Skip to content

Commit

Permalink
updated docs
Browse files Browse the repository at this point in the history
  • Loading branch information
deepaksood619 committed Sep 23, 2024
1 parent e064bf0 commit 46f2034
Show file tree
Hide file tree
Showing 32 changed files with 472 additions and 269 deletions.
2 changes: 1 addition & 1 deletion docs/about-me/projects/80-stashfin.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Product

[NBFC / Banking Terms](economics/nbfc-banking-terms.md)
[NBFC / Banking Terms](economics/fintech-nbfc-banking-terms.md)

![stashfin-product-architecture](../../media/Pasted%20image%2020231201172554.png)

Expand Down
1 change: 1 addition & 0 deletions docs/book-summaries/others.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@
- [SURROUNDED BY IDIOTS by Thomas Erikson | Core Message - YouTube](https://www.youtube.com/watch?v=kkATORyBsug&ab_channel=ProductivityGame)
- [THE 6 TYPES OF WORKING GENIUS by Patrick Lencioni | Core Message - YouTube](https://www.youtube.com/watch?v=N4I4hA6u6CM)
- [LEADERSHIP STRATEGY and TACTICS by Jocko Willink | Core Message - YouTube](https://www.youtube.com/watch?v=ol6UYlOPWWo&ab_channel=ProductivityGame)
- [A book to build your first business | 12 MONTHS TO $1 MILLION | Core Message - YouTube](https://www.youtube.com/watch?v=nfhxEF7DgU4&ab_channel=ProductivityGame)

### [Learn to lead: THE 21 IRREFUTABLE LAWS OF LEADERSHIP by John Maxwell | Core Message - YouTube](https://www.youtube.com/watch?v=QQhdiktL99w)

Expand Down
40 changes: 40 additions & 0 deletions docs/cloud/aws/compute/aws-lambda.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,3 +64,43 @@ def lambda_handler(event, context):
- Lambda becomes more expensive than EC2 Spot Instance (including EBS) when the Lambda workload increases (8 requests per hour).

[Lambda vs EC2 cost - AWS Pricing Calculator](https://calculator.aws/#/estimate?id=aaae8951c6dbd405046d9682f381355fe1d1fe10)

## Working

![What makes aws lambda fast](../../../media/Pasted%20image%2020240924013035.jpg)

### What makes AWS Lambda so fast?

There are 4 main pillars:

### 1 - Function Invocation

AWS Lambda supports synchronous and asynchronous invocation.

In synchronous invocation, the caller directly calls the Lambda function using AWS CLI, SDK, or other services.

In asynchronous invocation, the caller doesn’t wait for the function’s response. The request is authorized and an event is placed in an internal SQS queue. Pollers read messages from the queue and send them for processing.

### 2 - Assignment Service

The Assignment Service manages the execution environments.

The service is written in Rust for high performance and is divided into multiple partitions with a leader-follower approach for high availability.

The state of execution environments is written to an external journal log.

### 3 - Firecracker MicroVM

Firecracker is a lightweight virtual machine manager designed for running serverless workloads such as AWS Lambda and AWS Fargate.

It uses Linux’s Kernel-based virtual machine to create and manage secure, fast-booting microVMs.

### 4 - Component Storage

AWS Lambda also has to manage the state consisting of input data and function code.

To make it efficient, it uses multiple techniques:

- Chunking to store the container images more efficiently.
- Using convergent encryption to secure the shared data. This involves appending additional data to the chunk to compute a more robust hash.
- SnapStart feature to reduce cold start latency by pre-initializing the execution environment
1 change: 1 addition & 0 deletions docs/computer-science/interview-question/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@
- [System Design - Autocomplete or Typeahead](system-design-autocomplete-or-typeahead)
- [System Design - What happens when you type google.com into your browser's address box and press enter?](computer-science/interview-question/system-design-google-com-into-browser-press-enter.md)
- [System Design - Google Search](system-design-google-search)
- [System Design - YouTube](computer-science/interview-question/system-design-youtube.md)
- [System Design - MMOG - Game](system-design-mmog-game)
- [Google Crawlers / Crawling](frontend/frontend-intro/google-crawlers-crawling.md)
- [System Design - Others](system-design-others)
Expand Down
14 changes: 14 additions & 0 deletions docs/computer-science/interview-question/system-design-youtube.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# System Design of YouTube

![System Design of YouTube](../../media/Pasted%20image%2020240921221234.png)

1. The user creates a video upload request and provides the video files along with the details about the video.
2. The raw video files are uploaded to an Object Storage (such as S3).
3. Also, the metadata is saved in a database as well as a cache for faster retrieval when needed.
4. The raw video files are sent for transcoding to a special transcoding server. Transcoding is the process of encoding the videos into compatible bitrates and formats for streaming.
5. The transcoded video is uploaded to another object storage.
6. The notification for transcoding completion is sent to a special service via a message queue.
7. The Transcoding Status Handler updates the metadata DB and cache with the latest details of the video.
8. The user raises a video streaming request that goes to a Content Delivery Network (CDN).
9. The CDN fetches the video from the object storage for streaming. It also caches the video locally for subsequent streaming requests.

Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,28 @@ Amazon Fraud Detector is a fully managed service that makes it easy to identify

![Amazon Fraud Detector](../../media/Pasted%20image%2020240916160527.png)

1. Step 1 - Explore data models for your business use case.
2. Step 2 - Define the event you want to evaluate for fraud.
3. Step 3 - Upload your historical event dataset to Amazon S3 or stream and store your event data directly in AFD.
4. Step 4 - Select a model type and train your model. The service automatically inspects and enriches data, performs feature engineering, selects algorithms, trains and tunes your model, and hosts the model.
5. Step 5 - Create rules to either accept, review, or collect more information based on model predictions.
6. Step 6 - Call the Amazon Fraud Detector API from your online application to receive real-time fraud predictions and take action based on your configured detection rules.

### Models

- Transaction Fraud Insights
- Online Fraud Insights
- Account Takeover Insights

### Links

- [What is Amazon Fraud Detector? - Amazon Fraud Detector](https://docs.aws.amazon.com/frauddetector/latest/ug/what-is-frauddetector.html)
- [Amazon Fraud Detector features](https://aws.amazon.com/fraud-detector/features/)
- [Amazon Fraud Detector pricing](https://aws.amazon.com/fraud-detector/pricing/)
- [Amazon Fraud Detector FAQs](https://aws.amazon.com/fraud-detector/faqs/)
- [Github Sample Datasets](https://github.com/aws-samples/aws-fraud-detector-samples/tree/master/data)
- [Get and upload example dataset - Amazon Fraud Detector](https://docs.aws.amazon.com/frauddetector/latest/ug/step-1-get-s3-data.html)

## Fraud Detection using Amazon Sagemaker

## Links
Expand Down
25 changes: 25 additions & 0 deletions docs/courses/course-credit-risk-modeling/fraud-types.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# Fraud Types

## Financial Frauds

| Type | Description |
| -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Document Fraud (First party)** | This classifies under first party fraud where applicant commits fraud in his own name. Applicant provides an altered / fabricated document which does not match the real document at the time of verification with data source. Usually done for National IDs like PAN, Voter ID, etc. However it can be applicable to other types of documents as well which are submitted at the time of loan application. |
| **Identity Fraud (Third party)** | This classifies under third party fraud where applicant commits it in the name of another person (victim). Applicant deliberately uses personal information of another person without any approval, for the sole purpose of performing a fraud. Hence, the 3rd party here becomes the victim. |
| **Synthetic Identity Fraud** | It is created by using a combination of real and fabricated credentials leading to a fictitious entity that is not associated with an actual / real person. E.g., using A's PAN with B's address or a fictitious address altogether. |
| **Financial Fraud** | Cases where financial crimes have been committed like Cheque fraud, manipulation of bank statements, false financial statements, chargeback fraud, etc. |
| **Employment Related Fraud** | Instances of misrepresentation of information / documents on account of education, personal background or professional history. E.g., salary slip / employment letter tampering. This can be clubbed under Document Fraud if not a significant category. |
| **Non-starter fraud** | Cases where post loan disbursal the borrower does not repay starting from the first installment itself. It then clearly shows his fraudulent intention. Also known as never payment fraud, lenders can start tagging borrowers under this category once DPD has reached 90 days - as a uniform definition to classify. This is different from delinquency since it is linked to non-payment from inception of the loan and not midway in the lifecycle. |
| **First-party application fraud** | A consumer refuses to repay legitimate debts and/or falsely claims to be a victim of identity fraud to evade the obligation |
| **Account takeover** | Someone other than the owner uses an account without permission |

## Other Frauds

| Type | Description |
| -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **New account** | Accurately distinguish between legitimate and high-risk customer account registrations so you can selectively introduce additional steps or checks based on risk. For example, you can setup your customer account registration workflow to require additional email and phone verification steps only for account registrations that exhibit high risk characteristics. |
| **Online payment** | Reduce online payment fraud by flagging suspicious online payment transactions before processing payments and fulfilling orders. With Amazon Fraud Detector, you can setup your checkout flow to evaluate new orders and flag suspicious ones for review prior to processing payments. |
| **Guest checkout** | Spot potential fraudsters among customers without transaction histories. With Amazon Fraud Detector, you can send as little as two pieces of data from a guest checkout order (e.g., email, IP address) to assess its potential fraud risk, so you can decide whether to accept it, review it, or collect more customer details. |
| **Online service and loyalty program abuse** | Identify accounts that are more likely to abuse online services such as loyalty or ‘Try Before You Buy’ programs that ship goods for customers to try before sending payment. With Amazon Fraud Detector, online businesses can assess the risk of customers abusing programs, for example by stealing merchandise or engaging in returns abuse, so businesses can limit their risks by applying appropriate limits on the value of goods or services provided. |
| **Account takeover** | Identify fraudulent online activity by detecting accounts that were compromised through malicious takeovers, phishing, or from credentials being stolen. With Amazon Fraud Detector, you can improve account takeover detection by observing behavior patterns and treating anomalous user login activity as more risky, while minimizing the level of friction for legitimate users. Based on outcomes you receive, you can take appropriate actions on each login, for example challenge only the highest-risk authentication attempts. |
| **Product review** | Safely automate whether to approve or block review submissions. With Amazon Fraud Detector, you can reduce the number of review submissions sent to moderation queues, while reducing fraud and spam and adding friction for risky review submissions. |
Loading

0 comments on commit 46f2034

Please sign in to comment.