上海千花网,爱上海,上海419论坛 – Powered by Gregary Thayne!

Time Incs Fran Hauser on Accelerating Digital Development

Posted on by

first_imgNew York – At the 2011 FOLIO: Show, Time Inc. Lifestyle & Style and Entertainment Groups digital president Fran Hauser shared insights into the publisher’s digital success. Two Time Inc. titles, People and TIME, currently hold the top spots for most followed magazine brands on Twitter; during a keynote presentation, Hauser explained how this reign is no happy accident.The need for a timely and well-executed social media presence is top of mind for almost all publishers, regardless of sector or audience. As many remember, this only recently became a pressing concern. Hauser reflected on when she first began at People, when its website was referred to as the “.com”, or sometimes simply “the dot”. Now, Time Inc. devotes many resources to making its “dot” a thriving web destination.Time Inc. properties attract 50 million unique visitors, and 40 million mobile uniques. Hauser broke Time Inc.’s intricate digital strategy into three steps scalable to most any publisher, “Create the right organization, invest in tech and focus on relationships.” Hauser also refers to creating a “second screen” experience with the Time Inc. audience. The second screen may be a computer, smartphone or tablet, and it allows users to engage with one form of entertainment while discussing it on another. To achieve this, Time Inc. staff is encouraged to directly converse with users on social media platforms during television shows, award ceremonies, etc. to create a real-time dialogue. Success in the digital world for Time Inc. also meant creating new roles in-house. This may mean adding on a digital or social editor, or encouraging general managers “to own digital as a business”. “It’s not just about evaluating existing roles and creating new ones,” says Hauser. “It’s about investing in training and tapping into resources both in and out of house.”For Time Inc., this need brought Time Inc. University to fruition. A curriculum of 150 courses on digital subject matter was created over a span of three and a half years to educate and prepare staff for the digital push. Courses included topics such as “The Anatomy of a Digital Start-Up” and “The Key to Selling Digital”.At Time Inc., the relationship between departments continues to be reevaluated for digital success. “It’s critical to rethink relationship with IT. It’s also important to have front-end web developers allocated to certain brands, and to have input with features,” says Hauser. “Some of our best ideas have come from developers.”“Succeeding in digital is not about throwing away old things, it’s about finding new ways to use them,” says Hauser. “For us, it’s about living up to the possibilities.”center_img In order to best place content in the social media sphere where it will glean the most visibility, Hauser and team monitor the arc of the day, tracking when users are engaging with various social platforms. last_img read more

Tagged: , , , , , , , , , .

Best DVRs for cord cutters

Posted on by

first_img Mentioned Above Amazon Fire TV Recast Read CNET’s review Now playing: Watch this: Josh Goldman/CNET Though the Roamio OTA Vox is discontinued, you can still find it on sale. It’s not as fast as the Bolt but works in the same way. Try to get the lifetime option and you won’t have to pay ongoing fees. Read CNET’s review 38 The Tablo Quad is the latest version of the popular cord-cutting DVR and goes all-in on features. There’s room for an internal drive and the inclusion of four tuners should cater for even the most demanding users. It’s not the easiest device to setup though, and its device compatibility doesn’t live up to the same power-user expectations. AirTV: Best supplement for Sling TV Sarah Tew/CNET Best laptops for college students: We’ve got an affordable laptop for every student. Best live TV streaming services: Ditch your cable company but keep the live channels and DVR. $229 Types of OTA DVR: Set top vs. network streamer? Sarah Tew/CNET The are two main types of DVR: a traditional set top, which connects directly to a single TV via an HDMI output, or a network streamer, which connects to your home network and streams to your TVs (via streamer like a Roku or, in the case of Recast, Amazon Fire TV) and other devices (phones and tablets) in the home or on the go. The TiVo Bolt OTA is a traditional set-top (which also has in-home streaming) while the AirTV and Amazon Fire TV Recast are straight network streamers. A set-top is best for people who usually watch on one TV, while a network device is for people who want to watch on multiple devices — say a tablet, phone and a living room TV. In general a network streamer is the more flexible option, and can better complement live TV streaming apps or services like Netflix. Other features to look for Regardless of which style of DVR you choose, there are some features common to both that you should look for. Two or more HD tuners — When it comes to HD tuners, the more your device has the merrier. The bare minimum is two so you can record two channels at the same time, or watch one while you record another, but heavy antenna heads might appreciate even more. 1TB or more of storage — Depending on the device you have, a terabyte of storage space should offer about 150 hours of programs. But if you choose a device such as the TiVo which automatically records shows it “thinks you like,” you could run out very quickly. Which is why you also need… The ability to add extra storage via USB or SD card — An external hard drive is an excellent option, providing your DVR doesn’t need a proprietary model. Generally, a 1TB external hard drive is cheap at about 50 bucks. 02-amazon-fire-tv-recastA 14-day program guide is essential on a modern DVR. Sarah Tew/CNET 14 days of guide data — While seven days is really the minimum useful amount, two weeks gives you more flexibility. No ongoing fees — Most people cut the cord to save money, so paying yet another monthly fee doesn’t make a ton of sense. TiVo does offer a lifetime service option so you pay for the device and guide data upfront. DirecTV Now, Sling TV, YouTube TV, Hulu and more: Live TV channels compared: Here’s how the top 100 channels stack up.Amazon Fire TV Recast review: One of the best cord-cutter companions yet. See at TiVo Sarah Tew/CNET Is it a streamer or is it a DVR? While the Stream plus is not quite there yet, some upcoming improvements — the ability to watch a still-recording program from the start and a full 14-day guide — should make this little streaming box more attractive. Amazon Fire TV Recast: Best DVR for cord cutters 17 Photos Share your voice Review • Amazon Fire TV Recast review: One of the best cord-cutter companions yet See it The AirTV has its pluses, and it is the cheapest of the three, but it’s really designed to complement a Sling TV subscription by adding local channels. So that’s an extra $25 a month on top.When paired with a Sling TV subscription, the AirTV provides the local channels that the service lacks. While you can use it on its own without paying extra money per month, the Amazon Fire TV Recast offers a better overall experience. And you need to add an external hard drive (not included) to make the AirTV function as a true DVR. Read CNET’s review See at Amazon Amazon Fire TV Recast Read CNET’s review Channel Master Stream Plus See at Amazon See at Channel Master 2:14 Read CNET’s hands-on Read CNET’s review There are currently three standout products to consider when buying a cord cutting DVR: the Amazon Fire TV Recast, the AirTV and the TiVo Bolt OTA. Each has its own unique features and capabilities, but there’s one I’d recommend to beginners and old hands alike. Let’s dive in.Disclaimer: CNET may get a share of revenue from the sale of products featured on this page.My top three picks TiVo Bolt OTA: Best set-top DVR Dan Ackerman/CNET Comments Sarah Tew/CNET If you want a traditional set-top DVR, the TiVo Bolt OTA is your best option. While it’s pricier than the other products here (with service included), it also offers a ton of features including streaming apps, packaged with TiVo’s superb interface. While TiVo has the best name recognition of the three devices, the Bolt is not the “gotcha” you would expect from a company that basically invented the modern DVR. The Bolt relies a little too heavily on streaming apps and it’s twice as expensive — or more — than the other two.  See at Tablo Three more optionsNone of those top three appeal to you? I’ve also reviewed a trio of other OTA DVRs that I didn’t like as much. They still have appeal for certain users, however. If you live in an area with good access to TV broadcast channels, putting up an antenna is an easy and inexpensive (read: free) way to get the shows you want without paying for cable. And hooking a DVR to that antenna enables you to unlock the full potential of those broadcasts: saving them to watch later, skipping commercials and even, in some cases, streaming them to watch on multiple TVs or outside the home.The downside, of course, is that “free” turns into, well, not free, especially with DVRs that charge a monthly service fee. A bare-bones DVR like the Channel Master Stream Plus starts at about $150 while a TiVo with all the bells and whistles is about $500 after you pay the lifetime service fee. But compared to the cost of a live TV streaming services like DirecTV Now or YouTube TV, even the most expensive antenna DVR will pay for itself eventually. TiVo Roamio OTA Vox See at Amazon Preview • Amazon Fire TV Recast: The antenna DVR with Alexa starts at $230 10 old cables you should keep around (and 6 to toss) Cord Cutters (OTT) News • The Amazon Fire TV Recast DVR is back on sale for $190 TiVo Bolt OTA vs Amazon Fire TV Recast: which DVR should… Nuvyyo Tablo Quad: Best DVR for tweakers CNET may get a commission from retail offers. Tags The Amazon Fire TV Recast is my pick for most people looking to cut the cord.It’s not perfect — it really needs a Fire TV stick to work (and a Prime membership is also helpful) — but its combination of features and flexibility put it over the top. At $220-plus it’s not cheap, but at least it comes with an onboard hard drive. And there’s no monthly fee.While you’ll need a Fire TV Stick to watch on a TV, the lack of any ongoing fees makes the Recast very attractive. Amazon says it is also working to improve the visibility of live TV within its interface, which will make it even more easy to use. DVRslast_img read more

Tagged: , , , , , , , , , .

Law enforcement most corrupt sector TIB

Posted on by

first_imgLogo of TIBThe law enforcement agencies have been ranked the top corrupt sector among other public service offices in the country.The Transparency International Bangladesh revealed this picture of the corruption in its household survey tiled ‘Corruption in Service Sector: National Household Survey 2017’The TIB said this at a press conference at the MIDAS Centre in the capital on Thursday.According to the study, law enforcement agencies are followed by the passport office while Bangladesh Roads Transport Authority (BRTA) is ranked third in the corruption index. As many as 89 per cent people believe that none can avail services without bribes, said the study which was conducted in the year of 2017.The estimated amount bribes in 2016-17 fiscal was Tk 106.89 billion, which is 0.5 per cent of the Gross Domestic Product (GDP) and 3.4 per cent of the annual national budget.last_img read more

Tagged: , , , , , , , , , , , .

Civil society BNP Jamaat have no strength to defeat AL Joy

Posted on by

first_imgPrime minister Sheikh Hasina’s son and ICT affairs adviser Sajeeb Wazed Joy. Photo: BSSPrime minister Sheikh Hasina’s information and communication technology affairs adviser Sajeeb Wazed Joy on Saturday said people reaped the benefits of development as they voted for ‘Boat’, election symbol of ruling Bangladesh Awami League (AL).“The people witnessed massive development after voting for boat. On the contrary, when the BNP comes to power, they destroy the country,” he told a discussion at a hotel in the capital.Suchinta Foundation organised the discussion titled ‘21 August: Present-Future of Bangladesh’s Politics’ with its chairperson Mohammad A Arafat in the chair.Freedom fighter and cultural personality Nasiruddin Yusuf Bachchu, professor at Dhaka University (DU) Mesbah Kamal, freedom fighter Rokeya Kabir, late president Zillur Rahman’s daughter Tania Rahman, and journalist Mozammel Babu addressed the discussion, among others.Joy said AL has reached to its present stage braving all kinds of conspiracies. Civil society members, BNP and Jamaat have no strength to defeat the united Awami League, he added.“We can feel the pangs of sufferings for losing family members. I vowed to come to politics and oust the BNP government after the 21 August monstrous attack,” the PM advisor said.The then prime minister Begum Khaleda Zia was involved in the 21 August monstrous grenade attack, Joy said, adding it took 14 years to complete the trail of the heinous attack.Mainul Hosein, a former adviser to the past caretaker government, Dr Kamal Hossain and others were masterminds behind the 1/11, he said, adding, “Mainul Hosein helped Tarique Rahman, mastermind of the 21 August grenade attack, to flee from the country”.1/11 is the popular term in the country for indicating the changeover took place in January 2007, when military-backed caretaker government assumed power.Now they are trying to make Tarique the prime minister bringing him back home, he added.The AL does not do politics of killings like the BNP, Joy said, adding a total of 24 AL leaders and activists were killed in the 21 August grenade attack when leaders like Ahsanullah Master and Shah AMS Kibria were also killed during the BNP regime.“If BNP could have remained in the state power for 10 years like AL, no AL leader could have remained alive,” he said.Replying to BNP leaders’ allegation of arresting their leaders and activists, Joy said legal actions will be taken against those who killed people through arson attacks in 2013-14.Criticising the so-called civil society members, Joy said those who are ashamed of raising voice against killers and terrorists, they actually are trying to save the killers and terrorists.Talking about the newly-formed Jatiya Oikya Front, he said the Jatiya Oikya Front is trying to rehabilitate the BNP.Referring to different trials completed under the AL government, Joy said AL has established rule of law. And Tarique Rahman will be brought to book after extradition, he added.AL does not fear those who are not capable of securing a single vote in the election, he said, adding that AL does not care for the threats of so-called civil society members.Addressing the discussion, Tania Rahman said the main target of the 21 August grenade attack was to make the AL, which led the country’s liberation war, leaders less.The speakers said the 21 August attack and the 15 August incident of killing father of the nation Bangabandhu Sheikh Mujibur Rahman with his family member were tied in a same string.The purposes of the incidents were to kill the country’s liberal democratic politics and make the country a militant state, they added.last_img read more

Tagged: , , , , , , , , , , , .

Sri Lanka to change defence heads after attacks

Posted on by
first_imgSri Lanka`s president Maithripala Sirisena and prime minister Ranil Wickremesinghe look on during a parliament session marking the 70th anniversary of Sri LankaÕs Government, in Colombo, Sri Lanka on 3 October 2017. Reuters File PhotoSri Lanka president Maithripala Sirisena on Tuesday said he expects to change the heads of the country’s defence forces within a day following their failure to prevent suicide bombs that killed over 300 people, despite the fact they had prior information about the attacks.”I will completely restructure the police and security forces in the coming weeks. I expect to change the heads of defence establishments within next 24 hours,” Sirisena said a televised address to the nation.This handout photo taken and released by the Sri Lankan President`s Office on on 23 April 2019 shows president Maithripala Sirisena (2nd L) visiting St. Sebastian`s church in Negombo, two days after a series of bomb attacks targeting churches and luxury hotels in Sri Lanka. Photo: AFP”The security officials who got the intelligence report from a foreign nation did not share it with me. Appropriate actions would have been taken. I have decided to take stern action against these officials.”last_img
Tagged: , , , , , , , , , , , .

Dewang Agarwal of La Martiniere for Boys tops in ISC exam from

Posted on by

first_imgKolkata: Girls have performed better than boys in both ICSE and ISC examinations in Bengal in terms of the pass percentage. However, Dewang Kumar Agarwal of La Martiniere for Boys in Kolkata has bagged the first position in the country in ISC examinations by scoring 100 percent in the ISC examination.The pass percentage of girls in ICSE has been 98.38 while that of boys has been 97.39. In ISC, the pass percentage of girls is 98.05 while that of boys is 95.91. Anwesa Chattopadhyay of Garden High School, Avi Saraf of Frank Anthony Public School and Raj Ghosh of Purwanchal Vidyamandir in Kankurgachi all with 99.40 percent marks have topped the state in ICSE examinations and features second in the overall merit list in the country. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataChief Minister Mamata Banerjee has congratulated all the students who have excelled and those who passed the ICSE and ISC exams. “Good wishes to your parents and good luck for all your future endeavours,” Banerjee tweeted. Dewang wants to pursue Computer Science and would prefer to go to other states for future studies. “Teachers have been an integral part of my success and my parents have always been my greatest motivation,” he said. Apart from academics, Dewang loves swimming and reading. He had scored 98 percent in Class X at St. James School and switched over to La Martiniere. Four students from Bengal have bagged the second position in the ISC merit list with 98.75 percent. They are Khusi Daga of Our Lady Queen of The Missions School, Salt Lake, Debdut Mondal of K.E. Carmel School at Amtala, North 24-Parganas, Nirjhar Das of WWA Cossipore English School, Kolkata, and Dimitri Malik of Auxilium Convent School, Kolkata. Khusi Daga has topped the state in Commerce stream. “I had worked very hard and the support that I received from my school has been immense. I want to do MBA,” Khusi said. Also Read – Lightning kills 8, injures 16 in stateAnwesa Chattopadhyay said she would not pursue medical or engineering and would love to go for research in future. “There were no specific study hours for me but there has hardly been a day when I had not studied for an hour at least. Apart from studies, I love reading books, listening to music and I am a food lover too,” she added. Raj Ghosh, who has scored the same marks as Anwesa, wants to become a doctor. “I had expected 98 to 99 percent marks but 99.4 percent and first from the state has really made me very happy. I will study biology as I want to become a doctor and to be associated with AIIMS,” Raj said. His father Salil Ghosh is a state government employee. The total number of candidates who appeared from the state are 35769 in ICSE and 24791 in ISC. The overall pass percentage from the state is 97.82 and 96.88 in ICSE and ISC respectively.last_img read more

Tagged: , , , , , , , , , , , .

Keep your serverless AWS applications secure Tutorial

Posted on by

first_imgHandling security is an extensive and complex topic. If not done right, you open up your app to dangerous hacks and breaches. Even if everything is right, it may be hacked. So it’s important we understand common security mechanisms to avoid exposing websites to vulnerabilities and follow the recommended practices and methodologies that have been largely tested and proven to be robust. In this tutorial, we will learn how to secure serverless applications using AWS. Additionally, we will learn about the security basics and then move on to handle authorization and authentication using AWS. This article is an excerpt taken from the book, ‘Building Serverless Web Applications‘ wriiten by Diego Zanon. Security basics in AWS One of the mantras of security experts is this: don’t roll your own. It means you should never use in a production system any kind of crypto algorithm or security model that you developed by yourself. Always use solutions that have been highly used, tested, and recommended by trusted sources. Even experienced people may commit errors and expose a solution to attacks, especially in the cryptography field, which requires advanced math. However, when a proposed solution is analyzed and tested by a great number of specialists, errors are much less frequent. In the security world, there is a term called security through obscurity. It is defined as a security model where the implementation mechanism is not publicly known, so there is a belief that it is secure because no one has prior information about the flaws it has. It can be indeed secure, but if used as the only form of protection, it is considered as a poor security practice. If a hacker is persistent enough, he or she can discover flaws even without knowing the internal code. In this case, again, it’s better to use a highly tested algorithm than your own. Security through obscurity can be compared to someone trying to protect their own money by burying it in the backyard when the common security mechanism would be to put the money in a bank. The money can be safe while buried, but it will be protected only until someone finds about its existence and starts to look for it. Due to this reason, when dealing with security, we usually prefer to use open source algorithms and tools. Everyone can access and discover flaws in them, but there are also a great number of specialists that are involved in finding the vulnerabilities and fixing them. In this section, we will discuss other security concepts that everyone must know when building a system. Information security When dealing with security, there are some attributes that need to be considered. The most important ones are the following: Authentication: Confirm the user’s identity by validating that the user is who they claim to be Authorization: Decide whether the user is allowed to execute the requested action Confidentiality: Ensure that data can’t be understood by third-parties Integrity: Protect the message against undetectable modifications Non-repudiation: Ensure that someone can’t deny the authenticity of their own message Availability: Keep the system available when needed These terms will be better explained in the next sections. Authentication Authentication is the ability to confirm the user’s identity. It can be implemented by a login form where you request the user to type their username and password. If the hashed password matches what was previously saved in the database, you have enough proof that the user is who they claim to be. This model is good enough, at least for typical applications. You confirm the identity by requesting the user to provide what they know. Another kind of authentication is to request the user to provide what they have. It can be a physical device (like a dongle) or access to an e-mail account or phone number. However, you can’t ask the user to type their credentials for every request. As long as you authenticate it in the first request, you must create a security token that will be used in the subsequent requests. This token will be saved on the client side as a cookie and will be automatically sent to the server in all requests. On AWS, this token can be created using the Cognito service. How this is done will be described later in this chapter. Authorization When a request is received in the backend, we need to check if the user is allowed to execute the requested action. For example, if the user wants to checkout the order with ID 123, we need to make a query to the database to identify who is the owner of the order and compare if it is the same user. Another scenario is when we have multiple roles in an application and we need to restrict data access. For example, a system developed to manage school grades may be implemented with two roles, such as student and teacher. The teacher will access the system to insert or update grades, while the students will access the system to read those grades. In this case, the authentication system must restrict the actions insert and update for users that are part of the teachers group and users in the students group must be restricted to read their own grades. Most of the time, we handle authorization in our own backend, but some serverless services don’t require a backend and they are responsible by themselves to properly check the authorization. For example, in the next chapter, we are going to see how serverless notifications are implemented on AWS. When we use AWS IoT, if we want a private channel of communication between two users, we must give them access to one specific resource known by both and restrict access to other users to avoid the disclosure of private messages. Confidentiality Developing a website that uses HTTPS for all requests is the main drive to achieve confidentiality in the communication between the users and your site. As the data is encrypted, it’s very hard for malicious users to decrypt and understand its contents. Although there are some attacks that can intercept the communication and forge certificates (man-in-the-middle), those require the malicious user to have access to the machine or network of the victim user. From our side, adding HTTPS support is the best thing that we can do to minimize the chance of attacks. Integrity Integrity is related to confidentiality. While confidentiality relies on encrypting a message to prevent other users from accessing its contents, integrity deals with protecting the messages against modifications by encrypting messages with digital signatures (TLS certificates). Integrity is an important concept when designing low level network systems, but all that matters for us is adding HTTPS support. Non-repudiation Non-repudiation is a term that is often confused with authentication since both of them have the objective to prove who has sent the message. However, the main difference is that authentication is more interested in a technical view and the non-repudiation concept is interested in legal terms, liability, and auditing. When you have a login form with user and password input, you can authenticate the user who correctly knows the combination, but you can’t have 100% certain since the credentials can be correctly guessed or stolen by a third-party. On the other hand, if you have a stricter access mechanism, such as a biometric entry, you have more credibility. However, this is not perfect either. It’s just a better non-repudiation mechanism. Availability Availability is also a concept of interest in the information security field because availability is not restricted to how you provision your hardware to meet your user needs. Availability can suffer attacks and can suffer interruptions due to malicious users. There are attacks, such as Distributed Denial of Service (DDoS), that aim to create bottlenecks to disrupt site availability. In a DDoS attack, the targeted website is flooded with superfluous requests with the objective to overload the systems. This is usually accomplished by a controlled network of infected machines called a botnet. On AWS, all services run under the AWS Shield service, which was designed to protect against DDoS attacks with no additional charge. However, if you run a very large and important service, you may be a direct target of advanced and large DDoS attacks. In this case, there is a premium tier offered in the AWS Shield service to ensure your website’s availability even in worst case scenarios. This requires an investment of US$ 3,000 per month, and with this, you will have 24×7 support of a dedicated team and access to other tools for mitigation and analysis of DDoS attacks. Security on AWS We use AWS credentials, roles, and policies, but security on AWS is much more than handling authentication and authorization of users. This is what we will discuss in this section. Shared responsibility model Security on AWS is based on a shared responsibility model. While Amazon is responsible for keeping the infrastructure safe, the customers are responsible for patching security updates to software and protecting their own user accounts. AWS’s responsibilities include the following: Physical security of the hardware and facilities Infrastructure of networks, virtualization, and storage Availability of services respecting Service Level Agreements (SLAs) Security of managed services such as Lambda, RDS, DynamoDB, and others A customer’s responsibilities are as follows: Applying security patches to the operating system on EC2 machines Security of installed applications Avoiding disclosure of user credentials Correct configuration of access policies and roles Firewall configurations Network traffic protection (encrypting data to avoid disclosure of sensitive information) Encryption of server-side data and databases In the serverless model, we rely only on managed services. In this case, we don’t need to worry about applying security patches to the operating system or runtime, but we do need to worry about third-party libraries that our application depends on to execute. Also, of course, we need to worry about all the things that we need to configure (firewalls, user policies, and so on), the network traffic (supporting HTTPS) and how data is manipulated by the application. The Trusted Advisor tool AWS offers a tool named Trusted Advisor, which can be accessed through https://console.aws.amazon.com/trustedadvisor. It was created to offer help on how you can optimize costs or improve performance, but it also helps identify security breaches and common misconfigurations. It searches for unrestricted access to specific ports on your EC2 machines, if Multi-Factor Authentication is enabled on the root account and if IAM users were created in your account. You need to pay for AWS premium support to unlock other features, such as cost optimization advice. However, security checks are free. Pen testing A penetration test (or pen test) is a good practice that all big websites must perform periodically. Even if you have a good team of security experts, the usual recommendation is to hire a specialized third-party company to perform pen tests and to find vulnerabilities. This is because they will most likely have tools and procedures that your team may not have tried yet. However, the caveat here is that you can’t execute these tests without contacting AWS first. To respect their user terms, you can only try to find breaches on your own account and assets, in scheduled time frames (so they can disable their intrusion detection systems for your assets), and only on restricted services, such as EC2 instances and RDS. AWS CloudTrail AWS CloudTrail is a service that was designed to record all AWS API calls that are executed on your account. The output of this service is a set of log files that register the API caller, the date/time, the source IP address of the caller, the request parameters, and the response elements that were returned. This kind of service is pretty important for security analysis, in case there are data breaches, and for systems that need the auditing mechanism for compliance standards. MFA Multi-Factor Authentication (MFA) is an extra security layer that everyone must add to their AWS root account to protect against unauthorized access. Besides knowing the user and password, a malicious user would also need physical access to your smartphone or security token, which greatly restricts the risks. On AWS, you can use MFA through the following means: Virtual devices: Application installed on Android, iPhone, or Windows phones Physical devices: Six-digit tokens or OTP cards SMS: Messages received on your phone We have discussed the basic security concepts and how to apply them on a serverless project. If you’ve enjoyed reading this article, do check out ‘Building Serverless Web Applications‘ to implement signup, sign in, and log out features using Amazon Cognito. Read Next: Google Compute Engine Plugin makes it easy to use Jenkins on Google Cloud Platform Analyzing CloudTrail Logs using Amazon Elasticsearch How to create your own AWS CloudTraillast_img read more

Tagged: , , , , , , , .