p/useful-websites.html Last Updated : DEC' 2022 Disclaimer: This document contains unedited notes and has not been formally proofread. The information provided in this document is intended to provide a basic understanding of certain technologies. Please exercise caution when visiting or downloading from websites mentioned in this document and verify the safety of the website and software. Some websites and software may be flagged as malware by antivirus programs. The document is not intended to be a comprehensive guide and should not be relied upon as the sole source of information. The document is not a substitute for professional advice or expert analysis and should not be used as such. The document does not constitute an endorsement or recommendation of any particular technology, product, or service. The reader assumes all responsibility for their use of the information contained in this document and any conseq