Blockchain Architecture. There are two main types of blockchains- permissionless and permissioned. The choice of which one to use has implications for security, performance, and governance.
Blockchain Architecture. The following system performance requirements are made: Requirement 16 The Blockchain shall implement a permissioned system.
Blockchain Architecture. Designed a novel blockchain architecture for use in general applications. The architecture was designed to be highly module and easy for a user to implement. Implemented our novel architecture to show the efficacy of our architecture. • A Deep Learning Approach to Malware Detection - Created over 20 deep learning models to analyze Portable Executable Files and classify them as malicious or benign. Compared the various architectures to find the most efficient and most accurate model, and then looked at the information measure of each model to validate of our findings. DocuSign Envelope ID: 8FD481CF-7668-4B5D-BF6C-ACC98E732AE5 XXXXXX XXXXXX Consultant, Information Security Consulting Services xxxxxxx@xxxxxxxxxx.xxx (000)000-0000 EDUCATION Bachelor’s degree in Technology, Computer Science and Engineering - Specialization in Information Security, Vellore Institute of Technology Master’s degree in Information Technology – Information Security – Applied Advanced Study, Carnegie Mellon University Summary Xxxxxx Xxxxxx is a Consultant, Information Security Services, for ERMProtect. He performs risk assessments, data compliance assessments, and penetration testing for the company. Xxxxxx received his master’s degree in information technology from the prestigious Carnegie Mellon University, where he underwent advanced training in code reviews, digital forensics, and vulnerability assessments for mobile applications. He is experienced in web development, image processing, and machine learning as a software developer. He graduated from Carnegie Mellon with a 3.6 GPA, and during his time at Carnegie, worked as an intern at various startups such as Xxxxxx.xx and TreeMama Organization as a web developer and an information security analyst. At ERMProtect, in addition to providing a wide variety of IT security services to clients, he is also pursuing certifications in digital forensics and cryptocurrency tracing to further enhance his cybersecurity investigation skills. Relevant Experience • Risk Assessments – Conducted risk assessments such as GLBA, FACTA for multiple clients. Participated in various vulnerability assessments and penetration tests conducted by ERMProtect. Discovered and proved the lack of security awareness among the non-technical employees of a client’s staff, paving the way for training that prevented significant potential monetary losses to the client.
Blockchain Architecture. At a high level, Blockchains utilize well-known computer science mechanisms (linked lists, distributed networking) as well as cryptographic primitives (hashing, digital signatures, public/private keys) mixed with financial concepts (such as ledgers). Blockchain usually comprises of following components: