EID 100 Lecture Notes - Lecture 1: Big Data, Digitizing, Reddit
Privacy, Security, Intellectual Property
Security video
• Concept of a burglar choosing a house and will get deterred looing secure
• Online – how would a hacker decide what to hack?
o Write a script to try every password combinations
Digitizing security
• What does the digital space offer us?
o How you store a diamond?
▪ Security cameras, monitor, bury it, a safe, a wall
o You would look at multiple layers of security in the digital security
▪ Encryption, servers, monitoring
▪ Easiest way to infiltrate a digital system?
• Enter the facility
• People are the easiest to infiltrate
Big data
• Large amounts of data used to identify trends and patterns
• What is the difference between information and data?
o If you interpret it, it becomes information
o Ie. Data : 10101011001 → takeoff and landing pattern of an airport and becomes
information
• Data
o When you see patterns and you interpret it, then it becomes information
• Information
o When it has trends and patterns, it becomes knowledge
• Knowledge
o When you can use it in other disciplines, it becomes wisdom
• Wisdom
o Something actionable across all areas
Correlation does not mean causation
• What we do with big data?
o Social imperatives → what happens when more people use snapchat
o Business imperatives → implement ads to generate revenue
find more resources at oneclass.com
find more resources at oneclass.com
The big Vs of data
Velocity – the speed at which data is created
Volume – the amount of data that is created
Variety – the variety of data that is created
Ie → the geolocation of data for instance, as more ppl buy phones more data is produced and can include
call logs, messages etc.
Hacking in class
1. Ashley Madison
a. Users information on a site to cheat on spouse were released
2. Tesla
a. Soeoe ould otrol our ar eterall ut it’s ot a ig deal eause ou still need to
physically access the car to upload malware
b. No signifiers that the car was hacked though
3. Xcode ghost
a. iOS apps need an application called Xcode to create said applications
b. people would download a version of Xcode with an added code resulting in apps with
malware
c. Where was the digital divide?
i. Geography - the main application store in SF
ii. Money – people who cannot afford internet connection in San Francisco
Concepts highlighted ** test
Vertical and horizontal
• data moving between platforms : vertical
• data moving between applications: horizontal
Intellectual property
Publishing on the app store, who owns it
Pseudonymity
• Pseudonymity - puli aout soe opiios, ut people o’t fid ou eessaril ut the a
associate your image/stage name/logo and find your performative presence
• Identity – the account is 100% you
• Anonymity – anonymous, no one knows who you are
• Permanence - data is permanent
• Ephemeral - not lasting, not tangible (Snapchat)
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Security video: concept of a burglar choosing a house and will get deterred looing secure, online how would a hacker decide what to hack, write a script to try every password combinations. Data : 10101011001 takeoff and landing pattern of an airport and becomes information: data, when you see patterns and you interpret it, then it becomes information. Information: when it has trends and patterns, it becomes knowledge, knowledge, when you can use it in other disciplines, it becomes wisdom, wisdom, something actionable across all areas. Correlation does not mean causation: what we do with big data, social imperatives what happens when more people use snapchat, business imperatives implement ads to generate revenue. Velocity the speed at which data is created. Volume the amount of data that is created. Variety the variety of data that is created. Ie the geolocation of data for instance, as more ppl buy phones more data is produced and can include call logs, messages etc.