Safeguarding Computer Systems

Slides:



Advertisements
Similar presentations
The Development of AI St Kentigerns Academy Unit 3 – Artificial Intelligence.
Advertisements

Artificial Intelligence
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Information and Software Technology Option: Artificial intelligence, simulation and modelling.
Information and Software Technology
Artificial Intelligence
Chapter 9: Privacy, Crime, and Security
1946: ENIAC heralds the dawn of Computing. I propose to consider the question: “Can machines think?” --Alan Turing, : Turing asks the question….
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Artificial Intelligence John Ross Yuki Yabushita Sharon Pieloch Steven Smith.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Artificial Intelligence
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Artificial Intelligence
Chapter 13: Is Artificial Intelligence Real?
Copyright R. Weber INFO 629 Concepts in Artificial Intelligence Fall 2004 Professor: Dr. Rosina Weber.
Artificial Intelligence By Ryan Shoultes & Jeremy Creighton.
Enabling Organization-Decision Making
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Chapter 10. Global Village “… is the shrinking of the world society because of the ability to communicate.” Positive: The best from diverse cultures will.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Artificial Intelligence: Its Roots and Scope
Artificial Intelligence (AI) Can Machines Think?.
Artificial Intelligence: Prospects for the 21 st Century Henry Kautz Department of Computer Science University of Rochester.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Artificial Intelligence By Michelle Witcofsky And Evan Flanagan.
I Robot.
TRENDS IN TECHNOLOGY 1. 2  
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Artificial Intelligence, simulation and modelling.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Overview of Artificial Intelligence (1) Artificial intelligence (AI) Computers with the ability to mimic or duplicate the functions of the human brain.
CSCI-235 Micro-Computer Applications Privacy & Security I.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Chapter 11 Business and Technology Objective 2.04.
Common Methods Used to Commit Computer Crimes
Fundamentals of Information Systems, Sixth Edition
Fundamentals of Information Systems
Challenge/Response Authentication
Chapter 11: Artificial Intelligence
Chapter 10.
Chapter 17 Your Future with Technology
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Jeopardy $100 $100 $100 $100 $100 $200 $200 $200 $200 $200 $300 $300 $300 $300 $300 $400 $400 $400 $500 $500.
Deep Learning Fundamentals online Training at GoLogica
Introduction To Computer Engineering (ECE 001)
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Artificial Intelligence
Course Instructor: knza ch
Artificial Intelligence Includes:
Artificial Intelligence introduction(2)
Security through Encryption
Computer Programming I
Chapter 11 Business and Technology
THREE TIER MOBILE COMPUTING ARCHITECTURE
11 Business and Technology 11-1 Computer Systems
Introduction to computers
Securing Windows 7 Lesson 10.
Is Artificial Intelligence Real?
PLANNING A SECURE BASELINE INSTALLATION
Global megatrends (relevant for our business)
Artificial Intelligence
Presentation transcript:

Safeguarding Computer Systems Security Safeguarding Computer Systems Protecting computers from power-relate problems power surges & power outages autosave uninterruptible power supply (UPS) Module B A UPS is battery powered device that provides power to your computer for a limited time in a power outage

Safeguarding Computer Systems Security Safeguarding Computer Systems Controlling access callback systems tokens digital certificates smartcards biometric authentication Module B Smartcards are credit-card-sized devices wit their own internal memories

Safeguarding Computer Systems Security Safeguarding Computer Systems Firewalls Encryption Antivirus programs or vaccines Data backups full backups incremental backups disaster recovery plan Module B

Current Issues and Controversies Module The Encryption Debate Obscenity and Indecency Privacy C

Current Issues & Controversies The scenario . . . Module C Identity theft is one of the fastest-growing crimes in the U.S. and Canada. Criminals obtain enough information about you to open a credit account in your name, and then max it out -- leaving you with the bill.

The Encryption Debate Encryption (coded message) basics Current issues & controversies The Encryption Debate Encryption (coded message) basics rot-13 Problem of key interception Public-key encryption public-key Module C For more information concerning public-key encryption, visit the RSA Laboratories’ Frequently-Asked Questions on Cryptography page

The Encryption Debate Security issues of strong encryption Current issues & controversies The Encryption Debate Security issues of strong encryption key escrow key recovery Export restrictions bit length Global dimension Module C To get the latest news and perspectives about cryptography issues, visit the Center for Democracy and Technology’s Crypto Debate page

Obscenity & Indecency Obscenity Indecency Current issues & controversies Obscenity & Indecency Obscenity Indecency Communications Decency ACT (CDA) Filtering software World Wide Web Consortium (W3C) Platform for Internet Content Selection (PICS) The Global Dimension Module C

Current issues & controversies Obscenity & Indecency Net Nanny is one example of filtering software that enables parents to screen out Web sites that contain indecent or obscene material Module C

Current issues & controversies Privacy Module C Defined by U.S. Supreme Court Justice Louis Brandeis in 1928 as “the right to be left alone,” privacy refers to an individual’s ability to keep their personal and family business away from prying eyes

Privacy Privacy rights in the U.S. Databases of personal information Current issues & controversies Privacy Privacy rights in the U.S. Databases of personal information How is information collected? Is self-regulation sufficient? Proposed solutions Platform for Privacy Preferences (P3) The Global Dimension Module C

Protecting Your Privacy Online Current issues & controversies Protecting Your Privacy Online To safeguard your privacy . . . Don’t use your employer’s computers for personal email Tell children not to divulge personal information to strangers online Don’t fill out site registration forms unless you see a privacy policy statement Module C Web sites can collect information without your knowledge and consent. To see an example, visit the Center for Democracy and Technology’s CDT Privacy Demonstration Page

Emerging Technologies Module Tomorrows Hardware: Faster, Cheaper, Connected Artificial Intelligence: Toward the Smart Machine? Social Impact of AI: Sharing the World with Machines Who Think D

Emerging Technologies The prediction . . . Module D What will computers be like in the future? It’s very easy to predict the future -- the hard part is getting it right, and that’s particularly true where technology is concerned. Past predictions don’t offer much comfort . . .

Tomorrow’s Hardware: Faster, Cheaper, Connected Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D Moore’s Law Metcalfe’s Law As computers become faster, cheaper, and more valuable, they’ll encourage the trend towards the digitization of all the world’s information and knowledge

The Short Term Typical personal computer: Today & 2005 D Emerging technologies The Short Term Typical personal computer: Today & 2005 Module D

Tomorrow’s Hardware: Faster, Cheaper, Connected Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D The long term ubiquitous (everywhere) computing Limits of trend extrapolation

Artificial Intelligence: Toward the Smart Machine Emerging technologies Artificial Intelligence: Toward the Smart Machine Defining intelligence learn and retain the learned knowledge reason on the basis of the knowledge plan (develop strategies) communicate recognize patterns Module D For information on artificial intelligence, an excellent starting point is AI on the Web.

Artificial Intelligence: Toward the Smart Machine Emerging technologies Artificial Intelligence: Toward the Smart Machine AI is the field that attempts to endow computers with intelligence. Although scientists know little about the human brain, it's clear that the brain is far more complex than any computer Module D

The Human Brain As a CPU Speculative estimates D Emerging technologies Module D

Emerging technologies The Turing Test British computer scientist Alan Turing. According to most psychologists, the Turing Test's type-and-response method is too simplistic. Module D

Artificial Intelligence Emerging technologies Artificial Intelligence Brute force AI achievements On May 11, 1997, Big Blue defeated Russian chess master Garry Kasparov Module D

Artificial Intelligence Emerging technologies Artificial Intelligence Module D Natural language speech recognition Major advances have been made in speech recognition, in which computers translate spoken speech into text

Artificial Intelligence Emerging technologies Artificial Intelligence Machine translation Expert systems knowledge representation knowledge base Intelligent agents Pattern recognition Fuzzy logic Module D Try machine translation yourself by visiting Babelfish, an online Web translator created by AltaVista

Robots Emerging technologies Increasingly, robots are performing tasks such as assembly, welding, material-handling, and material transport Module D Like to build your own robot? Visit Mondo-Tronics Robot Store where you’ll find nearly 300 robot kits and accessories

Artificial Intelligence Emerging technologies Artificial Intelligence Strong AI CYC Cog neural networks genetic algorithms Module D The brain contains billions neurons. In a neural net, thousands of computer processing units are connected in multiple ways, just as the neurons in the brain are connected

Social Impact of AI: Sharing the World with Machines Who Think Emerging technologies Social Impact of AI: Sharing the World with Machines Who Think Asimov’s Three Laws of Robotics First: A robot may not injure a human being . . . Second: A robot must obey the orders given it by human beings except where it may conflict with the First Law Third: A robot must protect its own existence as long as such protection does not conflict with the First or Second Law Module D