<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>What-is | Sajid Rahman</title>
    <link>https://www.cise.ufl.edu/~msr/category/what-is/</link>
      <atom:link href="https://www.cise.ufl.edu/~msr/category/what-is/index.xml" rel="self" type="application/rss+xml" />
    <description>What-is</description>
    <generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><copyright>© 2021 - Sajid Rahman</copyright><lastBuildDate>Fri, 27 Aug 2021 00:00:00 +0000</lastBuildDate>
    <image>
      <url>https://www.cise.ufl.edu/~msr/media/icon_hu257dded1a2315d693952aa7ac83b6d59_5868_512x512_fill_lanczos_center_3.png</url>
      <title>What-is</title>
      <link>https://www.cise.ufl.edu/~msr/category/what-is/</link>
    </image>
    
    <item>
      <title>Refresher of Security Taxonomy</title>
      <link>https://www.cise.ufl.edu/~msr/post/security-taxonomy/</link>
      <pubDate>Fri, 27 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://www.cise.ufl.edu/~msr/post/security-taxonomy/</guid>
      <description>&lt;p&gt;A list of basic terminologies frequently used with security &amp;amp; privacy related discussions/articles/research papers&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Principal&lt;/strong&gt; : A legitimate actor of any system.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Credential(s)&lt;/strong&gt; : An artifact(s) to provide identity.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt; : The process through which an identity is associated with some principal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Authorization&lt;/strong&gt; : A set of rights/permissions which a principal possesses.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Threat&lt;/strong&gt; : A specific means by which an attacker can put a system at risk.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Threat model&lt;/strong&gt; : A collection of threats that is deemed important for a particular environment. It can also be thought as a collection of attacker(s) abilities.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability&lt;/strong&gt; : A systematic artifact that exposes the user, data, or system to a &lt;em&gt;threat&lt;/em&gt;. Vulnerabilities are also known as &lt;em&gt;attack vectors&lt;/em&gt; which an adversary (bad guy(s)) use to compromise a system. Common sources of vulnerability could be bad software/hardware design, bad policy/configuration, system misuse etc.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Attack&lt;/strong&gt; : An occurrence where a vulnerability is exploited by an adversary. When an attack is successful, we call it as a &lt;em&gt;compromise&lt;/em&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Risk&lt;/strong&gt; = &lt;em&gt;Threat (Actors)&lt;/em&gt; + Vulnerability + Asset(s)&lt;/p&gt;
&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;explaining risk&#34; srcset=&#34;
               /~msr/post/security-taxonomy/explaining-risk_huc33d0e1e6778784054011d24a6c8c23d_24978_c771c544a405854f0570272a1c9ee2bf.webp 400w,
               /~msr/post/security-taxonomy/explaining-risk_huc33d0e1e6778784054011d24a6c8c23d_24978_01b741721720829fa793ccfdba9d8f70.webp 760w,
               /~msr/post/security-taxonomy/explaining-risk_huc33d0e1e6778784054011d24a6c8c23d_24978_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/security-taxonomy/explaining-risk_huc33d0e1e6778784054011d24a6c8c23d_24978_c771c544a405854f0570272a1c9ee2bf.webp&#34;
               width=&#34;576&#34;
               height=&#34;181&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Trust&lt;/strong&gt; : An expectation from a principal to act in an anticipated manner.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Trust model&lt;/strong&gt; : An explicit assessment of the trust embodied in a system.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security model&lt;/strong&gt; : A combination of a trust and threat models that address the set of perceived risks along with security requirements.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://securitytoday.com/articles/2014/05/23/what-everyone-should-know-about-privacy-security-and-confidentiality.aspx&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Confidentiality vs Privacy&lt;/a&gt;: Privacy applies to the person while confidentiality applies to the data (&lt;a href=&#34;https://research.uci.edu/compliance/human-research-protections/docs/privacy-confidentiality-hrp.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;more here&lt;/a&gt;).&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
</description>
    </item>
    
    <item>
      <title>The Heilmeier Catechism (or what to include in a killer proposal)</title>
      <link>https://www.cise.ufl.edu/~msr/post/heilmeier-catechism-for-killer-proposal/</link>
      <pubDate>Sun, 13 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://www.cise.ufl.edu/~msr/post/heilmeier-catechism-for-killer-proposal/</guid>
      <description>&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;The Heilmeier Catechism&#34; srcset=&#34;
               /~msr/post/heilmeier-catechism-for-killer-proposal/Heilmeiers_Catechism_hu52c0b3c46cf8a977302c35731f20a0e3_142217_1e3964e951fb92c1db226d71f8e5b7f3.webp 400w,
               /~msr/post/heilmeier-catechism-for-killer-proposal/Heilmeiers_Catechism_hu52c0b3c46cf8a977302c35731f20a0e3_142217_551a3613613a9ddb246f2341a04648df.webp 760w,
               /~msr/post/heilmeier-catechism-for-killer-proposal/Heilmeiers_Catechism_hu52c0b3c46cf8a977302c35731f20a0e3_142217_1200x1200_fit_q75_h2_lanczos.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/heilmeier-catechism-for-killer-proposal/Heilmeiers_Catechism_hu52c0b3c46cf8a977302c35731f20a0e3_142217_1e3964e951fb92c1db226d71f8e5b7f3.webp&#34;
               width=&#34;760&#34;
               height=&#34;570&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;To read more:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.darpa.mil/work-with-us/heilmeier-catechism&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;The Heilmeier Catechism&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ifm.eng.cam.ac.uk/research/grant-writers-handbook/drafting-the-proposal/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Image credit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
    <item>
      <title>What is Bootstrapping in Statistics</title>
      <link>https://www.cise.ufl.edu/~msr/post/bootstrapping-in-statistics/</link>
      <pubDate>Sun, 13 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://www.cise.ufl.edu/~msr/post/bootstrapping-in-statistics/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;Let&amp;rsquo;s see what is &lt;em&gt;re-sample&lt;/em&gt;
















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Bootstrapping in Statistics-1&#34; srcset=&#34;
               /~msr/post/bootstrapping-in-statistics/bootstrap-1_hu51f3fedcc013c3e8aa1acd01819ffa6b_174890_e006219fbb9d0c415954f5513c437fad.webp 400w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-1_hu51f3fedcc013c3e8aa1acd01819ffa6b_174890_d0f4054608dfa62b11407e1ffcee8dd8.webp 760w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-1_hu51f3fedcc013c3e8aa1acd01819ffa6b_174890_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/bootstrapping-in-statistics/bootstrap-1_hu51f3fedcc013c3e8aa1acd01819ffa6b_174890_e006219fbb9d0c415954f5513c437fad.webp&#34;
               width=&#34;760&#34;
               height=&#34;571&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;Now let&amp;rsquo;s check the idea behind &lt;em&gt;sampling distribution&lt;/em&gt;
















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Bootstrapping in Statistics-2&#34; srcset=&#34;
               /~msr/post/bootstrapping-in-statistics/bootstrap-2_hue2c80fa905692d6c36714c8c18703408_125053_cb365301bf83e2cbe80d5a57c1755075.webp 400w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-2_hue2c80fa905692d6c36714c8c18703408_125053_01c767297a9aa990243c6b886a921efa.webp 760w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-2_hue2c80fa905692d6c36714c8c18703408_125053_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/bootstrapping-in-statistics/bootstrap-2_hue2c80fa905692d6c36714c8c18703408_125053_cb365301bf83e2cbe80d5a57c1755075.webp&#34;
               width=&#34;760&#34;
               height=&#34;574&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;Briefly the theory of &lt;em&gt;sampling distribution&lt;/em&gt;
















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Bootstrapping in Statistics-3&#34; srcset=&#34;
               /~msr/post/bootstrapping-in-statistics/bootstrap-3_huc2bbba28649b0547b289b6cc5fc2a783_145844_40a0a0b1d95fdd0716bab4385866f6e0.webp 400w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-3_huc2bbba28649b0547b289b6cc5fc2a783_145844_de1bbfa1f5c18e462a0cb7d4c3e106a8.webp 760w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-3_huc2bbba28649b0547b289b6cc5fc2a783_145844_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/bootstrapping-in-statistics/bootstrap-3_huc2bbba28649b0547b289b6cc5fc2a783_145844_40a0a0b1d95fdd0716bab4385866f6e0.webp&#34;
               width=&#34;760&#34;
               height=&#34;572&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;Finally, here comes the idea of &lt;em&gt;bootstrapping&lt;/em&gt;
















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Bootstrapping in Statistics-4&#34; srcset=&#34;
               /~msr/post/bootstrapping-in-statistics/bootstrap-4_hufb7fdc8bfb487c27e7857456b6d842a9_140838_c646a8ca8ab3194f32a2a80bc23c05fd.webp 400w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-4_hufb7fdc8bfb487c27e7857456b6d842a9_140838_519bc50bd30b73bbb0bc3509427de84e.webp 760w,
               /~msr/post/bootstrapping-in-statistics/bootstrap-4_hufb7fdc8bfb487c27e7857456b6d842a9_140838_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/bootstrapping-in-statistics/bootstrap-4_hufb7fdc8bfb487c27e7857456b6d842a9_140838_c646a8ca8ab3194f32a2a80bc23c05fd.webp&#34;
               width=&#34;760&#34;
               height=&#34;572&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Slide Credit:&lt;/strong&gt; &lt;a href=&#34;https://www.slideshare.net/smackinnon/introduction-to-mediation&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.slideshare.net/smackinnon/introduction-to-mediation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s another nice discussion on boottsrapping &lt;a href=&#34;https://www.iwh.on.ca/what-researchers-mean-by/bootstrapping&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.iwh.on.ca/what-researchers-mean-by/bootstrapping&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>What&#39;s the Difference between a Hypothesis and a Research question?</title>
      <link>https://www.cise.ufl.edu/~msr/post/hypothesis-vs-research-question/</link>
      <pubDate>Sun, 13 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://www.cise.ufl.edu/~msr/post/hypothesis-vs-research-question/</guid>
      <description>&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Hypothesis vs Research Questions&#34; srcset=&#34;
               /~msr/post/hypothesis-vs-research-question/hypo-question_hu20a66c6de00715181565c2acc64568fa_367982_95f159ad1da6e5ff5c9a9b18142f53c8.webp 400w,
               /~msr/post/hypothesis-vs-research-question/hypo-question_hu20a66c6de00715181565c2acc64568fa_367982_d3cade24968a8d5cad432050036676d2.webp 760w,
               /~msr/post/hypothesis-vs-research-question/hypo-question_hu20a66c6de00715181565c2acc64568fa_367982_1200x1200_fit_q75_h2_lanczos_3.webp 1200w&#34;
               src=&#34;https://www.cise.ufl.edu/~msr/~msr/post/hypothesis-vs-research-question/hypo-question_hu20a66c6de00715181565c2acc64568fa_367982_95f159ad1da6e5ff5c9a9b18142f53c8.webp&#34;
               width=&#34;400&#34;
               height=&#34;760&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;To read more:
&lt;a href=&#34;https://cirt.gcu.edu/research/developmentresources/research_ready/quantresearch/question_hypoth&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Research Questions and Hypotheses&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
