COMP 111

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Characters are represented as codes through binary notation. How would one write the character 'Z' in the ASCII binary code? Hint: 'X' is coded as "01111000 ".

01111010

Five Pillars of Information Assurance

1) Availability 2) Integrity 3) Authenticity 4) Confidentiality 5) Non-repudiation

How to mitigate the risks of phone threat?

1. Protect your communications and your personal data by using a third party strong encryption product. 2. Be mindful of your phone's location to minimise the opportunity of it being stolen or lost. 3. Disable Bluetooth when not needed to protect against the compromise of data on your phone. 4. Disable NFC to protect against compromise 5. Use an anti-malware product to protect yourself from Internet attackers. 6. Install a mobile phone firewall (MobileScope) or other operating system (MockDroid, TaintDroid, Paranoid Android, FireDroid). 7. Use SnoopShitch to detect if an IMSI catcher, user tracking and SS7 attacks.

How many different modes or values do 7 bits allow for?

128

What portion of smartphone users check their devices on average at least once every 10 minutes?

18%

In which year did a system surpass human performance in the ImageNet Challenge?

2015

In the US, how many people say they spend too much time using their smartphone?

50%

Cloud

◦ Large number of interconnected servers ◦ Large number of users

Encryption

◦ Preventing third parties from viewing data as it travels over a network

World Wide Web

Runs on top of the Internet.Pages are created using HTML (HyperText Markup Language)

What made Gordon Moore famous?

He predicted an exponential rise in the number of components on computer chips.

How have processors changed over time?

They used to consist of a single core, now they typically consist of multiple cores

What is NOT a trend in software?

(a) Increasingly, software is provided on the web. (b) Software has become more easy to share. (c) Software is increasingly sold as a service. (d) The number of popular Operating Systems has been increasing. NOT (e) The illegal duplication of copyrighted software is rampant.*

Over the years, what has changed in the information about social networks?

(a) It has become more structured. (b) It has become more explicit. (c) It has become more shared.

The internet is available to many people around the world. What has it NOT led to?

(a) People around the world can connect more easily with each other. (c) Companies can be run more efficiently. (d) The ICT industry has become more centralized. (e) The ICT industry has become more consolidated. NOT (b) The power in countries has shifted from governments to individuals.

In Software, the word "Application" is used to describe different things. Which ones?

(a) both the use cases of software, and the user interface of software (b) both a piece of software itself and the component that contains its logic or procedures (c) both the user interface of software, and the component that contains a software's logic or procedures (d) both software programs on mobile devices and their architecture

What does the field of pattern recognition include?

(a) image recognition (b) optical character recognition (c) automated speech recognition (d) neural network research

What kind of communication risk is "BlueTooth slurping"?

(c) Targeted Acquisition

What is Triggerfish?

A fake mobile phone base station

Firewall

Preventing external users (WAN) accessing devices inside a LAN

Components of Software

User -> User Interface -> Application -> Data

In the Secret Key System of Cryptographic communication, what kind of keys are used?

(a) one common key for both encryption and decryption for each pair of communicating devices (b) one common key for both encryption and decryption for all devices in a communicating network

What can a Universal Forensics Extraction Device do?

(c) It is able to capture the contents of most mobile phones

What is true about Augmented Reality?

(c) It will get big in consumer entertainment first, perhaps later in business too

Types of Networks

*LAN: Local Area Network (single area) *WAN: Wide Area Network (the internet + public) *VPN: Virtual Private Network (Extending access to LAN to a WAN in a secure way) - Allows you to access a LAN via the Internet - All traffic is encrypted *Intranet:Increasingly being used as an alternative to the term 'VPN'

In which age groups is Facebook the most used social network?

-

Signalling System 7

- A global standard for telecommunications - Efficient and secure worldwide communications network between service providers - nation by nation

Software can be split into

- Applications - Data - User - User interface

What can AI do?

- Communicate in human languages, - Provide instant expertise in medicine, science & finance to name a few. - World class chess and Go players. - Recognise objects in images at a level which exceeds human performance. - Self-driving cars and autonomous vehicles. - Robots that can outperform humans in a range of tasks.

Security Issues Addressed Security Issues Addressed by Cryptography

- Data in transit - Data at rest *NOT all cryptography is used to protect data (fingerprints, signatures)

Targets of Mobile Phone Attacks

- Famous - Rich - Intelligence - Political - Vendetta - Intellectual Property

What is not a method for Biometric identification

- Fingerprint - Hand Geometry - Face Print - Typing NOT Password

Types of pattern recognition:

- Imagine Recognition - Optical Character Recognition - Automatic Speech Recognition - Neural Networks - Learns patterns by trial and error much like a human does - Question-Answer Systems

In what way is WeChat more powerful than Facebook or Google?

- It is used by more people. - It combines more functionality in one app. - It is under direct control of the government. - It does not need to comply with international regulations on privacy

Which of these is NOT true about fuzzy logic?

- Items can belong to a fuzzy set to different degrees. - There are different types of membership functions. - Zadeh-Mamdani is the most common form of inference process. - More than one rule is allowed to fire in a fuzzy inference system. NOT negative (1 or 0)

Broswer Threats

- Java - Javascript - ActiveX - VBS - Flash

Risks to five Pillars

- Natural - Accidental - Deliberate

Negatives and positives of ICT

- Security Risks - Increased slacking +Increased productivity +Increased intelligence + Improved co-ordination ability

What affects server performance?

- Server load - Network congestion - Interference (electromagnetic) -unless fibre where there is no interference unless damage to cable

Types of Augmented Reality

- Spatial Augmented Reality - Video-See Through Augmented Reality - Optical-See Through Augmented Reality

List some communications risks:

- malware (spam/ viruses) - Loss, Theft, Seizures - Interception of Communications (fake base stations) - Targeted Aquisition (bluetooth slurping) - Location logging and tracking (Triggerfish location monitoring) - Bugging (triggerfish roving bug)

What is the Digital Divide?

The division in society between people with and people without access to ICT.

What is a botnet?

A botnet is a collection, sometimes numbering in the is a collection, sometimes numbering in the millions, of Internet millions, of Internet-connected PCs that have been connected PCs that have been compromised ( compromised (owned) - and can then be controlled and can then be controlled by the bot master (not you).

What is a social credit system?

A system that generates personal scores based on the behaviours of those individuals as captured in online social networks and other systems

What is the name for software that augments the physical environment with digital information associated with geographical locations or real objects by using smartphones with camera, GPS, and compass sensors?

Augmented Reality browser

What machine is able to capture content off of most of the worlds mobile phones?

Cellebrite UFED (Universal Forensics Extraction Device)

Two ways of measuring network performance:

Bandwidth: How much data can travel over a network in a certain period of time Latency: How long it takes a server to respond to a simple request

How does Bluetooth differ from Wi-Fi?

Bluetooth uses encryption in communicating with the web server. *

What is NOT a driver of research into Human-Computer Interaction (HCI)?

Drivers: - Improve human-computer interaction by improving the usability of computer interfaces - Enable new applications of computing technology driven by novel humancomputer interfaces - Optimizing a design for a desired property such as, e.g., learnability or efficiency of use - Studying human computer use and its sociocultural implications more broadly - Develop models and theories of human-computer use as well as conceptual frameworks for the design of computer interfaces SO NOT: the goal to understand how humans can benefit from technology in their lives

Gartner Hype Cycle

Each Hype Cycle drills down into the five key phases of a technology's life cycle. - Innovation Trigger - Peak of Inflated Expectations - Trough of Disillusionment - Slope of Enlightenment - Plateau of Productivity

Femtocell

Femtocell (low power small cellular base station) normally used by service providers to extend their service, however, with some modifications (less than $1,000) this can be used as integral component of an an IMSI Catcher.

. What is the purpose of a Denial of Service attack?

Flooding a server with requests in order to shut it down

The abbreviation "Gb" stands for

Gigabit (1 million kilobit)

Domain names:

Human 'friendly' addresses Resolve to IP addresses ◦ Via the Domain Name System (DNS) ⋄ A system that allows domain names to be registered against IP addresses (v4 and/or v6)

HCI

Human Computer interface (interaction). Researches the design and use of computer technology, focused on the interfaces between people (users) and computers

Mixed Reality is a term used to describe:

Human-Computer Interface that combines elements from the real environment with virtual environments.*

Whats the basis of AI techniques?

I Searching: Looking ahead to find the next best move to make. I Heuristics: Rules of thumb based on experience. I Pattern Recognition: Recognising similar or reoccurring patterns. I Machine Lear

IMSI Catcher

IMSI Catcher (is a false mobile base station) used by Law Enforcement and others for eavesdropping on targeted cell phone communications traffic.

What is true about the Internet Protocols (IPs) we are using?

IPv6 allows for enough addresses for all internet-connected devices in the world.

Who introduced "The Three Laws of Robotics"?

Isaac Asimov 1) Robot not hurt human 2) Obey orders unless it hurt human 3) Protect its own existence as long as it doesnt contradict 1) or 2)

What is a motherboard?

It is a circuit board that contains a computer's CPU.

What is true about the Peer-to-Peer Model?

It is a computer network which enables every computer on the network to be both client and server.

What are the biggest promise of quantum computing?

It will make computing much faster. *

What can pose a threat to a browser?

Java ActiveX VBS Flash

Adaptive learning techniques make MOOCs?

Massive Open Online Courses (a) more personalised, flexible, inclusive, and engaging. (b) make the teachers more mentors than lecturers (c) allow students to better work at their own pace

MobileScope

MobileScope is a phone firefall created by Ashkan Soltani It purports to 1. "SEE what information their apps transmit" 2. "BLOCK sensitive transmissions and unwanted traffic (ads)" 3. "SECURE their communications (via HTTPs everywhere/SSL CERT pinning)" 4. "SIGNAL that they don't wish to be tracked (Do-Not-Track)"

Protocols

Open Systems Interconnection (OSI) Model: • Layer 1: Physical (Turning data into electrical, radio, or optical signals, and sending it) • Layer 2: Data Link (Linking adjacent network devices so that signals will travel between them) • Layer 3: Network (Sending data between the sender and receiver (as opposed to signals) • Layer 4: Transport (Getting data on and off the network) • Layer 5: Session (Defines the concept of a connection between the sender) • Layer 6: Presentation ( Translating the data if necessary) • Layer 7: Application (Application specific protocols)

Access Control

Passwords for: - All networks - LAN's, MAN's, WAN's Biometric Identification - Voice Recognition - Digital Signatures - Fingerprints - Hand Geometry - Iris Patterns - Face print - Typing/Keystroke

'Nothing to hide nothing to fear'

Privacy is an important part of the human condition and has been specified, in the UN Universal Declaration of Human Rights to be a human right (not a privilege granted arbitrarily by some government).

In terms of relative accessibility and storage space, human's short-term memory compares to what in computers?

RAM

When you are editing a document on a personal computer, where is the digital document temporarily stored?

Random Access Memory (RAM)

Mixed Reality Spectrum

Real Environment <-> Augmented Reality <-> Augmented Virtuality <-> Virtual Environment

What are examples of switching hardware?

Routers, switches, hubs

What does SIM, IMSI and IMEI stand for?

SIM (Subscriber Identity Module) IMSI (International Mobile Subscriber Identity) IMEI (International Mobile Equipment Identity) *Every phone has an Internationa Every phone has an International Mobile Equipment Identity l Mobile Equipment Identity - a unique 15 digit identification a unique 15 digit identification number.

Which is not an AI-powered personal assistant?

Siri, Alex, Bixby, Cortana NOT Ask Jeeves

What is an example of communications hardware?

Speakers, Mouse, WiFi adapter, Microphone etc.

What was the Turing test?

Testing whether or not a computer can demonstrate intelligence behaviour. Involves two people and a computer.

What is NOT a pillar of Information Assurance?

The five pillars of information assurance are: - Availability - Integrity - Authentication - Confidentiality - Non-Repudiation NOT Privacy

The higher the resolution of a monitor,

The more pixels the screen has

In the Open Systems Interconnection Model how do senders and receivers communicate data?

They communicate through multiple layers. Media Layers: 1. Physical 2. Data Link 3. Network Host Layers: 4. Transport 5. Session 6. Presentation 7. Application

What do transistors do?

They store binary data*

What is a critical difference between User Experience and Usability?

Usability: "The extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use" User Experience: "encompasses all aspects of the end-user's interaction with the company, its services, and its products." Unlike User Experience, Usability must be studied in the context of certain users and goals.

What is NOT true about authentication?

Verification of: - User, device or other entity Identity User, device or other entity Identity -Integrity of data stored or transmitted Integrity of data stored or transmitted - Right to see or use data Types of Authentication 1. What you know - Passwords 2. What you have - Tokens 3. What you are - Biometric NOT Who you are

The number of transistors produced to date is in the same order of magnitude as...

_

What are four Computing Phases of the information age, in their correct chronological order?

_

What is a Botnet?

a collection of internet-connected PCs that can be controlled by the bot master

Every general-purpose computer, such as a PC, must have

an operating system.

ICT has helped to increase productivity. This rise in productivity has:

been decoupled from a rise in a workers wages

What did Alan Turing propose as a way to answer the question "Can computers think"?

the imitation game, later called the Turing Test AI (what computers can do): 1) searching 2) Heuristics: rules of thumb based on experience 3) pattern recognition 4) machine learning

Application refers to:

• A computer problem, a vie case of software, the procedures of software. • A component of software, the application can ascribe, how data is stored and how data is prescribed.

Internet of Things (IoT)

• Adding network capabilities to devices that historically have not had this capability

What are the components of software?

• Data, application and user interface

A network is made up of two components:

• Hardware (computers) • Protocols (software that runs inside the hardware)


Ensembles d'études connexes

AP Psychology Module 34: Thinking, Concepts, and Creativity and Module 35: Solving Problems and Making Decisions

View Set

Complementary and Integrative Health

View Set