COMP 111
Characters are represented as codes through binary notation. How would one write the character 'Z' in the ASCII binary code? Hint: 'X' is coded as "01111000 ".
01111010
Five Pillars of Information Assurance
1) Availability 2) Integrity 3) Authenticity 4) Confidentiality 5) Non-repudiation
How to mitigate the risks of phone threat?
1. Protect your communications and your personal data by using a third party strong encryption product. 2. Be mindful of your phone's location to minimise the opportunity of it being stolen or lost. 3. Disable Bluetooth when not needed to protect against the compromise of data on your phone. 4. Disable NFC to protect against compromise 5. Use an anti-malware product to protect yourself from Internet attackers. 6. Install a mobile phone firewall (MobileScope) or other operating system (MockDroid, TaintDroid, Paranoid Android, FireDroid). 7. Use SnoopShitch to detect if an IMSI catcher, user tracking and SS7 attacks.
How many different modes or values do 7 bits allow for?
128
What portion of smartphone users check their devices on average at least once every 10 minutes?
18%
In which year did a system surpass human performance in the ImageNet Challenge?
2015
In the US, how many people say they spend too much time using their smartphone?
50%
Cloud
◦ Large number of interconnected servers ◦ Large number of users
Encryption
◦ Preventing third parties from viewing data as it travels over a network
World Wide Web
Runs on top of the Internet.Pages are created using HTML (HyperText Markup Language)
What made Gordon Moore famous?
He predicted an exponential rise in the number of components on computer chips.
How have processors changed over time?
They used to consist of a single core, now they typically consist of multiple cores
What is NOT a trend in software?
(a) Increasingly, software is provided on the web. (b) Software has become more easy to share. (c) Software is increasingly sold as a service. (d) The number of popular Operating Systems has been increasing. NOT (e) The illegal duplication of copyrighted software is rampant.*
Over the years, what has changed in the information about social networks?
(a) It has become more structured. (b) It has become more explicit. (c) It has become more shared.
The internet is available to many people around the world. What has it NOT led to?
(a) People around the world can connect more easily with each other. (c) Companies can be run more efficiently. (d) The ICT industry has become more centralized. (e) The ICT industry has become more consolidated. NOT (b) The power in countries has shifted from governments to individuals.
In Software, the word "Application" is used to describe different things. Which ones?
(a) both the use cases of software, and the user interface of software (b) both a piece of software itself and the component that contains its logic or procedures (c) both the user interface of software, and the component that contains a software's logic or procedures (d) both software programs on mobile devices and their architecture
What does the field of pattern recognition include?
(a) image recognition (b) optical character recognition (c) automated speech recognition (d) neural network research
What kind of communication risk is "BlueTooth slurping"?
(c) Targeted Acquisition
What is Triggerfish?
A fake mobile phone base station
Firewall
Preventing external users (WAN) accessing devices inside a LAN
Components of Software
User -> User Interface -> Application -> Data
In the Secret Key System of Cryptographic communication, what kind of keys are used?
(a) one common key for both encryption and decryption for each pair of communicating devices (b) one common key for both encryption and decryption for all devices in a communicating network
What can a Universal Forensics Extraction Device do?
(c) It is able to capture the contents of most mobile phones
What is true about Augmented Reality?
(c) It will get big in consumer entertainment first, perhaps later in business too
Types of Networks
*LAN: Local Area Network (single area) *WAN: Wide Area Network (the internet + public) *VPN: Virtual Private Network (Extending access to LAN to a WAN in a secure way) - Allows you to access a LAN via the Internet - All traffic is encrypted *Intranet:Increasingly being used as an alternative to the term 'VPN'
In which age groups is Facebook the most used social network?
-
Signalling System 7
- A global standard for telecommunications - Efficient and secure worldwide communications network between service providers - nation by nation
Software can be split into
- Applications - Data - User - User interface
What can AI do?
- Communicate in human languages, - Provide instant expertise in medicine, science & finance to name a few. - World class chess and Go players. - Recognise objects in images at a level which exceeds human performance. - Self-driving cars and autonomous vehicles. - Robots that can outperform humans in a range of tasks.
Security Issues Addressed Security Issues Addressed by Cryptography
- Data in transit - Data at rest *NOT all cryptography is used to protect data (fingerprints, signatures)
Targets of Mobile Phone Attacks
- Famous - Rich - Intelligence - Political - Vendetta - Intellectual Property
What is not a method for Biometric identification
- Fingerprint - Hand Geometry - Face Print - Typing NOT Password
Types of pattern recognition:
- Imagine Recognition - Optical Character Recognition - Automatic Speech Recognition - Neural Networks - Learns patterns by trial and error much like a human does - Question-Answer Systems
In what way is WeChat more powerful than Facebook or Google?
- It is used by more people. - It combines more functionality in one app. - It is under direct control of the government. - It does not need to comply with international regulations on privacy
Which of these is NOT true about fuzzy logic?
- Items can belong to a fuzzy set to different degrees. - There are different types of membership functions. - Zadeh-Mamdani is the most common form of inference process. - More than one rule is allowed to fire in a fuzzy inference system. NOT negative (1 or 0)
Broswer Threats
- Java - Javascript - ActiveX - VBS - Flash
Risks to five Pillars
- Natural - Accidental - Deliberate
Negatives and positives of ICT
- Security Risks - Increased slacking +Increased productivity +Increased intelligence + Improved co-ordination ability
What affects server performance?
- Server load - Network congestion - Interference (electromagnetic) -unless fibre where there is no interference unless damage to cable
Types of Augmented Reality
- Spatial Augmented Reality - Video-See Through Augmented Reality - Optical-See Through Augmented Reality
List some communications risks:
- malware (spam/ viruses) - Loss, Theft, Seizures - Interception of Communications (fake base stations) - Targeted Aquisition (bluetooth slurping) - Location logging and tracking (Triggerfish location monitoring) - Bugging (triggerfish roving bug)
What is the Digital Divide?
The division in society between people with and people without access to ICT.
What is a botnet?
A botnet is a collection, sometimes numbering in the is a collection, sometimes numbering in the millions, of Internet millions, of Internet-connected PCs that have been connected PCs that have been compromised ( compromised (owned) - and can then be controlled and can then be controlled by the bot master (not you).
What is a social credit system?
A system that generates personal scores based on the behaviours of those individuals as captured in online social networks and other systems
What is the name for software that augments the physical environment with digital information associated with geographical locations or real objects by using smartphones with camera, GPS, and compass sensors?
Augmented Reality browser
What machine is able to capture content off of most of the worlds mobile phones?
Cellebrite UFED (Universal Forensics Extraction Device)
Two ways of measuring network performance:
Bandwidth: How much data can travel over a network in a certain period of time Latency: How long it takes a server to respond to a simple request
How does Bluetooth differ from Wi-Fi?
Bluetooth uses encryption in communicating with the web server. *
What is NOT a driver of research into Human-Computer Interaction (HCI)?
Drivers: - Improve human-computer interaction by improving the usability of computer interfaces - Enable new applications of computing technology driven by novel humancomputer interfaces - Optimizing a design for a desired property such as, e.g., learnability or efficiency of use - Studying human computer use and its sociocultural implications more broadly - Develop models and theories of human-computer use as well as conceptual frameworks for the design of computer interfaces SO NOT: the goal to understand how humans can benefit from technology in their lives
Gartner Hype Cycle
Each Hype Cycle drills down into the five key phases of a technology's life cycle. - Innovation Trigger - Peak of Inflated Expectations - Trough of Disillusionment - Slope of Enlightenment - Plateau of Productivity
Femtocell
Femtocell (low power small cellular base station) normally used by service providers to extend their service, however, with some modifications (less than $1,000) this can be used as integral component of an an IMSI Catcher.
. What is the purpose of a Denial of Service attack?
Flooding a server with requests in order to shut it down
The abbreviation "Gb" stands for
Gigabit (1 million kilobit)
Domain names:
Human 'friendly' addresses Resolve to IP addresses ◦ Via the Domain Name System (DNS) ⋄ A system that allows domain names to be registered against IP addresses (v4 and/or v6)
HCI
Human Computer interface (interaction). Researches the design and use of computer technology, focused on the interfaces between people (users) and computers
Mixed Reality is a term used to describe:
Human-Computer Interface that combines elements from the real environment with virtual environments.*
Whats the basis of AI techniques?
I Searching: Looking ahead to find the next best move to make. I Heuristics: Rules of thumb based on experience. I Pattern Recognition: Recognising similar or reoccurring patterns. I Machine Lear
IMSI Catcher
IMSI Catcher (is a false mobile base station) used by Law Enforcement and others for eavesdropping on targeted cell phone communications traffic.
What is true about the Internet Protocols (IPs) we are using?
IPv6 allows for enough addresses for all internet-connected devices in the world.
Who introduced "The Three Laws of Robotics"?
Isaac Asimov 1) Robot not hurt human 2) Obey orders unless it hurt human 3) Protect its own existence as long as it doesnt contradict 1) or 2)
What is a motherboard?
It is a circuit board that contains a computer's CPU.
What is true about the Peer-to-Peer Model?
It is a computer network which enables every computer on the network to be both client and server.
What are the biggest promise of quantum computing?
It will make computing much faster. *
What can pose a threat to a browser?
Java ActiveX VBS Flash
Adaptive learning techniques make MOOCs?
Massive Open Online Courses (a) more personalised, flexible, inclusive, and engaging. (b) make the teachers more mentors than lecturers (c) allow students to better work at their own pace
MobileScope
MobileScope is a phone firefall created by Ashkan Soltani It purports to 1. "SEE what information their apps transmit" 2. "BLOCK sensitive transmissions and unwanted traffic (ads)" 3. "SECURE their communications (via HTTPs everywhere/SSL CERT pinning)" 4. "SIGNAL that they don't wish to be tracked (Do-Not-Track)"
Protocols
Open Systems Interconnection (OSI) Model: • Layer 1: Physical (Turning data into electrical, radio, or optical signals, and sending it) • Layer 2: Data Link (Linking adjacent network devices so that signals will travel between them) • Layer 3: Network (Sending data between the sender and receiver (as opposed to signals) • Layer 4: Transport (Getting data on and off the network) • Layer 5: Session (Defines the concept of a connection between the sender) • Layer 6: Presentation ( Translating the data if necessary) • Layer 7: Application (Application specific protocols)
Access Control
Passwords for: - All networks - LAN's, MAN's, WAN's Biometric Identification - Voice Recognition - Digital Signatures - Fingerprints - Hand Geometry - Iris Patterns - Face print - Typing/Keystroke
'Nothing to hide nothing to fear'
Privacy is an important part of the human condition and has been specified, in the UN Universal Declaration of Human Rights to be a human right (not a privilege granted arbitrarily by some government).
In terms of relative accessibility and storage space, human's short-term memory compares to what in computers?
RAM
When you are editing a document on a personal computer, where is the digital document temporarily stored?
Random Access Memory (RAM)
Mixed Reality Spectrum
Real Environment <-> Augmented Reality <-> Augmented Virtuality <-> Virtual Environment
What are examples of switching hardware?
Routers, switches, hubs
What does SIM, IMSI and IMEI stand for?
SIM (Subscriber Identity Module) IMSI (International Mobile Subscriber Identity) IMEI (International Mobile Equipment Identity) *Every phone has an Internationa Every phone has an International Mobile Equipment Identity l Mobile Equipment Identity - a unique 15 digit identification a unique 15 digit identification number.
Which is not an AI-powered personal assistant?
Siri, Alex, Bixby, Cortana NOT Ask Jeeves
What is an example of communications hardware?
Speakers, Mouse, WiFi adapter, Microphone etc.
What was the Turing test?
Testing whether or not a computer can demonstrate intelligence behaviour. Involves two people and a computer.
What is NOT a pillar of Information Assurance?
The five pillars of information assurance are: - Availability - Integrity - Authentication - Confidentiality - Non-Repudiation NOT Privacy
The higher the resolution of a monitor,
The more pixels the screen has
In the Open Systems Interconnection Model how do senders and receivers communicate data?
They communicate through multiple layers. Media Layers: 1. Physical 2. Data Link 3. Network Host Layers: 4. Transport 5. Session 6. Presentation 7. Application
What do transistors do?
They store binary data*
What is a critical difference between User Experience and Usability?
Usability: "The extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use" User Experience: "encompasses all aspects of the end-user's interaction with the company, its services, and its products." Unlike User Experience, Usability must be studied in the context of certain users and goals.
What is NOT true about authentication?
Verification of: - User, device or other entity Identity User, device or other entity Identity -Integrity of data stored or transmitted Integrity of data stored or transmitted - Right to see or use data Types of Authentication 1. What you know - Passwords 2. What you have - Tokens 3. What you are - Biometric NOT Who you are
The number of transistors produced to date is in the same order of magnitude as...
_
What are four Computing Phases of the information age, in their correct chronological order?
_
What is a Botnet?
a collection of internet-connected PCs that can be controlled by the bot master
Every general-purpose computer, such as a PC, must have
an operating system.
ICT has helped to increase productivity. This rise in productivity has:
been decoupled from a rise in a workers wages
What did Alan Turing propose as a way to answer the question "Can computers think"?
the imitation game, later called the Turing Test AI (what computers can do): 1) searching 2) Heuristics: rules of thumb based on experience 3) pattern recognition 4) machine learning
Application refers to:
• A computer problem, a vie case of software, the procedures of software. • A component of software, the application can ascribe, how data is stored and how data is prescribed.
Internet of Things (IoT)
• Adding network capabilities to devices that historically have not had this capability
What are the components of software?
• Data, application and user interface
A network is made up of two components:
• Hardware (computers) • Protocols (software that runs inside the hardware)