EID 100 Lecture Notes - Lecture 1: Big Data, Digitizing, Reddit

146 views5 pages
Privacy, Security, Intellectual Property
Security video
Concept of a burglar choosing a house and will get deterred looing secure
Online how would a hacker decide what to hack?
o Write a script to try every password combinations
Digitizing security
What does the digital space offer us?
o How you store a diamond?
Security cameras, monitor, bury it, a safe, a wall
o You would look at multiple layers of security in the digital security
Encryption, servers, monitoring
Easiest way to infiltrate a digital system?
Enter the facility
People are the easiest to infiltrate
Big data
Large amounts of data used to identify trends and patterns
What is the difference between information and data?
o If you interpret it, it becomes information
o Ie. Data : 10101011001 takeoff and landing pattern of an airport and becomes
information
Data
o When you see patterns and you interpret it, then it becomes information
Information
o When it has trends and patterns, it becomes knowledge
Knowledge
o When you can use it in other disciplines, it becomes wisdom
Wisdom
o Something actionable across all areas
Correlation does not mean causation
What we do with big data?
o Social imperatives what happens when more people use snapchat
o Business imperatives implement ads to generate revenue
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in
The big Vs of data
Velocity the speed at which data is created
Volume the amount of data that is created
Variety the variety of data that is created
Ie the geolocation of data for instance, as more ppl buy phones more data is produced and can include
call logs, messages etc.
Hacking in class
1. Ashley Madison
a. Users information on a site to cheat on spouse were released
2. Tesla
a. Soeoe ould otrol our ar eterall ut it’s ot a ig deal eause ou still need to
physically access the car to upload malware
b. No signifiers that the car was hacked though
3. Xcode ghost
a. iOS apps need an application called Xcode to create said applications
b. people would download a version of Xcode with an added code resulting in apps with
malware
c. Where was the digital divide?
i. Geography - the main application store in SF
ii. Money people who cannot afford internet connection in San Francisco
Concepts highlighted ** test
Vertical and horizontal
data moving between platforms : vertical
data moving between applications: horizontal
Intellectual property
Publishing on the app store, who owns it
Pseudonymity
Pseudonymity - puli aout soe opiios, ut people o’t fid ou eessaril ut the a
associate your image/stage name/logo and find your performative presence
Identity the account is 100% you
Anonymity anonymous, no one knows who you are
Permanence - data is permanent
Ephemeral - not lasting, not tangible (Snapchat)
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Security video: concept of a burglar choosing a house and will get deterred looing secure, online how would a hacker decide what to hack, write a script to try every password combinations. Data : 10101011001 takeoff and landing pattern of an airport and becomes information: data, when you see patterns and you interpret it, then it becomes information. Information: when it has trends and patterns, it becomes knowledge, knowledge, when you can use it in other disciplines, it becomes wisdom, wisdom, something actionable across all areas. Correlation does not mean causation: what we do with big data, social imperatives what happens when more people use snapchat, business imperatives implement ads to generate revenue. Velocity the speed at which data is created. Volume the amount of data that is created. Variety the variety of data that is created. Ie the geolocation of data for instance, as more ppl buy phones more data is produced and can include call logs, messages etc.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents