0% found this document useful (0 votes)
10 views

Copy of Digital _fluency_fullnotesP

Uploaded by

Preetham Gowda R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Copy of Digital _fluency_fullnotesP

Uploaded by

Preetham Gowda R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

DIGITAL FLUENCY

Table of Contents
Module 1: Emerging Technologies: Artificial Intelligence, Machine Learning and Deep Learning.........3
Artificial Intelligence............................................................................................................................3
Examples of Artificial intelligence...................................................................................................3
Artificial Intelligence application areas (Technological Landscape)...............................................4
Artificial Intelligence in Healthcare.................................................................................................4
Artificial Intelligence in Business Management...............................................................................4
Artificial Intelligence in E-commerce..............................................................................................5
Artificial Intelligence in Marketing..................................................................................................5
Machine Learning..................................................................................................................................5
Machine Learning Methods..............................................................................................................6
Deep Learning.......................................................................................................................................6
Deep-learning architectures..............................................................................................................6
Deep-learning application.................................................................................................................7
Neural Networks....................................................................................................................................7
Advantages of Artificial Intelligence................................................................................................8
Disadvantages of Artificial Intelligence...........................................................................................8
Module 2: Application of Emerging Technologies: Artificial Intelligence, Big Data Analytics, Internet
of Things, Cloud Computing and Cyber Security......................................................................................9
Big Data Analytics.................................................................................................................................9
Data...................................................................................................................................................9
Information.......................................................................................................................................9
Data management tasks....................................................................................................................9
Database..........................................................................................................................................10
Key terms to be known in database system...............................................................................10
Database Management System.......................................................................................................10
Data life Cycle................................................................................................................................10
Data life cycle framework..........................................................................................................10
Big Data Analytics..........................................................................................................................11
Data Analytics Process...............................................................................................................11
Sources of Big Data...................................................................................................................11
Advantages of DBMS.....................................................................................................................11
Disadvantages of DBMS................................................................................................................12
Data Science...................................................................................................................................12
Internet of Things (IOT)......................................................................................................................13
Industrial Internet of Things (IIoT)................................................................................................13
IoT Architecture..............................................................................................................................13
Parts of IoT.....................................................................................................................................13
Difference between IoT and IioT....................................................................................................14
Benefits of IIoT..............................................................................................................................15

Balaji A, Asst . Prof, GFGC Vemagal 1 of 32


Digitization.....................................................................................................................................15
IoT Programming............................................................................................................................15
Cloud Computing................................................................................................................................16
Application areas of Cloud Computing..........................................................................................16
Advantages of Cloud Computing...................................................................................................16
Disadvantages of Cloud computing................................................................................................16
Cloud Computing – Working Procedure........................................................................................18
Cloud Service models.....................................................................................................................19
Difference between IaaS, PaaS, and SaaS......................................................................................19
Types of Cloud................................................................................................................................20
Difference between public cloud, private cloud, hybrid cloud, and community cloud..................21
Cyber Security.....................................................................................................................................22
Areas of Cyber Security.................................................................................................................22
Information Security.......................................................................................................................22
Backup............................................................................................................................................22
Encryption......................................................................................................................................23
Cryptography..................................................................................................................................23
Firewalls.........................................................................................................................................23
Virtual Private Networks (VPNs)...................................................................................................23
E-commerce threats........................................................................................................................23
Steps to be taken to provide E-business security/ Protection from threats.....................................25
Types of Cyber Crime.....................................................................................................................27
Assignments.............................................................................................................................................29
Artificial Intelligence..........................................................................................................................29
Assignments to test assimilation of knowledge..............................................................................29
Practical Assignments using common tools...................................................................................29
Internet of Things................................................................................................................................29
Exercises to assess understanding of the concepts.........................................................................29
Practical Assignments using common tools...................................................................................30
Cyber Security.....................................................................................................................................30
Exercises to assess understanding of the concepts.........................................................................30
Practical Assignments using common tools...................................................................................30
Artificial Intelligence..........................................................................................................................30
Exercises to assess understanding of the concepts.........................................................................30
Practical Assignments.....................................................................................................................31
Internet of Things................................................................................................................................31
Exercises to assess understanding of the concepts.........................................................................31
Practical Assignments.....................................................................................................................31

Balaji A, Asst . Prof, GFGC Vemagal 2 of 32


Module 1: Emerging Technologies: Artificial Intelligence,
Machine Learning and Deep Learning.

Artificial Intelligence
Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with building smart
machines capable of performing tasks that typically require human intelligence.
Artificial intelligence are computer programs that are capable of:
1) Thinking and learning
2) Solve problems
3) Communicate
4) Interact with its surroundings.

Examples of Artificial intelligence


1. Face Detection and Recognition Technology

2. Text Editor
3. Social media
4. Chatbots
5. Recommendation algorithms in youtube
6. Search algorithms in Google, Bing etc.
7. Digital assistant like Apple’s siri, Google Assistant, Microsoft Cortana etc.

Balaji A, Asst . Prof, GFGC Vemagal 3 of 32


8. Smart home devices

Artificial Intelligence application areas (Technological Landscape)


1. Robotics
2. Real time translation
3. Digital Assistants like Google Maps
4. Gaming and Simulation (Augmented Reality and Virtual Reality)
5. Healthcare
6. Business

Artificial Intelligence in Healthcare


1. AI supports medical imaging analysis (Electronic Health Records- EHRs)
2. AI helps in decreasing cost to develop medicines
3. AI analyses unstructured Data
4. AI builds complex and consolidated platforms for drug discovery
5. AI can forecast kidney disease
6. AI provides valuable assistance to emergency medical staff
7. AI contributes to cancer research treatment, especially in radiation therapy
8. AI uses data collected for predictive analytics
9. AI accelerates the discovery and development of genetic medicines
10. AI supports health equity.

Artificial Intelligence in Business Management


1. Spam filters
2. Smart email categorisation
3. Voice to text features
4. Smart personal assistants, such as Siri, Cortana and Google Now
5. Automated responders and online customer support
6. Process automation
7. Sales and business forecasting
8. Security surveillance

Balaji A, Asst . Prof, GFGC Vemagal 4 of 32


9. Smart devices that adjust according to behaviour
10. Automated insights, especially for data-driven industries (eg financial services or e-commerce)

Artificial Intelligence in E-commerce


1. Smart searches and relevance features
2. Personalisation as a service
3. Product recommendations and purchase predictions
4. Fraud detection and prevention for online transactions
5. Dynamic price optimisation

Artificial Intelligence in Marketing


1. Recommendations and content curation
2. Personalisation of news feeds
3. Pattern and image recognition
4. Language recognition - to digest unstructured data from customers and sales prospects
5. Ad targeting and optimised, real-time bidding
6. Customer segmentation
7. Social semantics and sentiment analysis
8. Automated web design
9. Predictive customer service

Machine Learning
Machine learning (ML) is the study of computer algorithms that can improve automatically through
experience and by the use of data. It is seen as a part of artificial intelligence. Machine learning
algorithms build a model based on sample data, known as training data, in order to make predictions or
decisions without being explicitly programmed to do so.

Balaji A, Asst . Prof, GFGC Vemagal 5 of 32


Machine Learning Methods
1. Supervised Learning: Supervised learning (SL) is the machine learning task of learning a
function that maps an input to an output based on example input-output pairs. The parallel task
in human and animal psychology is often referred to as concept learning.
2. Semi-supervised learning: Semi-supervised learning is an approach to machine learning that
combines a small amount of labeled data with a large amount of unlabeled data during training.
3. Unsupervised Learning: Unsupervised learning is a type of algorithm that learns patterns from
untagged data. The hope is that through mimicry, which is an important mode of learning in
people, the machine is forced to build a compact internal representation of its world and then
generate imaginative content from it.
4. Reinforcement Learning: With reinforcement learning, the system discovers through trial and
error which actions yield the greatest rewards.

Deep Learning
Deep learning is a machine learning technique that teaches computers to do what comes naturally to
humans: learn by example. Deep learning is a key technology behind driverless cars, enabling them to
recognize a stop sign, or to distinguish a pedestrian from a lamppost. Learning can be supervised,
semi-supervised or unsupervised.

Deep-learning architectures
1. Deep neural networks
2. Deep belief networks
3. Deep reinforcement learning
4. Recurrent neural networks
5. Convolutional neural networks

Balaji A, Asst . Prof, GFGC Vemagal 6 of 32


Deep-learning application
1. Computer vision
2. Speech recognition
3. Natural language processing
4. Machine translation
5. Bioinformatics
6. Drug design
7. Medical image analysis
8. Material inspection
9. Board game programs

Neural Networks
A neural network is a series of algorithms that endeavors to recognize underlying relationships in a set
of data through a process that mimics the way the human brain operates.

Modelled loosely on the human brain, a neural net consists of thousands of simple processing nodes
that are densely interconnected. Most of today’s neural nets are organized into layers of nodes, and
they’re “feed-forward,” meaning that data moves through them in only one direction. An individual
node might be connected to several nodes in the layer beneath it, from which it receives data, and
several nodes in the layer above it, to which it sends data.

Balaji A, Asst . Prof, GFGC Vemagal 7 of 32


Advantages of Artificial Intelligence
1. Reduction in Human Error
2. Zero risks
3. 24x7 Availability
4. Digital Assistance
5. New Inventions
6. Unbiased decisions

Disadvantages of Artificial Intelligence


1. High Costs
2. No creativity
3. Increase in Unemployment
4. Make Humans Lazy
5. No Ethics

Balaji A, Asst . Prof, GFGC Vemagal 8 of 32


Module 2: Application of Emerging Technologies:
Artificial Intelligence, Big Data Analytics, Internet of
Things, Cloud Computing and Cyber Security.
Big Data Analytics
Data
• Data is raw fact or figures or entity.
• When activities in the organization takes place, the effect of these activities need to be recorded
which is known as Data.

Information
• Processed data is called information
• The purpose of data processing is to generate the information required for carrying out
the business activities.

Data management tasks


1. Data capture: Which is the task associated with gathering the data as and when they originate.
2. Data classification: Captured data has to be classified based on the nature and intended usage.
3. Data storage: The segregated data has to be stored properly.
4. Data arranging: It is very important to arrange the data properly
5. Data retrieval: Data will be required frequently for further processing, hence it is very important
to create some indexes so that data can be retrieved easily.
6. Data maintenance: Maintenance is the task concerned with keeping the data up- to-date.
7. Data Verification: Before storing the data it must be verified for any error.
8. Data Coding: Data will be coded for easy reference.
9. Data Editing: Editing means re-arranging the data or modifying the data for presentation.
10. Data transcription: This is the activity where the data is converted from one form into another.
11. Data transmission: This is a function where data is forwarded to the place where it would be
used further.

Balaji A, Asst . Prof, GFGC Vemagal 9 of 32


Database
• Database may be defined in simple terms as a collection of data
• A database is a collection of related data.
• The database can be of any size and of varying complexity.
• A database may be generated and maintained manually or it may be computerized.

Key terms to be known in database system


1. Field: Fields contain one piece of information of entry. E.g., in an address book each entry has
fields for first name, last name, address, phone number, e-mail, birth date etc. each unique type
of information is stored in its own field.
2. Record: One full set of fields i.e. all related information about one person or object is called
Record. For example, for an address book all the information for first person is one record and
the information for the second persons is called another record and so on.
3. Table: A complete collection of records is called a table. A table contains rows and columns.
Each column of a table represents field and each row represents record.
4. Metadata (metadata, or sometimes Meta information) is "data about data", of any sort in any
media.
5. Instances and schemes: The collection of information stored in the database at a particular
moment is called an Instance of database. The overall design of the database is called Scheme.

Database Management System


A Database Management System (DBMS) is a collection of program that enables user to create and
maintain a database.
The DBMS is hence a general purpose software system that facilitates the process of defining
constructing and manipulating database for various applications.

Data life Cycle


The data life cycle, also called the information life cycle, refers to the entire period of time that data
exists in your system. This life cycle encompasses all the stages that your data goes through, from first
capture onward.

Data life cycle framework


1. Data creation, ingestion or capture
2. Data processing
3. Data analysis

Balaji A, Asst . Prof, GFGC Vemagal 10 of 32


4. Data sharing or publication
5. Archiving

Big Data Analytics


Big data analytics is the use of advanced analytic techniques against very large, diverse data sets that
include structured, semi-structured and unstructured data, from different sources, and in different sizes
from terabytes to zettabytes.

Data Analytics Process


1. Data
2. Info
3. Insight
4. Analysis

Sources of Big Data


1. Social Data
2. Machine Data
3. Transactional Data
or
1. Social Networks
2. Media
3. Data warehouse
4. Sensors

Advantages of DBMS
Due to its centralized nature, the database system can overcome the disadvantages of the file system-
based system

Balaji A, Asst . Prof, GFGC Vemagal 11 of 32


1. Data independency: Application program should not be exposed to details of data representation
and storage. DBMS provides the abstract view that hides these details.
2. Efficient data access: DBMS utilizes a variety of sophisticated techniques to store and retrieve
data efficiently.
3. Data integrity and security: Data is accessed through DBMS, it can enforce integrity
constraints. E.g.: Inserting salary information for an employee.
4. Data Administration: When users share data, centralizing the data is an important task,
Experience professionals can minimize data redundancy and perform fine tuning which reduces
retrieval time.
5. Concurrent access and Crash recovery: DBMS schedules concurrent access to the data. DBMS
protects user from the effects of system failure.
6. Reduced application development time: DBMS supports important functions that are common
to many applications.

Disadvantages of DBMS
1. Higher data processing cost
2. Increasing hardware and software costs
3. Insufficient database expertise

Data Science
Data science is an interdisciplinary field that uses scientific methods, processes, algorithms and
systems to extract knowledge and insights from noisy, structured and unstructured data, and apply
knowledge and actionable insights from data across a broad range of application domains.

Balaji A, Asst . Prof, GFGC Vemagal 12 of 32


Internet of Things (IOT)
The Internet of things (IoT) describes physical objects (or groups of such objects) that are embedded
with sensors, processing ability, software, and other technologies that connect and exchange data with
other devices and systems over the Internet or other communications networks.

Industrial Internet of Things (IIoT)


The industrial internet of things (IIoT) refers to the extension and use of the internet of things (IoT) in
industrial sectors and applications. With a strong focus on machine-to-machine (M2M) communication,
big data, and machine learning, the IIoT enables industries and enterprises to have better efficiency and
reliability in their operations. The IIoT encompasses industrial applications, including robotics, medical
devices, and software-defined production processes.

IoT Architecture
1. Sensing Layer – Sensors, actuators, devices are present in this Sensing layer. These Sensors or
Actuators accepts data(physical/environmental parameters), processes data and emits data over
network.
2. Network Layer – Internet/Network gateways, Data Acquisition System (DAS) are present in
this layer. DAS performs data aggregation and conversion function (Collecting data and
aggregating data then converting analog data of sensors to digital data etc). Advanced gateways
which mainly opens up connection between Sensor networks and Internet also performs many
basic gateway functionalities like malware protection, and filtering also some times decision
making based on inputted data and data management services, etc.
3. Data processing Layer – This is processing unit of IoT ecosystem. Here data is analyzed and
pre-processed before sending it to data center from where data is accessed by software
applications often termed as business applications where data is monitored and managed and
further actions are also prepared. So here Edge IT or edge analytics comes into picture.
4. Application Layer (Data Center and Cloud)– This is last layer of 4 stages of IoT architecture.
Data centers or cloud is management stage of data where data is managed and is used by end-
user applications like agriculture, health care, aerospace, farming, defense, etc.

Parts of IoT
1. Sensors
2. Network connectivity
3. Data Storage

Balaji A, Asst . Prof, GFGC Vemagal 13 of 32


Difference between IoT and IioT
Sl.No IoT IIoT
1 It focuses on general applications ranging It focuses on industrial applications such as
from wearables to robots & machines. manufacturing, power plants, oil & gas, etc.
2 Its implementation starts with small scale It uses critical equipment & devices connected
level so there is no need to worry about life- over a network which will cause a life-
threatening situations. threatening or other emergency situations on
failure therefore uses more sensitive and
precise sensors
3 It deals with small scale networks. It deals with large scale networks.
4 It offers easy off-site programming. It can be programmed remotely i.e., offers
remote on-site programming.
5 It handles very high volume of data. It handles data ranging from medium to high
6 It requires identity and privacy. It requires robust security to protect the data.
7 It needs moderate requirements It needs stringent requirements.

Balaji A, Asst . Prof, GFGC Vemagal 14 of 32


8 It is having short product life cycle. It having very long life cycle.
9 It is less reliable. It has high- reliability

Benefits of IIoT
1. Improvement of Operational Performance
2. Ensuring Safety and Compliance
3. Increasing Flexibility and Agility

Digitization
Digitization is the process of converting information into a digital (i.e. computer-readable) format.

IoT Programming
IoT programming involves working with data to produce outcomes. Besides using programming
languages, well-known data analysis frameworks used in data science have a major role to play.

Balaji A, Asst . Prof, GFGC Vemagal 15 of 32


Cloud Computing
Cloud computing is a general term for anything that involves delivering hosted services over the
internet.

Application areas of Cloud Computing


1. Developing new applications and services
2. Storage, back up, and recovery of data
3. Hosting blogs and websites
4. Delivery of software on demand
5. Analysis of data
6. Streaming videos and audios

Advantages of Cloud Computing


1. Back-up and restore data: Once the data is stored in cloud, it is easier to get back-up and restore
that data using the cloud.
2. Improved collaboration: Cloud applications improve collaboration by allowing groups of people
to quickly and easily share information in the cloud via shared storage.
3. Excellent accessibility: Cloud allows us to quickly and easily store and access information
anytime, anywhere in the whole world, using an internet connection.
4. Low maintenance cost: Cloud computing reduces both hardware and software maintenance
costs for organizations.
5. Mobility: Cloud computing allows us to easily access all cloud data via any device.
6. Services in the pay-per-use model: Cloud computing offers Application Programming Interfaces
(APIs) to the users for access
7. services on the cloud and pays the charges as per the usage of service.
8. Unlimited storage capacity: Cloud offers a huge amount of storing capacity for storing
important data such as documents, images, audio, video, etc. in one place.
9. Data security: Cloud offers many advanced features related to security and ensures that data is
securely stored and handled.

Disadvantages of Cloud computing


Disadvantages of cloud computing

Balaji A, Asst . Prof, GFGC Vemagal 16 of 32


Despite the clear upsides to relying on cloud services, cloud computing carries its own challenges for
IT professionals:

1. Cloud security. Security is often considered the greatest challenge facing cloud computing.
When relying on the cloud, organizations risk data breaches, hacking of APIs and interfaces,
compromised credentials and authentication issues. Furthermore, there is a lack of transparency
regarding how and where sensitive information entrusted to the cloud provider is handled.
Security demands careful attention to cloud configurations and business policy and practice.
2. Cost unpredictability. Pay-as-you-go subscription plans for cloud use, along with scaling
resources to accommodate fluctuating workload demands, can make it tough to define and
predict final costs. Cloud costs are also frequently interdependent, with one cloud service often
utilizing one or more other cloud services -- all of which appear in the recurring monthly bill.
This can create additional unplanned cloud costs.
3. Lack of capability and expertise. With cloud-supporting technologies rapidly advancing,
organizations are struggling to keep up with the growing demand for tools and employees with
the proper skill sets and knowledge needed to architect, deploy, and manage workloads and data
in a cloud.
4. IT governance. The emphasis on do-it-yourself capability in cloud computing can make IT
governance difficult, as there is no control over provisioning, deprovisioning and management
of infrastructure operations. This can make it challenging to properly manage risks and security,
IT compliance and data quality.
5. Compliance with industry laws. When transferring data from on-premises local storage into
cloud storage, it can be difficult to manage compliance with industry regulations through a third
party. It's important to know where data and workloads are actually hosted in order to maintain
regulatory compliance and proper business governance.
6. Management of multiple clouds. Every cloud is different, so multi-cloud deployments can
disjoint efforts to address more general cloud computing challenges.
7. Cloud performance. Performance -- such as latency -- is largely beyond the control of the
organization contracting cloud services with a provider. Network and provider outages can
interfere with productivity and disrupt business processes if organizations are not prepared with
contingency plans.
8. Building a private cloud. Architecting, building and managing private clouds -- whether for its
own purpose or for a hybrid cloud goal -- can be a daunting task for IT departments and staff.
9. Cloud migration. The process of moving applications and other data to a cloud infrastructure
often causes complications. Migration projects frequently take longer than anticipated and go

Balaji A, Asst . Prof, GFGC Vemagal 17 of 32


over budget. The issue of workload and data repatriation -- moving from the cloud back to a
local data center -- is often overlooked until unforeseen cost or performance problems arise.
10. Vendor lock-in. Often, switching between cloud providers can cause significant issues. This
includes technical incompatibilities, legal and regulatory limitations and substantial costs
incurred from sizable data migrations.

Cloud Computing – Working Procedure


To understand the workings of a cloud system, it is easier to divide it into two sections: the front end
and the back end. They are connected to each other through a network, usually the Internet. The front
end is the side of the computer user or client. The back end is ‘the cloud’ section of the system.

The front end consists of the client’s computer or computer network. Also the application essential to
access the cloud system. It is not necessary that all cloud computing systems have the same user
interface. On the back end of the cloud technology system, there are various computers, servers and
data storage systems that make up the cloud. A cloud computing system could potentially include any
computer program, from data processing to video games. Generally, each application will have its own
dedicated server.

Balaji A, Asst . Prof, GFGC Vemagal 18 of 32


Cloud Service models
There are three types of cloud service models. They are as follows: -
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)

Difference between IaaS, PaaS, and SaaS


IaaS PaaS SaaS
It provides a virtual data center It provides virtual platforms and It provides web software and
to store information and create tools to create, test, and deploy apps to complete business tasks.
platforms for app development, apps.
testing, and deployment.
It provides access to resources It provides runtime environments It provides software as a service
such as virtual machines, virtual and deployment tools for to the end-users.
storage, etc. applications
It is used by network architects. It is used by developers. It is used by end users.
IaaS provides only Infrastructure PaaS provides Infrastructure + SaaS provides Infrastructure +
Platform. Platform + Software.

Balaji A, Asst . Prof, GFGC Vemagal 19 of 32


Types of Cloud

1. Public Cloud: Public cloud is open to all to store and access information via the Internet using
the pay-per-usage method. In public cloud, computing resources are managed and operated by
the Cloud Service Provider (CSP). Example: Amazon elastic compute cloud (EC2), IBM
SmartCloud Enterprise, Microsoft, Google App Engine, Windows Azure Services Platform.

2. Private Cloud: Private cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centers internally or by the third party. It can
be deployed using Opensource tools such as Openstack and Eucalyptus.

3. Hybrid Cloud: Hybrid Cloud is a combination of the public cloud and the private cloud. We
can say: Hybrid Cloud = Public Cloud + Private Cloud. Hybrid cloud is partially secure because

Balaji A, Asst . Prof, GFGC Vemagal 20 of 32


the services which are running on the public cloud can be accessed by anyone, while the
services which are running on a private cloud can be accessed only by the organization's users.
Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office 365 (MS
Office on the Web and One Drive), Amazon Web Services.

4. Community Cloud: Community cloud allows systems and services to be accessible by a group
of several organizations to share the information between the organization and a specific
community. It is owned, managed, and operated by one or more organizations in the
community, a third party, or a combination of them. Example: Health Care community cloud.

Difference between public cloud, private cloud, hybrid cloud, and


community cloud
Parameter Public Cloud Private Cloud Hybrid Cloud Community Cloud
Host Service Provider Enterprise (Third Party) Enterprise (Third Community (Third
Party) Party)
Users General Public Selected Users Selected Users Community Members
Access Internet Internet, VPN Internet, VPN Internet, VPN
Owner Service Provider Enterprise Enterprise Community

Balaji A, Asst . Prof, GFGC Vemagal 21 of 32


Cyber Security
Cyber security is the application of technologies, processes and controls to protect systems, networks,
programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect
against the unauthorised exploitation of systems, networks and technologies.

Areas of Cyber Security


1. Critical Infrastructure Security: This type of cybersecurity ensures that the digital infrastructure
of our vital public systems remains preserved and protected from any form of malignant misuse
such as keeping cyberattacks away from our hospitals, traffic lights, electricity grid, etc.
2. Application Security: Nowadays, when you have an app for nearly anything, it’s of vital
importance to keep the space secure. Application security does just that by building in all the
safety measures, such as encryption, firewalls, or anti-virus systems.
3. Network Security: Network security is an area of expertise primarily concerned with keeping
the network integrity preserved. In practice, this means performing due diligence to ensure that
the highest security standards and protocols protect networked data and systems.
4. Cloud Security: Even though cloud computing is usually considered the least secured space to
store your data, experts suggest that clouds are safer than traditional IT infrastructures. There
are nearly half as many attacks in the on-premise environments than in those serviced by a
provider. Generally, these providers are the biggest generators of cloud security tools that keep
the space safe.
5. Internet of Things (IoT) Security: The Internet of Things security is concerned with securing all
the devices connected to the internet. From security cameras to the smallest home appliances,
everything’s networked. Consequently, nearly everything can and should be clear of
vulnerabilities and protected from potential cyber intrusions.

Information Security
Information security is the practice of protecting information and information systems from
unauthorized disclosure, modification, and destruction. It encompasses the security of all IT resources,
including both University information and the IT devices that access, process, store, or transmit it

Backup
A backup is a copy of the data stored on a device. It's useful for restoring data if your device crashes or
continuing work if your device is lost or stolen.

Balaji A, Asst . Prof, GFGC Vemagal 22 of 32


Encryption
Encryption is the process of encoding messages or information in such a way that only authorized
parties can read it. Encryption does not of itself prevent interception, but denies the message content to
the interceptor

Cryptography
Cryptography is the science,practice and study of techniques for secure communication in the presence
of third parties.

Firewalls
Firewall is a network security system that controls the incoming and outgoing network traffic based on
an applied rule set. A firewall establishes a barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is assumed not to be secure and trusted. Firewalls exist both as
software to run on general purpose hardware and as a hardware appliance.

Virtual Private Networks (VPNs)


Virtual private network (VPN) extends a private network across a public network, such as the Internet.
It enables a computer or network-enabled device to send and receive data across shared or public
networks as if it were directly connected to the private network, while benefiting from the functionality,
security and management policies of the public network. A VPN is created by establishing a virtual
point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or
traffic encryption.

E-commerce threats
1. Tricking the Shopper: These attacks involve surveillance of the shopper's behavior, gathering
information to use against the shopper.A common scenario is that the attacker calls the shopper,
pretending to be a representative from a site visited, and extracts information.
2. Snooping the Shopper's Computer: A popular technique for gaining entry into the shopper's
system is to use a tool, such as SATAN, to perform port scans on a computer that detect entry

Balaji A, Asst . Prof, GFGC Vemagal 23 of 32


points into the machine. Based on the opened ports found, the attacker can use various
techniques to gain entry into the user's system. Upon entry, they scan your file system for
personal information, such as passwords.
3. Sniffing the Network: In this scheme, the attacker monitors the data between the shopper's
computer and the server. He collects data about the shopper or steals personal information, such
as credit card numbers.
4. Guessing Passwords: Another common attack is to guess a user's password. This style of
attack is manual or automated. Manual attacks are laborious, and only successful if the
attacker knows something about the shopper. For example, if the shopper uses their child's
name as the password. Automated attacks have a higher likelihood of success.
5. Using Known Server Bugs: The attacker analyzes the site to find what types of software are
used on the site. The sophisticated attacker finds a weakness in a similar type of software, and
tries to use that to exploit the system.
6. Using Server Root Exploits: Root exploits refer to techniques that gain super user access to the
server. This is the most coveted type of exploit because the possibilities are limitless. When you
attack a shopper or his computer, you can only affect one individual. With a root exploit, you
gain control of the merchants and all the shoppers' information on the site.
7. The Denial of Service (DoS): A denial of service (DoS) attack is a malicious attempt to make a
server or a network resource unavailable to users, usually by temporarily interrupting or
suspending the services of a host connected to the Internet.Denial of Service attack involves
flooding the target resource with external communication requests. This overload prevents the
resource from responding to legitimate traffic, or slows its response so significantly that it is
rendered effectively unavailable.
Resources targeted in a DoS attack can be a specific computer, a port or service on the targeted
system, an entire network, a component of a given network any system component.
8. Distributed Denial of Service (DDoS): DDoS attack, uses many devices and multiple Internet
connections, often distributed globally into what is referred to as a botnet. A DDoS attack is,
therefore, much harder to deflect, simply because there is no single attacker to defend from, as
the targeted resource will be flooded with requests from many hundreds and thousands of
multiple sources.

Balaji A, Asst . Prof, GFGC Vemagal 24 of 32


9. SQL Injection: SQL Injection is an attack method using the application vulnerability. If the
attacker has filled the data that include the vicious SQL query instruction in the web page form,
these query instruction together with HTML file will drill through the firewall and arrive to
web server. Once they are run at web server, the important information will be revealed or
modified.
10. Price Manipulation: This is a vulnerability that is almost completely unique to online
shopping carts and payment gateways. In the most common occurrence of this vulnerability,
the total payable price of the purchased goods is stored in a hidden HTML field of a
dynamically generated web page. An attacker can use a web application proxy such as Achilles
to simply modify the amount that is payable, when this information flows from the user's
browser to the web server. The final payable price can be manipulated by the attacker to a value
of his choice.
11. Session Hijacking: Session hijacking is the act of taking control of a user session after
successfully obtaining or generating an authentication session ID. Session hijacking involves

Balaji A, Asst . Prof, GFGC Vemagal 25 of 32


an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a
legitimate user's Web application session while that session is still in progress.
12. Cross-site script (XSS) (Cookie Theft): Cross-site scripting is an attack that takes advantage
of a Web site vulnerability in which the site displays malicious content .
13. Viruses: Have ability to replicate and spread to other files infecting them; most also deliver a
“payload” of some sort include macro viruses, file-infecting viruses, and script viruses
14. Worms: Designed to spread from computer tocomputer and occupies free space.
15. Trojan horse: Appears to be benign, but then does something other than expected.
16. Bots: Can be covertly installed on computer; responds to external commands sent by the
attacker.
17. EXE file: some times webmaster or system admin may forget to delete shopping cart exe
file which may detect by the attackers and if they are able to run exe file the entire file
would deleted from e- Commerce system.
18. Browser parasites: Can monitor and change settings of a user’s browser: Adware- Calls for
unwanted pop-up ads and Spyware- Can be use to obtain information, such as a user’s
keystrokes, e- mail, IMs, etc.
19. Spyware: Spyware is software that aims to gather information about a person or organization
without their knowledge and that may send such information to another entity without the
consumer's consent, or that asserts control over a computer without the consumer's knowledge.

Steps to be taken to provide E-business security/ Protection from threats


1. Personal Firewalls: A personal firewall helps protect our computer by limiting the types of
traffic initiated by and directed to our computer.
2. Antivirus Software: It is a computer software used to prevent, detect and remove malicious
software like virus and worms.
3. Anti-Spyware Software: Anti-spyware software programs can be used solely for detection and
removal of spyware
4. Data Back-up: process of backing up, refers to the copying and archiving of computer data so it
may be used to restore the original after a data loss event.
5. Encryption: Encryption is the process of encoding messages or information in such a way that
only authorized parties can read it.
6. Uninterruptible Power Supply (UPS): It is an electrical device that provides emergency power
during input power interruptions.A UPS is typically used to protect hardware such as
computers, data centers, telecommunication equipment or other electrical equipment where an

Balaji A, Asst . Prof, GFGC Vemagal 26 of 32


unexpected power disruption could cause injuries, fatalities, serious business disruption or data
loss.
7. Secure Socket Layer (SSL): Secure Socket Layer is a protocol that encrypts data between the
shopper's computer and the site's server.
8. PCI Standard Compliance: In 2004 five different credit card security programs merged to
form the Payment Card Industry Security Standards Council (PCI DSS) with the purpose of
creating an extra level of protection for card issuers making sure that merchants (both online
and brick and mortar) meet basic levels of security when storing, processing, and transmitting
cardholder data.
9. Digital Signatures and Certificates: Digital signatures meet the need for authentication and
integrity. This is a digital document issued by the CA (certification authority like VeriSign,
Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-
merchants and web-servers.
10. Password policies: Ensure that password policies are enforced for shoppers and internal users.
Ensure that passwords are sufficiently strong enough so that they cannot be easily
guessed.
11. Installing Recent Patches: Software bugs and vulnerabilities are discovered every day. Even
though many of them are discovered by security experts, rather than hackers, they may still
be exploited by hackers once they became a public knowledge. That's why it is
important to install all software patches as soon as they become available.
12. Intrusion Detection and Audits of Security Logs: One of the cornerstones of an effective
security strategy is to prevent attacks and to detect potential attackers. Like if a shopper makes
6 failed logon attempts, then his account is locked out. In this scenario, the company sends an
email to the customer, informing them that his account is locked. This event should also be
logged in the system, either by sending an email to the administrator, writing the event to a
security log, or both.
13. Physical Security: Do not allow unauthorized access to to computer system containing sensitive
information.

Types of Cyber Crime


1. Hacking: It is the most common type of cyber crime being committed across the world.
Hacking has been defined in Sec 66 of The Information Technology Act, 2000 as follows
“whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any information residing in a computer
resource or diminishes its value or utility or affects its injuriously by any means commits
hacking”.

Balaji A, Asst . Prof, GFGC Vemagal 27 of 32


2. Punishment for hacking under the above mentioned section is imprisonment for three years or
fine which may extend up to 2 lakhs rupees or both.
3. Cracking: The term ‘Cracking’ means, illegal access’. Now ‘access’ comprises the entering of
the whole or any part of a computer system (hardware, components, stored data of the system
installed, directories, traffic and content-related data. It does not include the mere sending of an
e-mail message. Access includes the entering of another computer, system, where it is
connected via public telecommunication networks or to a computer on the same network, such
as a LAN or Intranet within an organization.
4. Security Related Crimes: With the growth of the Internet, network security has become a major
concern. Private confidential information has become available to the public. Confidential
information can reside in two states on the network. It can reside on the physical stored media,
such as hard drive or memory or it can reside in the transit across the physical network wire in
the form of packets. These two information states provide opportunities for attacks from users
on the internal network, as well as users on the internet.
5. Network Packet Snifters: Network computers communicate serially where large information
pieces are broken into smaller ones. The information stream would be broken into smaller
pieces even if networks communicated in parallel. These smaller pieces are called network
packets. Since these network packets are not encrypted they can be processed and understood
by any application that can pick them off the network and process them, A network protocol
specifies how packets are identified and labeled which enables a computer to determine whether
a packet is intended for it. A packet snifter can provide its users with meaningful and often
sensitive information such as user account names and passwords.
6. Internet Protocol Spoofing: An IP attack occurs when an attacker outside the network pretends
to be a trusted computer either by using an IP address that is within its range or by using an
external IP address that you trust and to which you wish to provide access to specified resources
on your network. Normally an IP spoofing attack is limited to the injection of data or commands
into an existing stream of data passed between clients and server application or a peer to peer
network connection.
7. Password attacks: Password attacks can be implemented using several different methods like
the brute force attacks, Trojan horse programmes. IP spoofing can yield user accounts and
passwords. Password attacks usually refer to repeated attempts to identify a user password or
account. This attack requires that the attacker have access to network packets that come across
the networks.
8. Fraud on the Internet: This is a form of white collar crime. Internet fraud is a common type of
crime whose growth has been proportionate to the growth of internet itself. The internet
provides companies and individuals with the opportunities of marketing their products on the
net. It is easy for people with fraudulent intention to make their messages look real and credible.

Balaji A, Asst . Prof, GFGC Vemagal 28 of 32


9. Online Investment newsletters: Many newsletters on the internet provide the investors with free
advice recommending stocks where they should invest. Sometimes these recommendations are
totally bogus and cause loss to the investors.
10. Bulletin Boards: This is a forum for sharing investor information and often fraud is perpetrated
in this zone causing loss of millions who bank on them.
11. E-mail scans: Since junk mail (E-mail which contains useless materials) is easy to create,
fraudsters often find it easy to spread bogus investment schemes or spread false information
about a company.
12. Credit card fraud: With the electronic commerce rapidly becoming a major force in national
economies it offers rich pickings for criminals prepared to undertake fraudulent activities.
Sometimes like a half a billion dollars is lost to consumers in card fraud alone.
13. Publishing of false digital signature: According to sec 73 of the I.T. Act 2000, if a person knows
that a digital signature certificate is erroneous in certain particulars and still goes ahead and
publishes it, is guilty of having contravened the Act. He is punishable with imprisonment for a
term that may extend to two years or with fine of a lakh rupee or with both.
14. Making available digital signature for fraudulent purpose: This is an offence punishable under
sec 74 of the above mentioned act, with imprisonment for a term that may extend to two years
or with fine of two lakh rupees or with both.
15. Alteration and destruction of digital information: The corruption and destruction of digital
information is the single largest menace facing the world of computers. Virus just as a virus can
infect the human immunity system there exist programmes, which can, destroy or hamper
computer system.

Balaji A, Asst . Prof, GFGC Vemagal 29 of 32


Assignments
Artificial Intelligence
Assignments to test assimilation of knowledge
1. Write three situations in your daily life, where AI is coming to your aid.
2. Can you think of how AI can be used to make life easier for senior citizens? Mention a few
instances.

Practical Assignments using common tools


1. Using any popular search-engine (Google, Bing), type any word in the search-box, and note
down the automatic suggestions that are being displayed. Note down how many of these are
topically relevant or related to current happenings.
2. Use any word-processor to type a small report on any topic or type a small SMS on your
smartphone. Deliberately make spelling mistakes, or grammatical mistakes. Note down the
suggestions that are being offered by the in-built spell-check utility.
3. Identify a few websites/portals which use chatbots to enhance user experience.
4. Install any activity tracker on your android smart-phone and study which health parameters it
monitors.
5. Using any search-engine, find out which Indian healthcare companies have products that use AI
and make a list of the same, with the features that they offer.
6. Use Google translate to get translations from English to Kannada/Hindi/Marathi, and vice versa.
7. Use Google assistant on any android smartphone to dictate commands and to launch apps, You
can try this in your local language.
8. Download the NASA simulator on your smartphone and find out about our solar system and
outer space through simulations.

Internet of Things
Exercises to assess understanding of the concepts
1. You go to a shopping mall and purchase some provisions. You are a regular customer of the
mall. Where do you think IoT can be used in this scenario? List out the possibilities.
2. In what ways can you use IoT in your home to make tasks easier? Find out a few available IoT
products that can be used in homes?

Balaji A, Asst . Prof, GFGC Vemagal 30 of 32


3. How can you use IoT to make your classroom experience better?
4. List out the different ways in which IoT can make the process of evaluating skills and help in
conducting examinations?

Practical Assignments using common tools


1. Using any popular search-engine (Google, Bing), find out how the automotive industry is using
IoT to increase productivity on the shopfloor.
2. Search and compare a few popular IoT tools and devices S currently being used.
Note: The trainer is instructed to encourage the students to work in groups of 02-03 and discuss
the above exercises before submitting the same

Cyber Security
Exercises to assess understanding of the concepts
1. You have CCTV cameras installed in your home. You are able to remotely monitor the CCTV
footage on your mobile from anywhere. Do you think your CCTV footage can be intercepted
and viewed by hackers?
2. You use your mobile to pay for services online through internet banking or using debit card.
You do not have any antivirus program installed on your mobile. Do you think it is possible for
hackers to get access to your password/CVV without you sharing the info?

Practical Assignments using common tools


1. Find out which are the most popular free antivirus apps and VPN apps available for your
mobile. Compare any two of each.
2. Install any free antivirus app on your mobile and note the features of the app.
3. Install any free VPN app on your mobile, and visit your favourite (regularly visited) websites.
4. Note down any difference in the experience before and after installing the VPN app

Artificial Intelligence
Exercises to assess understanding of the concepts
1. When shopping online, observe the different ways in which AI is being used to influence your
purchasing decisions. What are the advantages and disadvantages of this?
2. Suggest different ways in which AI can be used to enhance your experience when you go to eat
out in a restaurant.

Balaji A, Asst . Prof, GFGC Vemagal 31 of 32


3. Note down the different ways in which we use Artificial Intelligence in our daily lives.

Practical Assignments
Refer to practical assignments of Module 1 – Artificial Intelligence for some background.
1. Find out which apps in your smartphones use AI and how?
2. Install Google lens on your smartphone and explore the different ways in which the app uses
AI.
3. Use the free version of the ELSA app on your android phone to improve your English.
Note: The trainer is instructed to encourage the students to work in groups of 02-03 and discuss
the above exercises before submitting the same

Internet of Things
Exercises to assess understanding of the concepts
1. In what ways can IoT technology be used to implement a smart building?
2. Do smartphones incorporate IoT? If yes, cite some examples.

Practical Assignments
Refer to practical assignments of Module 1 – Internet of Things for some background.
1. Using Whatsapp on your smartphone, share your location with a friend to set up a meeting. Try
using live location.
2. Using any fitness app on your smart phone, walk for 5 minutes and find out the number of steps
used and trace the path that you have walked.

Balaji A, Asst . Prof, GFGC Vemagal 32 of 32

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy