Digital Automata Unit 7-1 Managing the Digital Enterprise By Professor Michael Rappa.

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Advertisements

Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
1 WEEK 10 Intelligent (Software) Agents. 2 Case Scenario Every year, ABC Enterprise will conduct annual general meeting (AGM) to report company performance.
Chapter 14 The Second Component: The Database.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Introduction to Honeypot, Botnet, and Security Measurement
Intelligent Agent By: Kian Yousefi.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Artificial Intelligence Techniques Internet Applications 1.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Web Analytics Unit 4-1(2005 Fall) Managing the Digital Enterprise By Professor Michael Rappa.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Daniul Byrd. What are bots?  Software that automates tasks  Can network to share data and act in coordination.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Malicious Software.
Intelligent Agents. 2 What is an Agent? The main point about agents is they are autonomous: capable of acting independently, exhibiting control over their.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Threats to computers Andrew Cormack UKERNA.
Botnets A collection of compromised machines
Call AVG Antivirus Support | Fix Your PC
Chap 10 Malicious Software.
Interdisciplinary Program in Cognitive Science Lee, Jung-Woo
Unit# 5: Internet and Worldwide Web
Chap 10 Malicious Software.
Test 3 review FTP & Cybersecurity
Introduction to Internet Worm
Software Agent.
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

Digital Automata Unit 7-1 Managing the Digital Enterprise By Professor Michael Rappa

The promise (and peril) of a world composed of bits is that it opens the door to automation; to let computers alone do what we cannot or prefer not to do ourselves. Computer automation takes many shapes. It can be as basic as a program that spares us from the tediousness of deleting spam from our , or as evolved as one that simulates human interaction to answer customer service questions.

Software programs that operate independently with little or no human intervention are varied in form and function and go by several names — agents, bots, recommender systems, collaborative filtering, avatars, chatterbots, and more — but all could be characterized generally as digital automata], to use the Latin word for self-operating machines. As remarkable as progress has been with digital automata, there is much more to be done. Now that computers communicate with each other across the Internet, opportunities to automate tasks abound. But to realize the full potential of automata on the Web, there is a need for further work to make information understandable to machines. This is the goal of the Semantic Web, an ambitious project to create machine-readable protocols that convey meaning about data (metadata and ontologies) that will allow computers to act upon data independently to perform tasks on our behalf.

Another front in the advancement of computer automation is autonomic computing. Here the goal is to develop a computer that is capable of managing itself to a significant degree without human intervention. Researchers envision a machine that could configure itself, discover and correct faults, monitor and optimize how it functions, identify threats and protect itself from attack among other things.

Not all automation is helpful. A troublesome trend in security is the proliferation of automated attack tools that can be used to cause widespread harm to computer networks. Distributed denial of service (DDos) attacks use automated techniques, like worms, to compromise and seize control of thousands of computers, called a Botnet, and then use them to shutdown targeted Web sites. There are spambots that troll the Internet to harvest addresses from Web pages. Indeed spam itself is made possible largely through the use automated tools that send out millions of messages each day. Sometimes those messages carry viruses and worms, which replicate themselves and very quickly infect millions of computers across a network. What is worse, automated attack tools can be simple to use with devastating effect in the hands of novices.

Functions Performed by Digital Automata (I) Collect –Programs that gather and store information in databases, such as search engine crawlers Filter –Programs that sort and classify information based on a given set of criteria Recommend –Programs that analyze information such as preferences to make recommendations Monitor –Programs that scan information to detect changes and respond, for example, by issuing an alert Find –Programs that autonomously conduct searches based on a set of given criteria

Functions Performed by Digital Automata (II) Process –Programs that perform regularly scheduled processes, such as with basic computer maintenance Transact –Programs that perform automated transactions, such as with auction bidding Simulate –Programs that simulate human activity such as speech, facial expressions, or motion. The representations may be realistic or stylized Learn –Programs that adapt to new information such that learning may occur Negotiate –Programs that negotiate with other programs in a multi-agent system