CCC - Course on Computer Concept - Overview of Future Skills and Cyber Security – CHAPTER 9
Overview of Future Skills and Cyber Security – CHAPTER 9
Introduction to Internet of Things
The IoT can be viewed as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ICT).
Characteristics of IoT
Interconnectivity: With regard to the IoT, anything can be interconnected with the global information and communication infrastructure.
Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware platforms and networks. They can interact with other devices or service platforms through different networks.
Dynamic changes: The state of devices change dynamically, e.g., sleeping and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.
Features of IoT:
There are following features of IoT:
- Communicating objects based on internet technologies
- Detection, identification and location of physical objects
- Communication through connectivity
- Every physical object must be equipped with an IPv6-address.
Some real world Example of IoT Application:
1. Smart Cities
The Internet of Things (IoT) offers new opportunities for cities to use data to manage traffic, make better use of infrastructure and keep citizens safe. The objective of Smart city would be to use technology to offer services that are intelligent, advanced, affordable and accessible.
2. Smart Home
In smart home, all necessary things like switches, lights, AC (all electronic equipments) are controlled by Mobile application or Personnel computer. This technology provides homeowners security, comfort, convenience and energy efficiency by allowing them to control smart devices, often by a smart home app on their smartphone or other networked devices.
3. Healthcare
The internet of things has numerous applications in healthcare, from remote monitoring to smart sensors and medical device integration. The body functions monitoring sensors are connected to the network to update the doctor or the hospital about the patient’s real-time status like heart beat status or liver functioning etc. Also in the critical situations an ambulance can be called automatically.
4. Agriculture
Applications of IoT in Agricultural systems are very useful for the formers. It helps in checking of soil moisture, nutrient and PH levels in the field. It also helps in weather forecasting, water requirement for crops etc. A system is built for monitoring the crop field with the help of sensors (light, humidity, temperature, soil moisture, etc.). The realtime data about the soil and crop status is being monitored by the farmer like the farmer gets a notification about watering the crops etc.
What is Big Data Analytics?
Big data analytics describes the process of uncovering trends, patterns, and correlations in large amounts of raw data to help make data-informed decisions.
These processes use familiar statistical analysis techniques—like clustering and regression—and apply them to more extensive datasets with the help of newer tools.
How big data analytics works
1. Collect Data
Data collection looks different for every organization. With today’s technology, organizations can gather both structured and unstructured data from a variety of sources — from cloud storage to mobile applications to in-store IoT sensors and beyond. Some data will be stored in data warehouses where business intelligence tools and solutions can access it easily. Raw or unstructured data that is too diverse or complex for a warehouse may be assigned metadata and stored in a data lake.
2. Process Data
Once data is collected and stored, it must be organized properly to get accurate results on analytical queries, especially when it’s large and unstructured. Available data is growing exponentially, making data processing a challenge for organizations. One processing option is batch processing, which looks at large data blocks over time. Batch processing is useful when there is a longer turnaround time between collecting and analyzing data. Stream processing looks at small batches of data at once, shortening the delay time between collection and analysis for quicker decision-making. Stream processing is more complex and often more expensive.
3. Clean Data
Data big or small requires scrubbing to improve data quality and get stronger results; all data must be formatted correctly, and any duplicative or irrelevant data must be eliminated or accounted for. Dirty data can obscure and mislead, creating flawed insights.
4. Analyze Data
Getting big data into a usable state takes time. Once it’s ready, advanced analytics processes can turn big data into big insights. Some of these big data analysis methods include:
Data mining sorts through large datasets to identify patterns and relationships by identifying anomalies and creating data clusters.
Predictive analytics uses an organization’s historical data to make predictions about the future, identifying upcoming risks and opportunities.
Deep learning imitates human learning patterns by using artificial intelligence and machine learning to layer algorithms and find patterns in the most complex and abstract data.
Big data is a term, used to refer data sets that are too large or complex. For processing of this type of data sets use special type of application software. Big data was originally associated with three key concepts: Volume, Variety and Velocity.
Characteristics Big data can be described by the following characteristics:
Volume
Volume defines the quantity of generated and stored data. The size of the data determines its value and its type to understand whether data can be considered as Big data or not.
Variety
Variety defines the type and nature of the data. This helps user to effectively use that data. Big data is combination of text, images, audio and video.
Velocity
Velocity defines the speed at which the data is generated and processed to fulfill the demands and challenges. Big data is often available in real-time. Compared to small data, big data are produced more continually. Two types of velocity related to big data are the frequency of generation and the frequency of handling, recording, and publishing.
Big Data Types
Mainly, there are three types of Big Data, as given below:
Structured Data:- The structured data can be stored in a tabular column. Examples of structured data are Relational databases.
Unstructured Data:- The unstructured data can be stored in a tabular column. Examples of unstructured data are audio, video etc.
Semi-structured Data:- The semi-structured data contains both structured and unstructured data. Examples of Semi-structured Data are XML data, JSON files, and others.
What is cloud computing?
Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS).
Benefits of cloud computing
Agility
The cloud gives you easy access to a broad range of technologies so that you can innovate faster and build nearly anything that you can imagine. You can quickly spin up resources as you need them–from infrastructure services, such as compute, storage, and databases, to Internet of Things, machine learning, data lakes and analytics, and much more.
You can deploy technology services in a matter of minutes, and get from idea to implementation several orders of magnitude faster than before. This gives you the freedom to experiment, test new ideas to differentiate customer experiences, and transform your business.
Elasticity
With cloud computing, you don’t have to over-provision resources up front to handle peak levels of business activity in the future. Instead, you provision the amount of resources that you actually need. You can scale these resources up or down to instantly grow and shrink capacity as your business needs change.
Cost savings
The cloud allows you to trade capital expenses (such as data centers and physical servers) for variable expenses, and only pay for IT as you consume it. Plus, the variable expenses are much lower than what you would pay to do it yourself because of the economies of scale.
Deploy globally in minutes
With the cloud, you can expand to new geographic regions and deploy globally in minutes. For example, AWS has infrastructure all over the world, so you can deploy your application in multiple physical locations with just a few clicks. Putting applications in closer proximity to end users reduces latency and improves their experience.
Types of cloud computing
Infrastructure as a Service (IaaS)
IaaS contains the basic building blocks for cloud IT. It typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space. IaaS gives you the highest level of flexibility and management control over your IT resources. It is most similar to the existing IT resources with which many IT departments and developers are familiar.
Platform as a Service (PaaS)
PaaS removes the need for you to manage underlying infrastructure (usually hardware and operating systems), and allows you to focus on the deployment and management of your applications. This helps you be more efficient as you don’t need to worry about resource procurement, capacity planning, software maintenance, patching, or any of the other undifferentiated heavy lifting involved in running your application.
Software as a Service (SaaS)
SaaS provides you with a complete product that is run and managed by the service provider. In most cases, people referring to SaaS are referring to end-user applications (such as web-based email). With a SaaS offering, you don’t have to think about how the service is maintained or how the underlying infrastructure is managed. You only need to think about how you will use that particular software.
Cryptography
The term cryptography is a Greek word which means "secret writing". Cryptography involves the process of encryption and decryption. Cryptography is the art of secret writing. Cryptography enables to send information between participants in a way that prevents others from reading it.
3D Printing/ Additive Manufacturing
3D printing is a processes in which material is joined or solidified under computer control to create a three-dimensional object, with material being added together (such as liquid molecules of plastic like material or powder grains being mixed together), typically layer by layer. Initially, 3D printing was a rapid prototyping technique mainly used for production of functional prototype of any design/ model/ object. Today, repeatability and material range have increased to the point that 3D printing is considered as an industrial production technology, with the name of additive manufacturing. 3D printed objects can have a very complex shape or geometry and are always produced starting from a digital 3D model or a CAD file. Even artificial limbs are also been made using 3D Printing giving a revolution in medical science also.
Characteristics of 3D printing:
- Objects are created by adding or depositing layers of material, not subtracting or cutting out pieces from a block of material.
- Because objects are created by adding layers, the computer file with details about model must be converted into slices the printer will create layer by layer.
- Printing a three-dimensional object can take hours or days to complete, depending on the complexity and size of the object.
- Cost is based on materials used, among other factors
Robotics Process Automation
Robotics Process Automation (RPA) can be used to automate workflow, infrastructure and backend office process which are mainly person dependent. The RPA is a software program which runs on an end user's pc, laptop or mobile device. The main goal of Robotics process automation process is to replace repetitive and boring clerical task performed by any person, with a virtual work environment. Emergence of AI has given a boom to RPA.
Application of RPA
- Healthcare: - For Patient registration and Billing.
- Insurance: - For Claims processing & clearance and premium Information.
- Travel & Logistic: - For Ticket booking, Passenger Details and Accounting.
- Government: - For Change of Address and License Renewal.
- Banking and Financial Services: - For Cards activation and Frauds claims.
Cyber Security
Internet security relies on specific resources and standards for protecting data that gets sent through the internet. This includes various kinds of encryption such as Pretty Good Privacy(PGP). Other aspects of a secure web setup includes firewalls, which block unwanted traffic, anti-malware, anti-spyware & anti-virus programs that work from specific networks or devices to monitor internet traffic for dangerous attachments. Internet security is generally becoming a top priority for both businesses & governments. Good internet security protects financial details & much more of what is handle by a business or agency’s servers & network hardware. Insufficient internet security can threaten to collapse an e-commerce business or any other operation where data gets routed over the web.
Web security may be termed as technological & managerial procedures applied to computer systems to ensure the availability, integrity & confidentiality of computer assets & services from associated threats & vulnerabilities.
Concept of Internet Security :
Three basics security concepts important to inforation on the internet are confidentiality, integrity, &availability. Concepts relating to the people who use that information are authentication, authorization & non-repudiation. Integrity and confidentiality can also be enforced on web services through the use of transport layer security(TLS).both SSL and TSL are the same.
1) Integrity
The concept of integrity is divided in 2 forms:
A) Data integrity:
this property, that data has not been altered in an unauthorized manner while in storage, during processing or while in transit. another aspect of data integrity is the assurances that data can only be accessed and altered by those authorized to do so. often such integrity is insured by use of a number referred to as message integrity code or message authentication code. This are abbreviated as MIC and MAC respectively.
B) System integrity:
This quality states that a system has when performing the intended function in an unimpaired manner, is free from unauthorized manipulation. Integrity is commonly an organizations most important security objective, after availability. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers ,air traffic control ,and financial accounting.
2) Confidentiality:
Confidentiality is the requirement that private or confidential information should not be disclosed to unauthorized individuals. Confidentiality protection is applies to data in storage ,during processing ,and while in transit. For many organizations ,confidentiality is frequently behind availability and integrity in terms of importance. For some types of information ,confidentiality is a very important attribute. Examples includes research data ,medical and insurance records ,new product specifications ,and corporate investments strategies. In some locations ,there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loans companies; debt collectors; businesses is that extend credit to their customers or issue credit cards ; hospitals ,doctor offices ,and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes.
3) Availability:
Availability is a requirement intended to assure that system works promptly and services is not denied to authorized users. This objective protects against , intentional or accidental attempts to either perform unauthorized deletion of data otherwise cause a denial of service or data. Availability is frequently an organizations foremost security objective. To make information available to those who need it and who can be trusted with it, organizations used authentication and authorization.
Need of Cyber Security
Cyber security is needed for following reasons:
The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit to authorized users. Information security includes those measures necessary to detect, document, and counter threats to digital and non-digital information. Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access.
Security: It can be considered a state of freedom from a danger or risk. For example, a nation experiences security when it’s military has the strength to protect its citizens.
Information: It is an asset to all individuals and businesses. Information Security refers to the protection of these assets in order to achieve Confidentiality, Integrity and Availability (CIA).
To make the system secure, optimum level of confidentiality, availability and integrity is to be maintained.
Meaning of Confidentiality, Integrity and Availability (CIA):
Confidentiality: Protecting information from being disclosed to unauthorized parties.
Integrity: Protecting information from being changed by unauthorized parties.
Availability: To the availability of information to authorized parties only when requested.
Three main goals of Information security are:
Detection: The most important element of this strategy is timely detection and notification of a compromise. Intrusion detection systems (IDS) are utilized for this purpose.
Prevention: Security measures must be taken to protect information from unauthorized modification, destruction, or disclosure whether accidental or intentional
Response: Making important decisions or developing policy while under attack is a recipe for disaster.
Securing Personal Computer (PC)
Personal Computer security is the process of preventing and detecting unauthorized use of personal computer. Prevention measures help user to stop unauthorized users (hackers) from accessing any part of their computer system. Detection helps user to determine whether or not someone attempted to break security into their system.
PC security is considered to be more important for the following reasons:
- To prevent data theft.
- To prevent theft or destruction to hardware.
- To prevent any software or service getting disrupted.
Personal Computer(PC) can be kept secure by implementing following processes:
- Keep up with system and software security updates.
- Install antivirus and anti spyware software.
- Back up your system.
- Enable a firewall.
- Use a standard user account.
- Keep your User Account Control enabled.
- Using Password to protect your software and lock your device.
- Secure your web browser before going online.
- Use an encryption software tool for your hard drive.
- Be careful online and don’t click on suspicious links.
Securing Smart Phone
Phone security is the practice of defending mobile devices against a wide range of cyber attack vectors that threaten user’s privacy, network login credentials, finance and safety.
Smart Phone can be kept secure by implementing following processes:
Smart Phone login account
All smart phones require user account for providing different cloud services like android phone provide Play store service and IOS devices provide app store service for their customer. Always use own account while logging in for the first time in their smart phone. This makes the user secure from theft or loss of the mobile, user could lock their phone using their account. Also user can find their mobile if they misplace it.
Always download apps from Play store (Android) or App Store (Apple)
Always download apps from their service provider like play store or app store. Don’t install any app in device by using “Unknown Sources”.
Security on install App’s or application
Security of application installed in mobile is also necessary job. Application like social media facebook, WhatsApp and Instragram etc, has some personal information or sensitive data. For securing this type of application use “App lock “application available in Play store.
- Lock apps with App lock application.
- Use pattern lock, PIN lock or finger print scanning lock.
- Avoid answering spam calls.
- Turn your Bluetooth and Wi-Fi off when not in use.
- Update your phone's software regularly.
- Encrypt hotspots from being used by other devices.
- Store passwords in encrypted files.
- Use a VPN(Virtual Private Networks) .
Introduction to Futureskills
FutureSkills is a new age learning experience platform from NASSCOM (National Association of Software and Services Companies) for building skills in ten futuristic technology areas. These technologies are Robotics Process Automation(RPA), Artificial Intelligence (AI), Internet of Things (IoT), Cyber Security, Blockchain, Virtual Reality (VR), Social & Mobile, Big Data Analytics, Cloud Computing and 3D Printing. The FutureSkills platform was launched by the Hon’ble Prime Minister of India on 19thFebruary 2018 at World Congress of Information Technology, Hyderabad in the presence of senior industry leaders and government officials to Upskill Technology Professionals in India.




Comments
Post a Comment