Presentation is loading. Please wait.

Presentation is loading. Please wait.

Safeguarding Computer Systems

Similar presentations


Presentation on theme: "Safeguarding Computer Systems"— Presentation transcript:

1 Safeguarding Computer Systems
Security Safeguarding Computer Systems Protecting computers from power-relate problems power surges & power outages autosave uninterruptible power supply (UPS) Module B A UPS is battery powered device that provides power to your computer for a limited time in a power outage

2 Safeguarding Computer Systems
Security Safeguarding Computer Systems Controlling access callback systems tokens digital certificates smartcards biometric authentication Module B Smartcards are credit-card-sized devices wit their own internal memories

3 Safeguarding Computer Systems
Security Safeguarding Computer Systems Firewalls Encryption Antivirus programs or vaccines Data backups full backups incremental backups disaster recovery plan Module B

4 Current Issues and Controversies
Module The Encryption Debate Obscenity and Indecency Privacy C

5 Current Issues & Controversies
The scenario . . . Module C Identity theft is one of the fastest-growing crimes in the U.S. and Canada. Criminals obtain enough information about you to open a credit account in your name, and then max it out -- leaving you with the bill.

6 The Encryption Debate Encryption (coded message) basics
Current issues & controversies The Encryption Debate Encryption (coded message) basics rot-13 Problem of key interception Public-key encryption public-key Module C For more information concerning public-key encryption, visit the RSA Laboratories’ Frequently-Asked Questions on Cryptography page

7 The Encryption Debate Security issues of strong encryption
Current issues & controversies The Encryption Debate Security issues of strong encryption key escrow key recovery Export restrictions bit length Global dimension Module C To get the latest news and perspectives about cryptography issues, visit the Center for Democracy and Technology’s Crypto Debate page

8 Obscenity & Indecency Obscenity Indecency
Current issues & controversies Obscenity & Indecency Obscenity Indecency Communications Decency ACT (CDA) Filtering software World Wide Web Consortium (W3C) Platform for Internet Content Selection (PICS) The Global Dimension Module C

9 Current issues & controversies
Obscenity & Indecency Net Nanny is one example of filtering software that enables parents to screen out Web sites that contain indecent or obscene material Module C

10 Current issues & controversies
Privacy Module C Defined by U.S. Supreme Court Justice Louis Brandeis in 1928 as “the right to be left alone,” privacy refers to an individual’s ability to keep their personal and family business away from prying eyes

11 Privacy Privacy rights in the U.S. Databases of personal information
Current issues & controversies Privacy Privacy rights in the U.S. Databases of personal information How is information collected? Is self-regulation sufficient? Proposed solutions Platform for Privacy Preferences (P3) The Global Dimension Module C

12 Protecting Your Privacy Online
Current issues & controversies Protecting Your Privacy Online To safeguard your privacy . . . Don’t use your employer’s computers for personal Tell children not to divulge personal information to strangers online Don’t fill out site registration forms unless you see a privacy policy statement Module C Web sites can collect information without your knowledge and consent. To see an example, visit the Center for Democracy and Technology’s CDT Privacy Demonstration Page

13 Emerging Technologies
Module Tomorrows Hardware: Faster, Cheaper, Connected Artificial Intelligence: Toward the Smart Machine? Social Impact of AI: Sharing the World with Machines Who Think D

14 Emerging Technologies
The prediction . . . Module D What will computers be like in the future? It’s very easy to predict the future -- the hard part is getting it right, and that’s particularly true where technology is concerned. Past predictions don’t offer much comfort . . .

15 Tomorrow’s Hardware: Faster, Cheaper, Connected
Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D Moore’s Law Metcalfe’s Law As computers become faster, cheaper, and more valuable, they’ll encourage the trend towards the digitization of all the world’s information and knowledge

16 The Short Term Typical personal computer: Today & 2005 D
Emerging technologies The Short Term Typical personal computer: Today & 2005 Module D

17 Tomorrow’s Hardware: Faster, Cheaper, Connected
Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D The long term ubiquitous (everywhere) computing Limits of trend extrapolation

18 Artificial Intelligence: Toward the Smart Machine
Emerging technologies Artificial Intelligence: Toward the Smart Machine Defining intelligence learn and retain the learned knowledge reason on the basis of the knowledge plan (develop strategies) communicate recognize patterns Module D For information on artificial intelligence, an excellent starting point is AI on the Web.

19 Artificial Intelligence: Toward the Smart Machine
Emerging technologies Artificial Intelligence: Toward the Smart Machine AI is the field that attempts to endow computers with intelligence. Although scientists know little about the human brain, it's clear that the brain is far more complex than any computer Module D

20 The Human Brain As a CPU Speculative estimates D Emerging technologies
Module D

21 Emerging technologies
The Turing Test British computer scientist Alan Turing. According to most psychologists, the Turing Test's type-and-response method is too simplistic. Module D

22 Artificial Intelligence
Emerging technologies Artificial Intelligence Brute force AI achievements On May 11, 1997, Big Blue defeated Russian chess master Garry Kasparov Module D

23 Artificial Intelligence
Emerging technologies Artificial Intelligence Module D Natural language speech recognition Major advances have been made in speech recognition, in which computers translate spoken speech into text

24 Artificial Intelligence
Emerging technologies Artificial Intelligence Machine translation Expert systems knowledge representation knowledge base Intelligent agents Pattern recognition Fuzzy logic Module D Try machine translation yourself by visiting Babelfish, an online Web translator created by AltaVista

25 Robots Emerging technologies Increasingly, robots are performing tasks such as assembly, welding, material-handling, and material transport Module D Like to build your own robot? Visit Mondo-Tronics Robot Store where you’ll find nearly 300 robot kits and accessories

26 Artificial Intelligence
Emerging technologies Artificial Intelligence Strong AI CYC Cog neural networks genetic algorithms Module D The brain contains billions neurons. In a neural net, thousands of computer processing units are connected in multiple ways, just as the neurons in the brain are connected

27 Social Impact of AI: Sharing the World with Machines Who Think
Emerging technologies Social Impact of AI: Sharing the World with Machines Who Think Asimov’s Three Laws of Robotics First: A robot may not injure a human being . . . Second: A robot must obey the orders given it by human beings except where it may conflict with the First Law Third: A robot must protect its own existence as long as such protection does not conflict with the First or Second Law Module D


Download ppt "Safeguarding Computer Systems"

Similar presentations


Ads by Google