Elections Analyzer 2018 – Week 5 Premortem

--Originally published at Blog | Cesar Arturo Gonzalez

Ok, last week wasn’t a very productive week so this week we will focus all our energy in finishing a real working data mining demo with a cron job running in the background to extract the tweets from the table and demo the process to get the sentiment analysis. This week will be important for …

Elections Analyzer 2018 – Week 4 Premortem

--Originally published at Blog | Cesar Arturo Gonzalez

This week I’m motivated to finish the connection to the database to create the raw_tweet implementation and begin analyzing this raw_tweet. I think this week is just continue to implement the same things that last week before the presentation, so in this blog post I’m gonna introduce you to our team.

Elections Analyzer 2018 – Week 3 Postmortem

--Originally published at Blog | Cesar Arturo Gonzalez

This week we worked on getting all together for the presentation with the teacher. Mike developed a basic database connection that allowed us to get the tweets Alex and I were mining and store it in a MySQL table that will be the bridge to analyze stuff later on and clear the information, do the …

Elections Analyzer 2018 – Week 3 Premortem

--Originally published at Blog | Cesar Arturo Gonzalez

The weekend I worked on the Makefile of the project so everybody can install dependencies and the devOps work is fully done with space for test, install and run the project in developer mode and in production. This was hard for me because I needed to be sure that it worked in both Unix and …

Risk Management Framework

--Originally published at Blog | Cesar Arturo Gonzalez

Risk Management Framework provides an structured process that integrates information security and risk management activities into the system development steps.   Categorize: The information system and the information already processed or stored by the system needs to be categorized based on the impact analysis. Select: We need to choose security controls for the data and information based on the categorization …

Security Architecture and Policies

--Originally published at Blog | Cesar Arturo Gonzalez

Security Architecture In order to have good secure bases for our system the first thing we need to do in the planning process is defining a security architecture. To define this you need to think about the potential risks that the system may have establishing the different scenarios from the beginning of the planning stages. …

Cryptography and Network Security

--Originally published at Blog | Cesar Arturo Gonzalez

What is Cryptography? Crypto == “hidden or secret” Graphy == “study of writing” So with this breakdown of words we can conclude that cryptography is the study of writing something hidden or secret. Cryptography has been around for centuries with the creation of the Caesars cipher created by Julius Caesar. Before modern times cryptography was used …

Web Security

--Originally published at Blog | Cesar Arturo Gonzalez

IF Security == “The state of being protected or safe from harm”. THEN Web Security == “Keep a web server and its applications protected or safe from harm”. A web server is always vulnerable to all sort of attacks because it is out there on the internet. If you don’t follow any security standards or …

Security for Operating Systems

--Originally published at Blog | Cesar Arturo Gonzalez

An operating system or OS is a software that enables the connection of the hardware with the software. If the OS didn’t exists there won’t be any programs like the ones we have today, and if they were, they will be hard to code and install. Because this software controls the interaction of the user with the hardware is …