0% found this document useful (0 votes)
31 views52 pages

Digital Fluency 2023

Uploaded by

shrinivasvp03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views52 pages

Digital Fluency 2023

Uploaded by

shrinivasvp03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Davanagere University

Department of Studies in Computer Science


SUBJECT
Digital Fluency
By
J. CHANDRASHEKHARA MCA
Department of Studies in Computer Science
Davangere University

Davangere University, Shivagangotri


Department of studies in Computer Science
Davangere-577007
2022-2023
Overview of Emerging Technologies: Madule-01

• Artificial Intelligence
• Machine Learning
• Deep Learning
• Database Management for Data Science
• Big Data Analytics
• Internet of Things (IoT)
• Industrial Internet of Things (IIoT)
• Cloud computing and its service models
• Cyber Security and Types of cyber attack

Davangere University DOS in Computer Science


Over View of Artificial Intelligence
• AI is touching us in all aspects of our daily lives, most of the times unknowingly.
• Whenever we shop online, use our mobiles, drive to work daily, check our mail box or
exercise, AI is coming into play and helping us, prodding us or controlling us.
• Since AI is already such an integral part of our lives, it makes sense to get more knowledge
of this emerging technology.
• From chess-playing computers to self-driving vehicles, Artificial Intelligence (AI) is
progressing rapidly and touching every aspect of our lives.
• In this module, you will learn how machines can be made to learn from data and carry out
human tasks.
What is AI?
Artificial Intelligence is composed of two words Artificial and Intelligence, where Artificial
defines "man-made," and intelligence defines "thinking power", hence AI means "a man-
made thinking power. "It is a branch of computer science by which we can create intelligent
machines which can behave like a human, think like humans, and able to make decisions."
Examples of AI:
1. Typing using software
2. Shopping online
3. Chatbots
4. Chat GPT
Davangere University DOS in Computer Science
Why Artificial Intelligence?
Before Learning about Artificial Intelligence, we should know that what is the importance of
AI and why should we learn it. Following are some main reasons to learn about AI:
• With the help of AI, you can create such software or devices which can solve real-world problems
very easily and with accuracy such as health issues, marketing, traffic issues, etc.
• With the help of AI, you can create your personal virtual Assistant, such as Cortana, Google Assistant,
Siri, etc.
• With the help of AI, you can build such Robots which can work in an environment where survival of
humans can be at risk.
• With the help of AI, you can build such Robots which can work in an environment where survival of
humans can be at risk.

Advantages of Artificial Intelligence


• High Accuracy with less errors: AI machines or systems are prone to less errors and high
accuracy as it takes decisions as per pre-experience or information.
• High-Speed: AI systems can be of very high-speed and fast-decision making, because of
that AI systems can beat a chess champion in the Chess game.
• High reliability: AI machines are highly reliable and can perform the same action multiple
times with high accuracy.
• Digital Assistant: AI can be very useful to provide digital assistant to the users such as AI
technology is currently used by various E-commerce websites to show the products as per
customer requirement.
Davangere University DOS in Computer Science
Disadvantages of Artificial Intelligence
• High Cost: The hardware and software requirement of AI is very costly as it requires lots of
maintenance to meet current world requirements.
• Can't think out of the box: Even we are making smarter machines with AI, but still they cannot work
out of the box, as the robot will only do that work for which they are trained, or programmed.
• No feelings and emotions: AI machines can be an outstanding performer, but still it does not have the
feeling so it cannot make any kind of emotional attachment with human, and may sometime be
harmful for users if the proper care is not taken.
• No Original Creativity: As humans are so creative and can imagine some new ideas but still AI
machines cannot beat this power of human intelligence and cannot be creative and imaginative.
AI: Predictions for the future
AI points to the future where machines not only do all the physical work, but also a lot of the thinking
work like planning, strategizing and taking decisions. The following scenarios may happen.
• AI influencing global politics: Because of tariffs and import/export restrictions by the US, China is
trying to become self-reliant in the research and development of AI. FB, Twitter, Instagram and
WhatsApp are influencing how users take decision, social as well as political.
• AI and Automation in every business: AI will influence all businesses like Finance, Retail,
Manufacturing and Legal. It will also affect support functions like HR (for hiring and firing) and
supply chains(logistic decisions).
• AI will be used as Assistants: Alexa, Siri, Google Assistant will be a part of our lives in more ways
than can be imagined. Ordering Pizzas, arranging calendar, planning schedules will now be done for
us by such assistants, and as we use them more and more, they will become more efficient and
predictive in offering us these services.
Davangere University DOS in Computer Science
Machine Learning
What is machine learning?
Machine learning (ML) is a type of artificial intelligence (AI) that allows software
applications to become more accurate at predicting outcomes without being explicitly programmed to do
so. Machine learning algorithms use historical data as input to predict new output values.

How it works and why we need it?


• Machine learning is a method of data analysis that automates analytical model building. It is a branch
of artificial intelligence based on the idea that systems can learn from data, identify patterns and make
decisions with minimal human intervention.
• Machine learning is a type of artificial intelligence that helps computers “learn” without someone
having to program them.
• The computers are programmed in a way that focuses on data that they receive. This new data can
then help the machine “learn” what your preferences are and adjust itself accordingly.
• For instance, when a video website suggests a movie you might like, it’s likely learned your
preferences based on your past choices.

Who uses Machine Learning?


• Financial Services
• Government Agencies
• Healthcare
• Retail
• Oil and Gas
Davangere University DOS in Computer Science
Machine Learning
Financial Services:Banks and other businesses in the financial industry use machine learning technology
for two key
Purposes: to identify important insights in data, and prevent fraud. The insights can identify investment
opportunities, or help investors know when to trade. Data mining can also identify clients with high-risk
profiles, or use cyber-surveillance to pinpoint warning signs of fraud.

Government Agencies: Government agencies such as public safety and utilities have a particular need
for machine learning since they have multiple sources of data that can be mined for insights. Analyzing
sensor data, for example, identifies ways to increase efficiency and save money. Machine learning can
also help detect fraud and minimize identity theft.

Healthcare: Machine learning is a fast-growing trend in the health care industry, thanks to the advent of
wearable devices and sensors that can use data to assess a patient's health in real time. The technology can
also help medical experts analyze data to identify trends or red flags that may lead to improved diagnoses
and treatment.

Retail: Websites recommending items you might like based on previous purchases are using machine
learning to analyze your buying history. Retailers rely on machine learning to capture data, analyze it and
use it

Oil and Gas: Finding new energy sources. Analyzing minerals in the ground. Predicting refinery sensor
failure. Streamlining oil distribution to make it more efficient and cost-effective. The number of machine
learning use cases for this industry is vast – and still expanding.

Davangere University DOS in Computer Science


Machine Learning Methods

Supervised Learning: Supervised learning is commonly used in applications where historical


data predicts likely future events. For example, it can anticipate when credit card transactions
are likely to be fraudulent or which insurance customer is likely to file a claim.

Unsupervised Learning: Unsupervised learning works well on transactional data. For


example, it can identify segments of customers with similar attributes who can then be treated
similarly in marketing campaigns. Or it can find the main attributes that separate customer
segments from each other.

Semi-supervised Learning: Semi-supervised learning is useful when the cost is too high to
allow for a fully supervised process. Examples of this include identifying a person's face on a
web cam.
Reinforcement Learning: This is often used for robotics, gaming and navigation. With
reinforcement learning, the system discovers through trial and error which actions yield the
greatest rewards.

Davangere University DOS in Computer Science


Deep Learning
Deep learning is the one category of machine learning that emphasizes training the computer
about the basic instincts of human beings.

In deep learning, a computer algorithm learns to perform classification tasks directly on


complex data in the form of images, text, or sound. These algorithms can accomplish state-of-
the-art (SOTA) accuracy, and even sometimes surpassing human-level performance. They are
trained with the large set of labeled data and neural network architectures, involving many
layers. Moreover;

• Deep Learning is a prime technology behind the technology such as virtual assistants,
facial recognition, driverless cars, etc.
• The working of deep learning involves training the data and learning from the
experiences.
• The learning procedure is called ‘Deep’, as with every passing minute the neural networks
rapidly discover the new levels of data. Each time data is trained, it focuses on enhancing
the performance.
• With the increasing depth of the data, this training performance and deep learning
capabilities have been improved drastically, and this is because it is broadly adopted by
data experts.

Davangere University DOS in Computer Science


Deep Learning
Advantages of Deep Learning
• Ability to generate new features from the limited available training data sets.
• Can work on unsupervised learning techniques helps in generating actionable and reliable
task outcomes.
• It reduces the time required for feature engineering, one of the tasks that requires major
time in practicing machine learning.
• With continuous training, its architecture has become adaptive to change and is able to
work on diverse problems.

Disadvantages of Deep Learning


• The complete training process relies on the continuous flow of the data, which decreases
the scope for improvement in the training process.
• The cost of computational training significantly increases with an increase in the number
of datasets.
• Lack of transparency in fault revision. No intermediate steps to provide the arguments for
a certain fault. In order to resolve the issue, a complete algorithm gets revised.
• Need for expensive resources, high-speed processing units and powerful GPU’s for
training the data sets.

Davangere University DOS in Computer Science


Deep Learning

Davangere University DOS in Computer Science


Big Data Analytics
Context
• Instagram, the social networking app for sharing photos and videos, launched in 2010.
Today, it boasts 800 million monthly active users and is owned by Facebook.
• There are 70 million photos uploaded to Instagram every day. People interact with each of
those posts by showing their love with a heart, commenting and using hashtags. What all
of this activity does is create an enormous amount of data.
• Once analyzed, by humans as well as increasingly through artificial intelligence
algorithms, it can provide incredible business Intel and insights.
• Through the support of tags and trending information, the users can find photos and posts
on particular topics or activities, events, and also for exploring experiences, trending
restaurants, and places around the globe.

Now how does this function work?


Basically, Instagram recognizes accounts that are more or less similar to one another by
adopting a machine learning technique termed “word embedding”. This technique deciphers
the order in which words appear in the text in order to measure how connected they are.
Instagram uses the same technique to decipher and comprehend how connected any two
accounts are to each other.

Davangere University DOS in Computer Science


Internet of Things (IoT)
An Overview of IoT( Internet of Things):

• IoT is a buzzword today. Everyone uses IoT, but we are unaware


that we are actually making use of this technology.
• So, since IoT is such an integral part of our lives, it makes sense to
get more knowledge of this emerging technology.
• Using our mobiles, we are adjusting the lighting in the house,
switching on/off gadgets, monitoring the CCTV footage,
opening/closing doors and gates and performing a lot of daily
tasks.
• This is IoT. In this part, you will learn the core concepts of Internet
of Things (IoT), discover the skills that are required for IoT and
understand how IoT system works.

Davangere University DOS in Computer Science


What is IoT?

IoT is an evolution of mobile, home and embedded


applications interconnected to each other. Using the internet and data
analytics, billions of devices connected to each other create an
intelligent system of systems. When these connected devices use
cloud computing, analyse huge amounts of data and provide services,
they can change the way in which we live our lives and conduct our
businesses.

The Internet of Things (IoT) describes physical objects (or


groups of such objects), that are embedded with sensors, processing
ability, software, and other technologies, and that connect and
exchange data with other devices and systems over the Internet or
other communications networks.

Davangere University DOS in Computer Science


IoT

Davangere University DOS in Computer Science


Example of IoT
Google Nest

Davangere University DOS in Computer Science


IoT in Banking
• For organizations in retail banking, faster payments, improved operability (to support the
move to open banking) and more responsive mobile services are the main points of focus
for innovation.
• IoT offers retail banks an opportunity to gather more information on customers, offer more
personalized experiences and improve efficiencies. Here, we look at some novel examples
of IoT in retail banking.
Wearables: Many banks now provide applications for popular wearables like Apple Watch
and FitPay, which is already working with the Bank of America. Some banks have even
launched their own devices, with Barclays unveiling bPay wearable contactless payment
solutions and other wearable bands.
Connected Cars: Connected cars not only have the potential to improve customer
relationships, but also boost revenues. But smarter vehicles represent an opportunity for
banks, too: for example, Idea Bank runs a fleet of cars, each customized with an integrated
security deposit box and an ATM, which can visit the customer, rather than vice versa. The
bank’s data suggests that the average deposit at one of its mobile, car-based ATMs is three
times higher than at the branch.
Banking at home: With IoT, it is now possible to pay their bills through Amazon’s Alexa,
Google Home, integrating its API with the smart speaker to enable users to carry out balance
queries and payments through voice commands.

Davangere University DOS in Computer Science


IoT Architecture:
The four stages of IoT Architecture are –
1. Sensors and actuators – Sensing layer for Data Gathering
2. Internet gateways and Data Acquisition Systems – Network layer for Data Transmission
3. Edge IT - Data Analytics, pre-processing
4. Data center and cloud – Apps & services

Davangere University DOS in Computer Science


IoT Architecture:
Sensors Sense the physical environment
Actuators Affect the physical environment
Virtual Objects Electronic tickets, Agendas, Books, Wallets
People Ex.: Humans can control the environment via mobile apps
Services Ex.: Cloud services – can be used to:
• Process big data and turn it into valuable information
• Build and run innovative applications
• Optimize business processes by integrating device data.
Platforms Type of middleware used to connect IoT components (objects,
people, services,
etc.) to IoT. Provide numerous functions:
• Access to devices
• Ensuring proper installation/behavior of device
• Data analytics
• Interoperable connection to local network, cloud or other devices.

Networks IoT components are tied together by networks, using various wireless
and wired
technologies, standards, and protocols to provide pervasive
connectivity.

Davangere University DOS in Computer Science


IoT Security:
IoT Security is key for the secure development and secure operation of scalable IoT
applications and services that connect the real and virtual worlds between objects, systems
and people.

Davangere University DOS in Computer Science


Future of IoT:

Davangere University DOS in Computer Science


What is Industrial Internet of Things (IIoT)?

• Industrial IoT, or the Industrial Internet of Things (IIoT), is a


vital element of Industry 4.0.

• IIoT harnesses the power of smart machines and real-time


analysis to make better use of the data that industrial machines
have been churning out for years.

• The principal driver of IIoT is smart machines, for two reasons.


The first is that smart machines capture and analyze data in real-
time, which humans cannot.

• The second is that smart machines communicate their findings in


a manner that is simple and fast, enabling faster and more
accurate business decisions.

Davangere University DOS in Computer Science


What is Industrial Internet of Things (IIoT)?

Davangere University DOS in Computer Science


Some examples of IIoT can be

1. As simple as a connected rat trap which relays information about catching a rat to a
mobile phone,
2. Slightly complex like a soil sensor which relays data about humidity and nutrient
content to a system
3. Complex system like smart parking and traffic management
4. A very complex set-up like a fully automated automobile assembly line relaying data
in real-time to human supervisors.

Davangere University DOS in Computer Science


IoT and IIoT – A Comparison

Davangere University DOS in Computer Science


IoT and IIoT – A Comparison

IoT IIoT
It focuses on general applications It focuses on industrial applications such as
ranging from wearables to robots & manufacturing, power plants, oil & gas, etc.
machines.
Its implementation starts with small It uses critical equipment & devices
scale level so there is no need to worry connected over a network which will cause a
about life-threatening situations. life threatening or other emergency situations
on failure therefore uses more sensitive and
precise sensors.
It deals with small scale networks. It deals with large scale networks.
It offers easy off-site programming. It can be programmed remotely i.e., offers
remote on-site programming.
It handles very high volume of data. It handles data ranging from medium to high.
It requires identity and privacy. It requires robust security to protect the data.
It is having short product life cycle. It having very long life cycle.
It is less reliable. It has high- reliability.

Davangere University DOS in Computer Science


Benefits of IIoT

1. Improvement of Operational Performance: through increased


productivity, improved plant efficiency, asset uptime and quality, reduced
operational risks, overhead costs and changeover times.

2. Ensuring Safety and Compliance: through creating a naturally safer


environment and abiding by health, safety and environment laws; complying
with regulatory frameworks like energy, food and drug laws, labour laws etc.

3. Increasing Flexibility and Agility: through updating and easy


reprogramming of machines and robots to adhere to shifting and increasingly
customized customer requirements.

Davangere University DOS in Computer Science


CLOUD COMPUTING

Cloud Computing – Introduction


The term cloud refers to a network or the internet. It is a technology that
uses remote servers on the internet to store, manage, and access data online rather
than local drives. The data can be anything such as files, images, documents, audio,
video, and more.

There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
• Analysis of data
• Streaming videos and audios

Davangere University DOS in Computer Science


CLOUD COMPUTING

Why Cloud Computing?


IT companies, follow the traditional methods to provide the IT infrastructure. That means
for any IT company, we need a Server Room with basic needs like a database server, mail
server, networking, firewalls, routers, modem, switches, QPS (Query Per Second means
how much queries or load will be handled by the server), configurable system, high net
speed, and the maintenance engineers. To establish such IT infrastructure, we need to
spend lots of money. To overcome all these problems, Cloud Computing comes into
existence.

Davangere University DOS in Computer Science


CLOUD COMPUTING

Advantages of Cloud Computing


1. Back-up and restore data: Once the data is stored in cloud, it is easier to get back-up
and restore that data using the cloud.
2. Improved collaboration: Cloud applications improve collaboration by allowing groups
of people to quickly and easily share information in the cloud via shared storage.
3. Excellent accessibility:Cloud allows us to quickly and easily store and access
information anytime, anywhere in the whole world, using an internet connection.
4. Low maintenance cost: Cloud computing reduces both hardware and software
maintenance costs for organizations.
5. Mobility: Cloud computing allows us to easily access all cloud data via any device.
6. Services in the pay-per-use model: Cloud computing offers Application Programming
Interfaces (APIs) to the users for access services on the cloud and pays the charges as
per the usage of service.
7. Unlimited storage capacity: Cloud offers a huge amount of storing capacity for storing
important data such as documents, images, audio, video, etc. in one place.
8. Data security Cloud offers many advanced features related to security and ensures that
data is securely stored and handled.

Davangere University DOS in Computer Science


How does cloud computing work?
• Cloud Computing works by providing
permission to the user to upload and
download the information which stores.
We can access the data from anywhere.
• A user will get the initial amount of
storage at a very low price. Cloud
Computing can be divided into two
systems. One is front-end and the other is
back end.
• The two ends connect to each other with the help of an internet connection. The
backend of the cloud is the system and the front end is a computer user or client.
• The front end of the system has the application, which is used to access the cloud
system. Moreover, the backend has various computers, hardware, servers, and
data storage systems that make the cloud.
• All these features and functions managed by the central server. The central server
ensures that everything runs smoothly and in a perfect manner.
• It is done with the help of software named Middleware, which also permits the
network computer to communicate with each other.
Davangere University DOS in Computer Science
CLOUD SERVICE MODELS

There are three types of cloud service models. They are as follows: -
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)

Davangere University DOS in Computer Science


Difference between IaaS, PaaS, and SaaS

IaaS Paas SaaS


It provides a virtual data center It provides virtual It provides web software
to store information and create platforms and tools to and apps to complete
platforms for app development, create, test, and deploy business tasks.
testing, and deployment. apps.

It provides access to resources It provides runtime It provides software as a


such as virtual machines, environments and service to the end-users.
virtual storage, etc. deployment tools for
applications.
It is used by network architects. It is used by developers. It is used by end users.
IaaS provides only PaaS provides SaaS provides
Infrastructure. Infrastructure + Platform. Infrastructure + Platform +
Software.

Davangere University DOS in Computer Science


Types of Cloud:

Public Cloud:
Public cloud is open to all to store and access
information via the Internet using the pay-per-
usage method. In public cloud, computing
resources are managed and operated by the Cloud
Service Provider (CSP). Example: Amazon elastic
compute cloud (EC2), IBM SmartCloud
Enterprise, Microsoft, Google App Engine,
Windows Azure Services Platform.
Davangere University DOS in Computer Science
Types of Cloud:
Private Cloud:
Private cloud is also known as an internal cloud
or corporate cloud. It is used by organizations
to build and manage their own data centers
internally or by the third party. It can be
deployed using Open source tools such as Open
stack and Eucalyptus.
Hybrid Cloud
Hybrid Cloud is a combination of the public
cloud and the private cloud. We can say:
Hybrid Cloud = Public Cloud + Private Cloud.
Hybrid cloud is partially secure because the
services which are running on the public cloud
can be accessed by anyone, while the services
which are running on a private cloud can be
accessed only by the organization's users.
Example: Google Application Suite (Gmail,
Google Apps, and Google
Drive), Office 365 (MS Office on the Web and
One Drive), Amazon Web Services.
Davangere University DOS in Computer Science
Types of Cloud:

Community Cloud:
Community cloud allows systems and services to be accessible by a group
of several organizations to share the information between the organization
and a specific community. It is owned, managed, and operated by one or
more organizations in the community, a third party, or a combination of
them. Example: Health Care community cloud.

Davangere University DOS in Computer Science


Difference between public cloud, private cloud, hybrid cloud, and community cloud -

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

What is Cyber security?


Cyber security is the application of technologies, processes and controls
to protect systems, networks, programs, devices and data from cyber attacks. It
aims to reduce the risk of cyber attacks and protect against the unauthorized
exploitation of systems, networks and technologies.

Types of Cyber Security

1. Critical infrastructure security


2. Application security
3. Network security
4. Cloud security
5. Internet of things (IoT) security

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

1. Critical infrastructure security:Critical infrastructure security consists of the


cyber physical systems that modern societies rely on. Common examples of
critical infrastructure:
• electricity grid
• water purification
• traffic lights
• shopping centres
• hospitals

2. Application security:Applications are much more accessible over networks,


causing the adoption of security measures during the development phase to be an
imperative phase of the project.
Types of application security:
• antivirus programs
• firewalls
• encryption programs

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

3. Network security: As cyber security is concerned with outside threats, network security
guards against unauthorized intrusion of your internal networks due to malicious intent.
Network security ensures that internal networks are secure by protecting the infrastructure
and inhibiting access to it.
Common examples of network security implementation:
• extra logins
• new passwords
• application security
4. Cloud security:Improved cyber security is one of the main reasons why the cloud is
taking over. Cloud security is a software-based security tool that protects and monitors the
data in your cloud resources. Cloud providers are constantly creating and implementing
new security tools to help enterprise users better secure their data.

5. Internet of things (IoT) security: IoT refers to a wide variety of critical and non-
critical cyber physical systems, like appliances, sensors, televisions, wifi routers, printers,
and security cameras. According to Bain & Company’s prediction…
• The combined markets of IoT will grow to about $520 billion in 2021;
• More than double the $235 billion spent in 2017.

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

Common Types of Cyber Attacks


1. Malware:
The term “malware” encompasses various types of attacks including spyware,
viruses, and worms. Malware uses a vulnerability to breach a network when a user
clicks a “planted” dangerous link or email attachment, which is used to install
malicious software inside the system.
Malware and malicious files inside a computer system can:
• Deny access to the critical components of the network
• Obtain information by retrieving data from the hard drive
• Disrupt the system or even rendering it inoperable

2. Phishing: Phishing attacks are extremely common and involve sending mass
amounts of fraudulent emails to unsuspecting users, disguised as coming from a
reliable source. The fraudulent emails often have the appearance of being legit, but
link the recipient to a malicious file or script designed to grant attackers access to
your device to control it or gather recon, install malicious scripts/files, or to extract
data such as user information, financial info, and more.

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

Man-in-the-Middle (MitM) Attacks


Occurs when an attacker intercepts a two-party transaction, inserting themselves in the
middle. From there, cyber attackers can steal and manipulate data by interrupting traffic.
This type of attack usually exploits security vulnerabilities in a network, such as an
unsecured public WiFi, to insert themselves between a visitor’s device and the network. The
problem with this kind of attack is that it is very difficult to detect, as the victim thinks the
information is going to a legitimate destination. Phishing or malware attacks are often
leveraged to carry out a MitM attack.

Denial-of-Service (DOS) Attack


DOS attacks work by flooding systems, servers, and/or networks with traffic to overload
resources and bandwidth. This result is rendering the system unable to process and fulfil
legitimate requests. In addition to denial-of-service (DoS) attacks, there are also distributed
denial-of-service (DDoS) attacks.
Password Attack
Passwords are the most widespread method of authenticating access to a secure information
system, making them an attractive target for cyber attackers. By accessing a person’s
password, an attacker can gain entry to confidential or critical data and systems, including
the ability to maniuplate and control said data/systems.

Davangere University DOS in Computer Science


CYBER SECURITY AND TYPES OF CYBER ATTACK

Tips to avoid Cyber Attacks:

1. Train employees in cyber security principles


2. Install, use and regularly update antivirus and anti-spyware software on every
computer
3. Use a firewall for Internet connection
4. Download and install software for operating systems and applications as they
become available
5. Make backup copies of important business data and information
6. Control physical access to your computers and network components
7. Secure the Wi-Fi network
8. Require individual user accounts for each employee
9. Limit employee access to data and information, and limit authority to install
software
10.10. Regularly change passwords

Davangere University DOS in Computer Science


Applications of emerging technologies: Madule-02

1. Artificial Intelligence
2. Big Data Analytics
3. Internet of Things
4. Cloud Computing
5. Cyber Security

Davangere University DOS in Computer Science


APPLICATIONS OF ARTIFICIAL INTELLIGENCE Madule-02

Davangere University DOS in Computer Science


APPLICATIONS OF BIG DATA ANALYTICS Madule-02
Big Data Lifecycle
1. Data creation, ingestion, or capture: Whether you
generate data from data entry, acquire existing data
from other sources, or receive signals from devices,
you get information somehow. This stage describes
when data values enter the firewalls of your system.
2. Data Processing: Data preparation typically
includes integrating data from multiple sources,
validating data, and applying the transformation.
3. Data Analysis: However you analyze and interpret
your data, this is where the magic happens. Exploring
and interpreting your data may require a variety of
analyses. This could mean statistical analysis and
visualization.
4. Data sharing or publication: This stage is where
forecasts and insights turn into decisions and direction.
5. Archiving: Once data has been collected, processed,
analyzed, and shared, it is typically stored for future
reference.

Davangere University DOS in Computer Science


Big Data Analytics Tools Madule-02

• R-Programming
• Altamira LUMIFY
• Apache Hadoop
• MongoDB
• RapidMiner
• Apache Spark
• Microsoft Azure
• Zoho Analytics

Davangere University DOS in Computer Science


Applications of Big Data: Madule-02
• Healthcare
• Media & Entertainment
• Traffic Optimization
• Real-time Analytics to Optimize Flight Route
• E-commerce Recommendation
• Big data applications in agriculture

Davangere University DOS in Computer Science


Applications of IOT: Madule-02

Davangere University DOS in Computer Science


Applications Of Cloud Computing: Madule-02

Davangere University DOS in Computer Science


Applications of Cyber Security: Madule-02
1. DDoS security: DDoS stands for Distributed Denial for Service attack. In this digital
attack, the attacker uses multiple numbers of devices to keep the web server engaged in
accepting the requests sent by him from the multiple devices.
2. Web Firewall: A web application server-based firewall gets applied on a large area
network and it checks all the incoming and outgoing traffic on the server and it automatically
tracks and removes fake and malicious website traffic.
3. Bots: Nowadays, many hackers and attackers use bots to cause multiple device traffic on
the server to make it crash.
4. Antivirus and Antimalware: Cyber security is used to develop Antivirus and
Antimalware software for preventing all the digital attacks on the computer and protecting
these devices from data breaches, digital attacks, and unauthorized attacks from hackers.
network.
5. Threat management systems: Cyber security helps to deal with digital threats and
attacks on computer systems.
6. Critical systems: Cyber security helps to deal with the critical issue attacks that are
carried out on large servers connected to wide-area networks.
7. Rules and regulations: Cyber security helps to create new rules and regulations for the
users, attackers, and the people on the network to follow and comply with certain rules and
norms while they are using the Internet. It gives the power to the authorities to look into
security issues and optimize the network accordingly.

Davangere University DOS in Computer Science


Davangere University DOS in Computer Science

You might also like