Information Technology Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

changing cyber security threat landscape

- 0 day vulnerabilities and hacking are still active but not as prevalent - they have been replaced by a cheaper more effective way of attack (humans) - humans are the new attack factor

approaches SDLC

- 4 stage model - 7 stage model - DevOps is a natural extension of agile methodologies. It continues the integration of analysis, design, and development to incorporate the integrated continuous release of software.

development roles/ jobs

- BusinessAnalyst - SystemsAnalyst - Project Manager - Software Developer

other technology that supports blockchain???

- Cryptographic keys. - A peer-to-peer network containing a shared ledger. - A means of computing, to store the transactions and records of the network.

software developer duties and responsibilities

- Develop and test software to meet consumers' and clients' needs. - Recommend and develop upgrades for existing applications. - Create models and diagrams to show programmers the code needed for applications. - Monitor quality and performance of applications through testing and maintenance. - Document all work for future reference.

impact of smartphones in our lives

- Not only do our phones shape our thoughts in deep and complicated ways, but the effects persist even when we aren't using the devices. As the brain grows dependent on the technology, the research suggests, the intellect weakens - If you are like the typical owner, you'll be pulling your phone out and using it some 80 times a day. That means you'll be consulting the glossy little rectangle nearly 30,000 times over the coming year. - But while our phones offer convenience and diversion, they also breed anxiety.

strong AI

- The work aimed at genuinely simulating human reasoning - result to be not only to build systems that think but also explain how humans think which is hard to do - we have yet to see real model of strong AI

main aims of cyber attacks

- accessing changing or destroying sensitive information - extorting money from users - interrupting normal business processes

weak AI

- aimed at just getting systems to work - while we might be able to get systems to behave like humans, the results will tell us nothing about what humans think - ex; IBM Deep Blue

SDLC stages (6 stage model)

- analysis - planning - design - development - testing - deployment

Implications of blockchain buyers, sellers, and the middleman

- before blockchain buying and selling required intermediary but blockchain replaces this central system with a decentralized ledger of chain records - because of blockchain there is not really a need for a middle man

types of bias problems in AI

- bias built into data - AI induced bias - teaching AI human rules - evaluating cases of suspected AI bias

how does blockchain technology work

- blockchain is designed to store info in a way that makes it almost impossible to add remove or change without being detected - Blocks- where record are combined with other transactions into a block like a traditional computer database each transaction is time stamped; when a block is complete it gets its own time stamp; so all info is sequential which helps avoid duplicate entries; completed block is sent out across the network and put into a chain - Hash- cryptographic math that makes the links between blocks virtually unbreakable; hash function takes the information in each block and uses it to create the hash—a unique string of characters; the hash from one block is added to the data in the next block so when the next block goes through the hash function, a trace of it is woven into the new hash; if there is any attempt to alter a previously created block the hash that's encoded in the next block wont math up anymore

challenges SDLC

- difficulty of determining requirements - changes in requirements - difficulties involving scheduling and budgeting - changing technology - diseconomies. of sales

security, password, and cyber defense best practices and tactics

- don't click - seriously stop clicking - use strong passwords - don't reuse passwords - stop using passwords - patch yourself

SDLC best practices

- identify current problems - plan - design - build - code test - software development - software maintenance

categories of ethical dilemmas faced in IT

- integrity - competence - professional responsibilities - work responsibilities - societal responsibilities

what is ML

- machine learning - allows machines to learn from data and mimic some of the things humans can do - machines have to learn form large collections of past data to be accurate - almost 1 in every 2 jobs could be automated by machines

human beings vs AI: tasks, jobs, implications

- machines will be more accurate so less error and more efficient - machines can't interact with people and think things that a human does though

risks SDLC

- many projects never finish - often 200 to 300 percent over budget - some don't accomplish goals - some completed months or years behind schedule - high risk of failure

Various uses of blockchain technology???

- no single person or group has control - recording transactions - tracking digital assets - contracts - supply chain info - health care - digital ID - trusted concert tickets - more efficient markets

cyber security statistics

- only 50% of cyber attacks are successful (within the first hour) - 90% of cyber attacks are caused by human behavior - it takes 1 person to fall victim of cyber attack to be considered a success - estimated cost of the average data breach rose to 3.79m in 2015 which is 23% growth in past two years alone

where blockchain came from and where it was first used

- originally developed as part of digital currency in bitcoin

parts of a successful cyber security approach

- people - processes - technology

cyber security

- practice of protecting systems network and programs from digital attacks

system/ software development

- process of creating and maintaining information systems - goal is lower cost and improve quality of software development - create software that enables users to perform specific tasks on computer devices - Software developers are the creative minds behind software programs, and they have the technical skills to build those programs or to oversee their creation by a team. They create software that enables users to perform specific tasks on computer devices.

key findings of how smartphones hijack our minds

- provides many distractions that impedes reasoning and performance - 2015 research found that when someones phone buzzes during a challenging task whether they check it or not their work gets sloppier - another 2015 study found that when their phone rings and they can't answer it right away their blood pressure spikes, their pulse quickens, and ability to solve problems declines - test taking study found that students whose phone was in view did significantly worse than those whose phones were in a different room - worse at social skills with smartphones - do better in class without phone

how to improve your relationship with mobile technology

- reframe the way you think about it - ask yourself what you want to pay attention to - set yourself up for success - create speed bumps pay attention to your body - practice trial separations - use technology to protect yourself from technology (time tracking apps) - use sight of other people on their phones as a reminder - get existential about it (this is your life hoe much of it do you want to spend on your phone)

SDLC

- software development life cycle - a methodology with clearly defined processes for creating high-quality software - process that produces software with the highest quality and lowest cost in the shortest time possible

SDLC stages (4 stage model)

- systems planning and selection - systems analysis - systems design - systems implementation and operation

wholistic approach to cyber security

- towering above all the tools is training, awareness and education

what are the ways in which emerging technologies are redefining mobile

- voice - immersive realities - facial recognition - artificial intelligence

development methodologies SDLC

- waterfall model - agile model - iterative model - v shaped model - Big Bang model - spiral model

programmer

A person who can design, create, and test computer programs

data analytics

IoT is significant driver of big data analytics because it allows companies to create vast data sets and analyze them; giving companies large amounts of data about how its components behave it will allow them to make improvements more rapidly

fair use

a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases; it can be challenged by copyright owners because the rules aren't well defined; ex could be a teacher could hand out copies of copyrighted story to class to teach them about an event

Ethics definition

a set of moral principles; principles of conduct that govern individuals or groups

high level language

allows simple creation of powerful and complex programs

Intellectual Property

an idea, invention, or process that derives from the work of mind or intellect; intellectual property laws are written to protect an idea; example coming up with a song in your head can't be protected but if you write it down it can

what are IoT devices and what is not

any physical object can be transformed into an IoT device if it can be connected to the internet to be controlled or communicate information; PCs or smartphones aren't considered IoT because they don't have internet connections or communicate with networks independently of human action

the in between (AI)

between weak and strong - systems that are informed or inspired by human reasoning - where most of the powerful work is happening today - Ex IBM Watson

What is the IoT (internet of things)

billions of physical devices around the world that are now connected to the internet, all collecting and sharing data

machine language

binary codes unique to specific platforms

Value creation with blockchain concepts (TED talk)???

blockchain enables value creation through: Distributed Product Innovation, Shared Operational Efficiency, and Controlled Customer Intimacy.

Blockchain security (Is it unbreakable?)

blockchain security can be hacked

goals and objectives of AI

build systems that think exactly the same way people do; others just want to get job done and don't care if they do things the way human do;

blockchain technology

cryptographic database maintained by a network of computers, each of which store a copy of the most up to date version

______________ was the cryptocurrency blockchain was initially created to support

digital currency bitcoin

professional ethics: what is it and why we need it

ethical choices can often seem murky because we have different interpretations and less than complete information so we need to apply professional judgement which is guided by our own experiences as well as laws policies and culture; if you are a professional and do not act in an ethical manner it risks losing the trust of your audience

history of IoT

idea of adding sensors and intelligence to basic objects was discussed throughout 1980s and 1990s; the majority of early projects were slow because technology was simply not ready; the chips were too big and bulky and did not communicate info effectively

data privacy

is an issue of IoT because IoT is collecting so much information on everything you do

emerging technologies with regard to mobile technology

mobile will become the predominant media channel and will be defined beyond our smartphones

Acceptable Use Policy (AUP)

outlines what is and isn't allowed while someone is using the organizations services; many organizations require an agreement to this before their services can be accessed example would be wifi at Starbucks

copyright

protection to songs, computer programs, books, etc; under terms of copyright author of work controls what can be done with it

security to respect with IoT

security is an issue because these sensors are collecting extremely sensitive data for example what you say and do in your own home

program

set of instructions that a computer follows to perform a task

what is AI

sub- field of computer science; goal is to enable the development of computers that are able to do things normally done by people

future of IoT

the price of sensors and communication continue to drop so it makes sense to keep adding IoT even if it doesn't have large benefits; most companies that are engaging with IoT are at trial stage right now largely because necessary technology is itself at reasonably early stage of development; as number of connected devices continue to rise our living and working environments will become filled with smart technology

how is ethics applicable to IT

to perform duties effectively and keep the trust of their communities IT professionals need to act ethically; IT needs to maintain technical competence, avoid injury to other their property reputation or employment, and reject bribes kickbacks etc

cyber security golden rule

trust but verify

assembly language

uses short words (mnemonics) for instructions instead of binary numbers

Does technology have ethics

yes


Kaugnay na mga set ng pag-aaral

Українська екзамен

View Set

Pharmacology II Prep U Chapter 35: Hypothalamic and Pituitary Agents

View Set

Statistics for Business and Economics Ch4

View Set

Chapter 18: Drug Therapy With Beta-Lactam Antibacterial Agents

View Set

Personal Finance Chapter 6 - Consumer Purchasing Strategies and Wise Buying of Motor Vehicles

View Set

Chapter 1 Introduction to Computers and Programming

View Set

6-3 Starting a Small Business (2IBT)

View Set

MOB Chapter 3: Managing in a Global Environment

View Set

All multiple choice questions from Ch. 10, 16, 17, 19

View Set