Information Technology Exam 2
changing cyber security threat landscape
- 0 day vulnerabilities and hacking are still active but not as prevalent - they have been replaced by a cheaper more effective way of attack (humans) - humans are the new attack factor
approaches SDLC
- 4 stage model - 7 stage model - DevOps is a natural extension of agile methodologies. It continues the integration of analysis, design, and development to incorporate the integrated continuous release of software.
development roles/ jobs
- BusinessAnalyst - SystemsAnalyst - Project Manager - Software Developer
other technology that supports blockchain???
- Cryptographic keys. - A peer-to-peer network containing a shared ledger. - A means of computing, to store the transactions and records of the network.
software developer duties and responsibilities
- Develop and test software to meet consumers' and clients' needs. - Recommend and develop upgrades for existing applications. - Create models and diagrams to show programmers the code needed for applications. - Monitor quality and performance of applications through testing and maintenance. - Document all work for future reference.
impact of smartphones in our lives
- Not only do our phones shape our thoughts in deep and complicated ways, but the effects persist even when we aren't using the devices. As the brain grows dependent on the technology, the research suggests, the intellect weakens - If you are like the typical owner, you'll be pulling your phone out and using it some 80 times a day. That means you'll be consulting the glossy little rectangle nearly 30,000 times over the coming year. - But while our phones offer convenience and diversion, they also breed anxiety.
strong AI
- The work aimed at genuinely simulating human reasoning - result to be not only to build systems that think but also explain how humans think which is hard to do - we have yet to see real model of strong AI
main aims of cyber attacks
- accessing changing or destroying sensitive information - extorting money from users - interrupting normal business processes
weak AI
- aimed at just getting systems to work - while we might be able to get systems to behave like humans, the results will tell us nothing about what humans think - ex; IBM Deep Blue
SDLC stages (6 stage model)
- analysis - planning - design - development - testing - deployment
Implications of blockchain buyers, sellers, and the middleman
- before blockchain buying and selling required intermediary but blockchain replaces this central system with a decentralized ledger of chain records - because of blockchain there is not really a need for a middle man
types of bias problems in AI
- bias built into data - AI induced bias - teaching AI human rules - evaluating cases of suspected AI bias
how does blockchain technology work
- blockchain is designed to store info in a way that makes it almost impossible to add remove or change without being detected - Blocks- where record are combined with other transactions into a block like a traditional computer database each transaction is time stamped; when a block is complete it gets its own time stamp; so all info is sequential which helps avoid duplicate entries; completed block is sent out across the network and put into a chain - Hash- cryptographic math that makes the links between blocks virtually unbreakable; hash function takes the information in each block and uses it to create the hash—a unique string of characters; the hash from one block is added to the data in the next block so when the next block goes through the hash function, a trace of it is woven into the new hash; if there is any attempt to alter a previously created block the hash that's encoded in the next block wont math up anymore
challenges SDLC
- difficulty of determining requirements - changes in requirements - difficulties involving scheduling and budgeting - changing technology - diseconomies. of sales
security, password, and cyber defense best practices and tactics
- don't click - seriously stop clicking - use strong passwords - don't reuse passwords - stop using passwords - patch yourself
SDLC best practices
- identify current problems - plan - design - build - code test - software development - software maintenance
categories of ethical dilemmas faced in IT
- integrity - competence - professional responsibilities - work responsibilities - societal responsibilities
what is ML
- machine learning - allows machines to learn from data and mimic some of the things humans can do - machines have to learn form large collections of past data to be accurate - almost 1 in every 2 jobs could be automated by machines
human beings vs AI: tasks, jobs, implications
- machines will be more accurate so less error and more efficient - machines can't interact with people and think things that a human does though
risks SDLC
- many projects never finish - often 200 to 300 percent over budget - some don't accomplish goals - some completed months or years behind schedule - high risk of failure
Various uses of blockchain technology???
- no single person or group has control - recording transactions - tracking digital assets - contracts - supply chain info - health care - digital ID - trusted concert tickets - more efficient markets
cyber security statistics
- only 50% of cyber attacks are successful (within the first hour) - 90% of cyber attacks are caused by human behavior - it takes 1 person to fall victim of cyber attack to be considered a success - estimated cost of the average data breach rose to 3.79m in 2015 which is 23% growth in past two years alone
where blockchain came from and where it was first used
- originally developed as part of digital currency in bitcoin
parts of a successful cyber security approach
- people - processes - technology
cyber security
- practice of protecting systems network and programs from digital attacks
system/ software development
- process of creating and maintaining information systems - goal is lower cost and improve quality of software development - create software that enables users to perform specific tasks on computer devices - Software developers are the creative minds behind software programs, and they have the technical skills to build those programs or to oversee their creation by a team. They create software that enables users to perform specific tasks on computer devices.
key findings of how smartphones hijack our minds
- provides many distractions that impedes reasoning and performance - 2015 research found that when someones phone buzzes during a challenging task whether they check it or not their work gets sloppier - another 2015 study found that when their phone rings and they can't answer it right away their blood pressure spikes, their pulse quickens, and ability to solve problems declines - test taking study found that students whose phone was in view did significantly worse than those whose phones were in a different room - worse at social skills with smartphones - do better in class without phone
how to improve your relationship with mobile technology
- reframe the way you think about it - ask yourself what you want to pay attention to - set yourself up for success - create speed bumps pay attention to your body - practice trial separations - use technology to protect yourself from technology (time tracking apps) - use sight of other people on their phones as a reminder - get existential about it (this is your life hoe much of it do you want to spend on your phone)
SDLC
- software development life cycle - a methodology with clearly defined processes for creating high-quality software - process that produces software with the highest quality and lowest cost in the shortest time possible
SDLC stages (4 stage model)
- systems planning and selection - systems analysis - systems design - systems implementation and operation
wholistic approach to cyber security
- towering above all the tools is training, awareness and education
what are the ways in which emerging technologies are redefining mobile
- voice - immersive realities - facial recognition - artificial intelligence
development methodologies SDLC
- waterfall model - agile model - iterative model - v shaped model - Big Bang model - spiral model
programmer
A person who can design, create, and test computer programs
data analytics
IoT is significant driver of big data analytics because it allows companies to create vast data sets and analyze them; giving companies large amounts of data about how its components behave it will allow them to make improvements more rapidly
fair use
a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases; it can be challenged by copyright owners because the rules aren't well defined; ex could be a teacher could hand out copies of copyrighted story to class to teach them about an event
Ethics definition
a set of moral principles; principles of conduct that govern individuals or groups
high level language
allows simple creation of powerful and complex programs
Intellectual Property
an idea, invention, or process that derives from the work of mind or intellect; intellectual property laws are written to protect an idea; example coming up with a song in your head can't be protected but if you write it down it can
what are IoT devices and what is not
any physical object can be transformed into an IoT device if it can be connected to the internet to be controlled or communicate information; PCs or smartphones aren't considered IoT because they don't have internet connections or communicate with networks independently of human action
the in between (AI)
between weak and strong - systems that are informed or inspired by human reasoning - where most of the powerful work is happening today - Ex IBM Watson
What is the IoT (internet of things)
billions of physical devices around the world that are now connected to the internet, all collecting and sharing data
machine language
binary codes unique to specific platforms
Value creation with blockchain concepts (TED talk)???
blockchain enables value creation through: Distributed Product Innovation, Shared Operational Efficiency, and Controlled Customer Intimacy.
Blockchain security (Is it unbreakable?)
blockchain security can be hacked
goals and objectives of AI
build systems that think exactly the same way people do; others just want to get job done and don't care if they do things the way human do;
blockchain technology
cryptographic database maintained by a network of computers, each of which store a copy of the most up to date version
______________ was the cryptocurrency blockchain was initially created to support
digital currency bitcoin
professional ethics: what is it and why we need it
ethical choices can often seem murky because we have different interpretations and less than complete information so we need to apply professional judgement which is guided by our own experiences as well as laws policies and culture; if you are a professional and do not act in an ethical manner it risks losing the trust of your audience
history of IoT
idea of adding sensors and intelligence to basic objects was discussed throughout 1980s and 1990s; the majority of early projects were slow because technology was simply not ready; the chips were too big and bulky and did not communicate info effectively
data privacy
is an issue of IoT because IoT is collecting so much information on everything you do
emerging technologies with regard to mobile technology
mobile will become the predominant media channel and will be defined beyond our smartphones
Acceptable Use Policy (AUP)
outlines what is and isn't allowed while someone is using the organizations services; many organizations require an agreement to this before their services can be accessed example would be wifi at Starbucks
copyright
protection to songs, computer programs, books, etc; under terms of copyright author of work controls what can be done with it
security to respect with IoT
security is an issue because these sensors are collecting extremely sensitive data for example what you say and do in your own home
program
set of instructions that a computer follows to perform a task
what is AI
sub- field of computer science; goal is to enable the development of computers that are able to do things normally done by people
future of IoT
the price of sensors and communication continue to drop so it makes sense to keep adding IoT even if it doesn't have large benefits; most companies that are engaging with IoT are at trial stage right now largely because necessary technology is itself at reasonably early stage of development; as number of connected devices continue to rise our living and working environments will become filled with smart technology
how is ethics applicable to IT
to perform duties effectively and keep the trust of their communities IT professionals need to act ethically; IT needs to maintain technical competence, avoid injury to other their property reputation or employment, and reject bribes kickbacks etc
cyber security golden rule
trust but verify
assembly language
uses short words (mnemonics) for instructions instead of binary numbers
Does technology have ethics
yes