This document summarizes a seminar on the impact of social media tools on digital marketing. The seminar covered topics including cyber security, big data, social networking, and analytics. It discussed how social media is a source of big data and how analytics can be applied to various types of data, providing examples of analytics being used for toothbrush usage and basketball shoe performance. The seminar also covered cyber crimes and how social networking has increased certain crimes, as well as potential cyber security issues.
Just as building and city architects can’t control every use and evolution of their spaces over time, it is also true that information architects need to anticipate – but not control – the various people who engage with information spaces. This includes regular inhabitants, visitors, and those who never engage directly with the space but have a more distant interaction – suppliers of goods and services, and people who are affected by the decisions and actions of those within the space.
Built spaces are not static, they are dynamic. The idea of designing your IA to respond to dynamic conditions is not new, but what does that mean in practice? How do we approach our work and the additional responsibilities that arise in these spaces?
We can create ecosystems that accommodate a range of different information sources and uses. We can also support the immediate goals and needs of the current stakeholders, while anticipating the long-term evolution of what we build. We will incorporate terms we know into our process – terms like adaptive, responsive, flexible, emergent, empowering – but with deeper meanings, as they have to guide the use of sophisticated information models and advanced/AI technologies.
This talk provides an overview of the dynamic information landscape, positions the role of IA firmly at the heart of its ecosystem design, and provides ideas for weaving this into your practice.
How is Marc Andreesen's dictum that "software is eating the world" having real impacts? This report explores the many categories of software innovation and includes estimates of economic impacts.
Going Global: The Intersection of IA and UX in a Multilingual EnvironmentDesign for Context
A global online community necessitates the exchange of content from many sources and across languages. Advances in the semantic web and linked data enable the aggregation of diverse content. Multilingual content provides potential for a richer information set while adding a layer of complexity to our projects. As information architects, we need to structure multilingual content to support its successful presentation and delivery. As user experience designers, we need to provide innovative designs that facilitate exploration of that content. How do different data modeling, linking, and ontology decisions affect the UX design? How can IA and UX support each other?
In this talk at IA Summit 2018 in Chicago, IL, USA, we focus on two specific areas:
- Structuring multilingual source content and enabling multilingual authors to contribute to a repository
- Designing wayfinding that supports navigating, exploring, and understanding content in sites that are sourced from multiple languages
Drawing from our experiences in the digital humanities space, we discuss real world examples for:
- Data modeling strategies, ontologies, taxonomies and metadata that support a flexible, scalable multilingual information management system
- Several multilingual data-driven interfaces and what they reveal about the challenges or opportunities in harmonizing multilingual content
- Patterns for displaying and navigating to content that is provided in different languages
In the age of information overload, having a social media measurement practice is the key to successful execution of your social strategy. In this session, Debra Askanase looked at what data points tell you that your community cares and is willing to take action, a methodology to figuring what data is relevant to your outcomes, where to find the metrics that matter, and why setting up the right metrics can make the difference between knowing that people visited a page on your website, and if your social media actions sent them there.
Whether you’re embracing the hype or eagerly waiting to see how things evolve, there’s no question the “Internet of Things” is creating excitement from living room to C- Suite
Of course, as with every new technology wave, there are those on the front lines shaping the discussion, influencing decision making, and charting the course for what the Internet of Things will mean to each of us in the not-too-distant future.
And these IoT thought leaders come from diverse industries and disciplines. There are the analysts, authors, and speakers who help us understand the opportunities and implications, senior executives that champion enterprise and startup initiatives, and those responsible for turning the Internet of Things into a daily reality.
But who are these people and what’s influencing their own perspective on IoT?
This is where social insights come in... as social media activity can give us a truly unique lens through which to gain insights into the people leading the conversation about the Internet of Things.
That’s why we’re excited to collaborate with Neustar to develop a social insights report analyzing these IoT thought leaders. What did we discover in researching and preparing this report?
Here’s what we learned.
Just as building and city architects can’t control every use and evolution of their spaces over time, it is also true that information architects need to anticipate – but not control – the various people who engage with information spaces. This includes regular inhabitants, visitors, and those who never engage directly with the space but have a more distant interaction – suppliers of goods and services, and people who are affected by the decisions and actions of those within the space.
Built spaces are not static, they are dynamic. The idea of designing your IA to respond to dynamic conditions is not new, but what does that mean in practice? How do we approach our work and the additional responsibilities that arise in these spaces?
We can create ecosystems that accommodate a range of different information sources and uses. We can also support the immediate goals and needs of the current stakeholders, while anticipating the long-term evolution of what we build. We will incorporate terms we know into our process – terms like adaptive, responsive, flexible, emergent, empowering – but with deeper meanings, as they have to guide the use of sophisticated information models and advanced/AI technologies.
This talk provides an overview of the dynamic information landscape, positions the role of IA firmly at the heart of its ecosystem design, and provides ideas for weaving this into your practice.
How is Marc Andreesen's dictum that "software is eating the world" having real impacts? This report explores the many categories of software innovation and includes estimates of economic impacts.
Going Global: The Intersection of IA and UX in a Multilingual EnvironmentDesign for Context
A global online community necessitates the exchange of content from many sources and across languages. Advances in the semantic web and linked data enable the aggregation of diverse content. Multilingual content provides potential for a richer information set while adding a layer of complexity to our projects. As information architects, we need to structure multilingual content to support its successful presentation and delivery. As user experience designers, we need to provide innovative designs that facilitate exploration of that content. How do different data modeling, linking, and ontology decisions affect the UX design? How can IA and UX support each other?
In this talk at IA Summit 2018 in Chicago, IL, USA, we focus on two specific areas:
- Structuring multilingual source content and enabling multilingual authors to contribute to a repository
- Designing wayfinding that supports navigating, exploring, and understanding content in sites that are sourced from multiple languages
Drawing from our experiences in the digital humanities space, we discuss real world examples for:
- Data modeling strategies, ontologies, taxonomies and metadata that support a flexible, scalable multilingual information management system
- Several multilingual data-driven interfaces and what they reveal about the challenges or opportunities in harmonizing multilingual content
- Patterns for displaying and navigating to content that is provided in different languages
In the age of information overload, having a social media measurement practice is the key to successful execution of your social strategy. In this session, Debra Askanase looked at what data points tell you that your community cares and is willing to take action, a methodology to figuring what data is relevant to your outcomes, where to find the metrics that matter, and why setting up the right metrics can make the difference between knowing that people visited a page on your website, and if your social media actions sent them there.
Whether you’re embracing the hype or eagerly waiting to see how things evolve, there’s no question the “Internet of Things” is creating excitement from living room to C- Suite
Of course, as with every new technology wave, there are those on the front lines shaping the discussion, influencing decision making, and charting the course for what the Internet of Things will mean to each of us in the not-too-distant future.
And these IoT thought leaders come from diverse industries and disciplines. There are the analysts, authors, and speakers who help us understand the opportunities and implications, senior executives that champion enterprise and startup initiatives, and those responsible for turning the Internet of Things into a daily reality.
But who are these people and what’s influencing their own perspective on IoT?
This is where social insights come in... as social media activity can give us a truly unique lens through which to gain insights into the people leading the conversation about the Internet of Things.
That’s why we’re excited to collaborate with Neustar to develop a social insights report analyzing these IoT thought leaders. What did we discover in researching and preparing this report?
Here’s what we learned.
This presentation is an exploration of what Information Technology will look like in 2021. We have spread our predictions across three categories: IT Trends, IT Practice and Impacts on Everyday Life.
By Laurenellen McCann. Edited by Daniel X. O’Neil.
Experimental Modes of Civic Engagement
in Civic Tech is an investigation into what
it means to build civic technology with, not for, real people and real communities. It answers the question, “What’s the difference between sentiment and action?”
The project was conducted by Laurenellen McCann, and it deepens her work in needs- responsive, community-driven processes for creating technology for public good.
This is a project of the Smart Chicago Collaborative, a civic organization devoted to improving lives in Chicago through technology. It was funded by a Knight Community Information Challenge Deep Dive grant given to The Chicago Community Trust by the John S. and James L. Knight Foundation.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...Claro Partners Inc.
Bringing IoT ideas to life: start from the user ... not the API! - API days 2014 in Barcelona. Presentation by Aldo de Jong, co-founder Claro Partners and Startupbootcamp Data & IoT.
The login details to the PREVIEW version of the interactive emerging business landscapes that were presented at the conference are:
Personal Data Economy landscape
claropartners.com > client login
uname: Claro-guest-pde
pword: pdepreview
IoT landscape
claropartners.com > client login
uname: Claro-guest-iot
pword: iotpreview
Contact us at landscapes@claropartners.com to discuss ways to get full access.
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Ian Glazer
In this talk I not only introduce the Identity Ecosystem Framework, but also talk about how the IDESG was formed to help solve the problem of establishing the rules of the road for digital identity. I present a reusable pattern for controls selection and establishment that any organization can use.
Change is everywhere. Technology has accelerated the change. Government needs to adapt its thinking and strategy to these new realities. This document is primer to decision makers to trigger their thinking in that direction. The future of Government is Open, Collaborative and Social.
Five Misconceptions about Personal Data - Dataconomy Barcelona -Claro Partners Inc.
The vast amounts of personal data that we produce (email, text, search, payments...) has been triumphantly declared a “new asset class” by the WEF and compared to oil as the world’s newest economic resource. This has sparked a frantic race to gather it.
This gold rush obscures the real value of personal data, and forgets a fundamental rule of innovation: start with the person. Why has this basic principle been largely absent from our obsession with big data?
This presentation is an exploration of what Information Technology will look like in 2021. We have spread our predictions across three categories: IT Trends, IT Practice and Impacts on Everyday Life.
By Laurenellen McCann. Edited by Daniel X. O’Neil.
Experimental Modes of Civic Engagement
in Civic Tech is an investigation into what
it means to build civic technology with, not for, real people and real communities. It answers the question, “What’s the difference between sentiment and action?”
The project was conducted by Laurenellen McCann, and it deepens her work in needs- responsive, community-driven processes for creating technology for public good.
This is a project of the Smart Chicago Collaborative, a civic organization devoted to improving lives in Chicago through technology. It was funded by a Knight Community Information Challenge Deep Dive grant given to The Chicago Community Trust by the John S. and James L. Knight Foundation.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...Claro Partners Inc.
Bringing IoT ideas to life: start from the user ... not the API! - API days 2014 in Barcelona. Presentation by Aldo de Jong, co-founder Claro Partners and Startupbootcamp Data & IoT.
The login details to the PREVIEW version of the interactive emerging business landscapes that were presented at the conference are:
Personal Data Economy landscape
claropartners.com > client login
uname: Claro-guest-pde
pword: pdepreview
IoT landscape
claropartners.com > client login
uname: Claro-guest-iot
pword: iotpreview
Contact us at landscapes@claropartners.com to discuss ways to get full access.
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Ian Glazer
In this talk I not only introduce the Identity Ecosystem Framework, but also talk about how the IDESG was formed to help solve the problem of establishing the rules of the road for digital identity. I present a reusable pattern for controls selection and establishment that any organization can use.
Change is everywhere. Technology has accelerated the change. Government needs to adapt its thinking and strategy to these new realities. This document is primer to decision makers to trigger their thinking in that direction. The future of Government is Open, Collaborative and Social.
Five Misconceptions about Personal Data - Dataconomy Barcelona -Claro Partners Inc.
The vast amounts of personal data that we produce (email, text, search, payments...) has been triumphantly declared a “new asset class” by the WEF and compared to oil as the world’s newest economic resource. This has sparked a frantic race to gather it.
This gold rush obscures the real value of personal data, and forgets a fundamental rule of innovation: start with the person. Why has this basic principle been largely absent from our obsession with big data?
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
Got Invited for conducting the workshop on ‘Cyber Security’ at top notch engineering college.
Sardar Patel Institute of Technology, Andheri on 3rd October, 2015.
Student feedback:-
https://drive.google.com/file/d/0B_uWWP1uW7TFWVdTanJFdTlqNkE/view?usp=sharing
Appreciation letter:-
https://drive.google.com/file/d/0B_uWWP1uW7TFMkVVUTR4V1JTN2c/view?usp=sharing
Cyber Security: The Strategic View
By: Kah-Kin Ho, Head of Cyber Security Business Development Threat Response, Intelligence and Development (TRIAD)
This session begins by giving an overview of how Cisco sees the challenges and opportunities of cyber security for the Government which include areas such as recent development on applicability of International Law to Cyber conflict, the evolving role of the Government as the legitimate security provider, Public-Private Partnership issues, and the evolving technical, social and political threat landscape. Cisco recognizes that cyber security begins at the policy level and translates through to the operational and system level. We will discuss why an intelligence-led network-centric approach that focuses on enforcing policy, enhancing situational awareness, and providing the insight necessary to tackle threats before they impact information and infrastructure assets is key to Cyber Security.
Slides from the LMTE Cyber Security Spring Summit held on 20th May 2015 at 99 Bishopsgate. Presenters included Adrian Rands of Quantemplate, Prof Roy Isbell from Warwick University, Daniel Beazer of Peer1 and Rashmi Knowles of RSA.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat.
Read our cybersecurity predictions for 2017: http://researchcenter.paloaltonetworks.com/tag/2017-predictions/
These predictions are part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.
Data for Impact Fellowship - SocialCops CareersSocialCops
The Data for Impact Fellowship is a unique opportunity where fellows partner with leaders in government, bilateral organizations, foundations and nonprofits — ranging from Ministers, CEOs and District Collectors — to implement a scalable data intelligence solution. The Fellowship seeks to bring together young, enterprising future leaders with experienced leaders in the development sphere to use the power of data to solve some of India's most critical problems.
For more details about the Fellowship and to get started on your application, visit http://soco.ps/2BHK6Ba!
The value of experience design is changing. Tools that were once designed to help people make decisions are being reimagined into products and services that actively make people’s lives easier through anticipating what a user wants and making choices on their behalf.
New smart products and services that anticipate user needs and make decisions according to our preferences with as little interaction as possible will release us from the tyranny of choice and give us more time to spend on the things that matter most.
Hear Kieran speak about how to navigate these new digital complexities when creating new experiences.
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’JIMS Rohini Sector 5
We are pleased to invite you to the JIMS Conclave 2016 on the highly relevant theme of ‘Digitalization of Businesses: Promises and Perils’.
Date: Saturday, 10th December, 2016
Time: 9.30 am – 5.00 pm
Venue: Lakshmipat Singhania Auditorium, PHD House,
4/2, Siri Institutional Area, New Delhi
Session Topics:
• Digitalization-Stakeholders perspective : Inaugural
• Insights into Digital Markets : Session - I
• Digital Transformation at Workplace : Session - II
In case you wish to invite guests from the Corporate / Academia, kindly forward the invitation to them and confirm their particaption to us, in advance.
Visit Website
http://www.jimsindia.org/
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad CampaignMSL
This week, we distill insights around a Mobile Ad Campaign in which Vicks combined several layers of data to reach moms in high flu zones with mobile ads for their premium Behind Ear Thermometer
100+ thinkers and planners within MSLGROUP share and discuss inspiring projects on corporate citizenship, crowdsourcing, storytelling and social data on the MSLGROUP Insights Network.
Every week, we pick up one project and do a deep dive into conversations around it -- on the MSLGROUP Insights Network itself but also on the broader social web -- to distill insights and foresights. We share these insights and foresights with you on our People’s Insights blog and compile the best insights from the network and the blog in the iPad-friendly People’s Lab Quarterly Magazine, as a showcase of our capabilities.
For more, see: http://peopleslab.mslgroup.com
Social media is impacting all parts of organizations – and market intelligence is no exception, with new ways to listen, mine data from new sources, create “always on” communities, and understand behavior and visualize trends. “Social” technologies are changing the way people learn, make decisions and judge brands. Market intelligence professionals can leverage these new realities or risk irrelevance. This presentation covers:
• What world-class companies are learning through social technologies
• How to create a “listen-engage-measure-share” research model
• How social media can increase the value of market intelligence functions (and MI career paths) within organizations
• New best practices for using social technology to enable “wisdom of the crowd” internally and externally
Get Smart: The Present and Future of Data DiscoveryInside Analysis
Hot Technologies of 2013 with Bloor, Fitzgerald & Neutrino BI
Live Webcast July 17, 2013
http://www.insideanalysis.com
Somewhere in your data, discoveries wait to be found. Finding them can be quite a challenge, though, which is why data discovery gets so much attention these days. A whole array of tools is being promoted for data visualization and business discovery. But what are the component parts of this technology? And how can discovery tools be used to sift through vast amounts of data effectively? Register for this episode of Hot Technologies to find out!
Analysts Dr. Robin Bloor of The Bloor Group, and Jaime Fitzgerald of Fitzgerald Analytics will each offer their take on what constitutes a high-quality discovery tool. They'll then take a briefing from Jon Woodward of Neutrino BI, who will tout his company's platform for facilitating data discovery. He'll talk about the value of being able to go "direct to data" during the discovery process. He'll also outline their roadmap for developing a next-generation "smart" discovery platform.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
The top trends changing the landscape of Information ManagementVelrada
The role of information and data in the private sector, and how employees and users interact with that information, is changing rapidly.
With endless buzzwords and hot topics, and a ream of new technologies and upgrades, it can be difficult for organisations to know where to begin or how it translates into actionable insight.
The Social Organization - IBM - The Business Value of Social Software CIO ForumBilal Jaffery
Presentation given at the Toronto CIO Forum Keynote. The Social Organization talks about the perfect harmony of social software adoption internally leading to a culture that brings the social culture, IBM values and ideas to the external networks. Our social software platforms are based on Lotus Connections.
Artificial Intelligence and the importance of Data, By : Prof. Lili SaghafiProfessor Lili Saghafi
The biggest barrier to the deployment and adoption of artificial intelligence and machine learning is bad data quality. Data from alternative resources and unstructured data is becoming increasingly important but must be “refined” before their insights become truly valuable for use.
STEP1-Understanding and Modeling Organizational Systems
Big Data, BI , power of Analytic in software development
System Analyst role , in defining root problem or opportunity
Software’s Project Management , workload , activities , team , risks
STEP2-Determining Priorities and Feasibility
Software and Hardware Alternatives, based on Cost benefit Analysis for tangible and intangible cost and benefits. Payback, ROI,….
STEP3-Software Development Projects, Methodology , Data gathering, Modeling , Agile
We Define AI as anything that makes machines act more intelligently
We like to think of AI as augmented intelligence
We believe that AI should not attempt to replace human experts, but rather extend human capabilities and accomplish tasks that neither humans nor machines could do on their own.
The internet has given us access to more information, faster.
Distributed computing and IoT have led to massive amounts of data.
Social networking has encouraged most of that data to be unstructured.
With Augmented Intelligence, we are putting information that subject matter experts need at their fingertips, and backing it with evidence so they can make informed decisions.
We want experts to scale their capabilities and let the machines do the time-consuming work.
Software Engineering_Agile Software Development By: Professor Lili SaghafiProfessor Lili Saghafi
Software Development Models and their processes (Review)
Agile Software Development method
Agile development Characteristic, Principals , lifecycle, stages
Agile development techniques
How it works
Agile project management , Scrum
Scaling agile methods , issues , Problems , maintenance , solutions , advantages
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
The quantum internet is now in a similar stage as the classical internet in the 1960's.
In half a decade the internet gained a huge role in our daily life.
It is not a matter of science anymore: a large community has been and still is working on how we can use the internet in our daily communication.
Bringing a scientific concept from universities to society requires effort from academia and industry and now we see the first footsteps being made.
In 2020 it is aiming to have a small quantum node network, which might become the first quantum internet on earth.
A quantum internet enables us to send qubits from one node to another.
This allows us to create entanglement between any two points.
Entanglement is inherently private.
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Professor Lili Saghafi
A programming language is a notation designed to connect instructions to a machine or a computer.
Programming languages are mainly used to control the performance of a machine or to express algorithms.
At present, thousands of programming languages have been implemented.
In the computer field, many languages need to be stated in an imperative form, while other programming languages utilize declarative form.
The program can be divided into two forms such as syntax and semantics.
Blockchain is a combination of technologies that have existed for a long time.
They're simply combined in a new and creative way to give us an amazing new platform on which we can start to build solutions.
Blockchains are often referred to as digital decentralized ledgers.
It is something we're all familiar with: a simple notebook.
When we talk about blocks and blockchain, all we're really talking about is a page of data.
There's a new technology that has the power to revolutionize how you, businesses, and the world interact!
Hearing the word "blockchain" is comparable to hearing the word "internet" in the early 90s.
more than 20 years later. Think about how the Internet has transformed businesses, commerce, communication, even music and video.
The next technology to have that kind of impact isn't some of the buzzwords you hear.It's not big data. It's not artificial intelligence. It's not even social media. It's BLOCKCHAIN!
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
Quantum computing has the potential to transform cybersecurity.
Some encryption algorithms are thought to be unbreakable, except by brute-force attacks.
Although brute-force attacks may be hard for classical computers, they would be easy for quantum computers making them susceptible to such attacks.
All financial institutions, government agencies healthcare information are in danger.
How could this new thrust of computing strength give us new tiers of power to analyze IT systems at a more granular level for security vulnerabilities and protect us through more complex layers of quantum cryptography?
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Professor Lili Saghafi
A confusion matrix is a matrix (table) that can be used to measure the performance of an machine learning algorithm, usually a supervised learning one.
Each row of the confusion matrix represents the instances of an actual class and each column represents the instances of a predicted class.
This is the way we keep it like this but it can be the other way around as well, i.e. rows for predicted classes and columns for actual classes.
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Professor Lili Saghafi
When we say "Neural Networks", we mean artificial Neural Networks (ANN). The idea of ANN is based on biological neural networks like the brain.
The basic structure of a neural network is the neuron. A neuron in biology consists of three major parts: the soma (cell body), the dendrites, and the axon.
The dendrites branch of from the soma in a tree-like way and getting thinner with every branch. They receive signals (impulses) from other neurons at synapses. The axon - there is always only one - also leaves the soma and usually tend to extend for longer distances than the dentrites. The axon is used for sending the output of the neuron to other neurons or better to the synapsis of other neurons.
Machine learning is the kind of programming which gives computers the capability to automatically learn from data without being explicitly programmed.
This means in other words that these programs change their behavior by learning from data.
In this course we will cover various aspects of machine learning
Of course, everything will be related to Python. So it is Machine Learning by using Python.
What is the best programming language for machine learning?
Python is clearly one of the top players!
k-nearest Neighbor Classifier
Neural networks
Neural Networks from Scratch in Python
Neural Network in Python using Numypy
Dropout Neural Networks
Neural Networks with Scikit
Machine Learning with Scikit and Python
Naive Bayes Classifier
Introduction into Text Classification using Naive Bayes and Python
Explain the term "digital humanities," and how it is understood across humanities disciplines.
Describe the research journey as a partnership between researcher and library collections and staff.
List examples of the limits of classification.
Describe the implicit and explicit hierarchies that are created when gathering and analyzing data.
Distinguish between what counts as data and what does not.
Identify different data formats and how they fit into a research workflow.
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiProfessor Lili Saghafi
Understand the definition of the Fibonacci numbers.
Understand the definition of the Recursive / Recursive Functions
Show that the naive algorithm for computing them is slow.
Efficiently create algorithms to compute large Fibonacci numbers.
The right algorithm makes all the difference.
DOS / DDOS introduction
How Easy it is to get information
Real Life Examples MyDoom , GitHub , Dyn , Windows Server and Windows 10 servers running Internet Information Services (IIS) are vulnerable to denial of service (DOS) attacks
Base of Attacks
Types of DOS / DDOS
Attack Tools , LOIC, XOIC, Stacheldracht
DOS/DDOS Weaknesses
Category of OS/ DDOS
What to defend?
Botnets and Botnets mitigations
Michael Calce, a.k.a. MafiaBoy
Point of entrance / OSI Model ( If time permit)
What is the basis for the Data Science course and Data Scientist to know?
1-Algorithm
2-Data
3-Ask The Right Question
4-Predict an answer
5- Copy other people's work to do data science
In This Data Science course ( Graduate Program ) I will focus on understanding business intelligence systems and helping future managers use and understand analytics, Business Intelligence emphasizing the applications and implementations behind the concepts. a solid foundation of BI that is reinforced with hands-on practice. The course is also designed as an introduction to programming and statistics for students from many different majors. It teaches practical techniques that apply across many disciplines and also serves as the technical foundation for more advanced courses in data science, statistics, and computer science.
There are ten areas in Data Science which are a key part of a project, and you need to master those to be able to work as a Data Scientist in much big organization.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
1. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
CYBER SECURITY
AND
BIG DATA
Professor Lili Saghafi
profsaghafi_cybersecurityexperts@eon.law.harvard.edu
Personal Web: https://sites.google.com/site/professorlilisaghafi/
Seminar on 'Digital Marketing –
Impact of Social Media Tools‘
Oct 10th, 2012
Cyber Security,
Social Networking and
Digital Media
2. Seminar on 'Digital Marketing - Impact
of Social Media Tools‘
Oct 10th, 2012
•Agenda
Seminar on 'Digital Marketing - Impact of Social Media Tools‘
The impact of Cyber Security and Social Networking on Digital Media
INFORMATION Assurance
Cyber Crime Definition and Examples
Social Networking and Digital Media
Cyber War
Solutions
Part C
Part D
Part G
Part E
Part F
Recent Research Results on Cyber crime
and Social Media
2
Prof. Lili Saghafi
CYBER SECURITY
Part B
Part A
Part H
Big Data, In memory processing, HANA
Big Data from Social Networking and its effect on
Digital Marketing
3. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Every day, we create 2.5 quintillion bytes of data — so much
that 90% of the data in the world today has been created in
the last two years alone.
• What we can do with big Data?
• Social Networking can be one source of Big Data
• Analytic using Big Data
• Just add Analytic , see the result
Prof. Lili Saghafi
3
•What is Big Data?
4. 4 Prof. Lili Saghafi
•CAIRO
• Cairo population is approximately 17
million. It is the most populous
metropolitan area in Africa and also ranks
16th amongst the most populous
metropolitan area in the world.
• Majority of the population in Cairo are
Egyptians, with less number of foreigners.
• One third of the total population in Cairo is
under 15 and nearly three fifth is under 30.
• The positive implication is that Cairo
population is relatively young. Life
expectancy averages for both men and
women is 70 years.
• WHAT CAN WE DO THIS DATA?
5. • population of 16.3 million in
2011, the city is also the
eighth most populous
metropolis in the world
• Day time population
increase to 25.7 million ??!!
• Add Analytic and see what
you can do.
• WHAT CAN WE DO THIS
DATA?
5
Prof. Lili Saghafi
•Delhi
6. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Just Add Analytics – Even to Toothbrushes
Prof. Lili Saghafi
6
•What is Analytic?
7. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• I recently saw a presentation mentioning that there “are more
mobile phones than toothbrushes in the world”, and
according to some research by the 60 second marketer, it
seems that in all likelihood, this is absolutely true:
Prof. Lili Saghafi
7
•Analytic
8. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
8
“why not combine the two?!”. Here’s my quick
mockup of an iPhone case of the future:
9. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
The Beam Toothbrush is a bluetooth-enabled toothbrush and
associated iphone application:
Prof. Lili Saghafi
9
It provides detailed analytics, recording how long each
person brushes their teeth:
10. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
10
And like any good performance management
tool, it uses gamification techniques to
encourage the right behavior…
Gamification is the use of game design elements, game thinking
and game mechanics to enhance non-game contexts.
11. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
11
It seems as if analytics is being embedded in
every device possible, such as the new Nike
Hyperdunk+ basketball shoes and associated
application:
12. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• First, big data can unlock significant value by
making information transparent and usable at
much higher frequency.
• Second, as organizations create and store
more transactional data in digital form, they
can collect more accurate and detailed
performance information on everything from
product inventories to sick days, and therefore
expose variability and boost performance.
Prof. Lili Saghafi
12
BIG DATA
There are five broad ways in which using big
data can create value to any organization
13. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Leading companies are using data
collection and analysis to conduct
controlled experiments to make better
management decisions;
• others are using data for basic low-
frequency forecasting to high-frequency
nowcasting to adjust their business
levers ( tactics) just in time.
Prof. Lili Saghafi
13
Using big data…….
14. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
15. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Third, big data allows ever-
narrower segmentation of
customers and therefore much
more precisely tailored products or
services.
Prof. Lili Saghafi
15
BIG DATA
16. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
17. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Fourth, sophisticated analytics can
substantially improve decision-
making.
Prof. Lili Saghafi
17
BIG DATA
18. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
19. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
20. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, big data can be used to improve
the development of the next
generation of products and
services. For instance, manufacturers
are using data obtained from sensors
embedded in products to create
innovative after-sales service offerings
such as proactive maintenance
(preventive measures that take place
before a failure occurs or is even noticed).
Prof. Lili Saghafi
20
•BIG DATA
21. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
“A man without DATA is just a man with an opinion”
22. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• SAP is the market and technology leader in business
management software, solutions, services for improving
business process.
• The SAP HANA appliance software aggregates huge
volumes of valuable data and produces relevant results for
business at lightning speeds.
• Blink. You've Just Analyzed 460 Billion Rows of
Data with SAP HANA
Prof. Lili Saghafi
22
What is in memory processing
23. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
23
Knowledge makes you a LEADER in Business
not a follower
24. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Social networks, search engine poisoning, web
applications and Adobe Corp.’s software are among
the top 12 security risks that companies face.
• Joining them in the deadly dozen are more
targeted botnets, cloud computing, routine
negligence and the always popular Advanced
Persistent Threat – cyberwarfare. And, of course, the
tempting target mobile devices now present.
• Credit to FORBES
Prof. Lili Saghafi
24
•Top 12 Security Risks For 2012
25. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Using social media ‘Big Data’ analytics to analyze
or predict events
• In July, the Defense Advanced Research Projects
Agency (DARPA) issued an RFP ( Request for Proposal )
looking for new Big Data tools to track social media
postings and interactions, reflecting a growing interest
within government to use social media and open source
data to "fill-in" and "complement" traditional data
sources.
• The focus for the government is on using this public data
to develop analytics that can be used to anticipate how an
adversary or potential friend "thinks" and "feels" about a
particular situation, with the hope of being able to predict
their behavior, actions and reactions.
Prof. Lili Saghafi
25
Social Networking Sites are the source of Big Data
26. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Face Book
• My Space
• Orkut
• Twitter
• Flicker
• YouTube
• LinkdIn
• http://www.crime-research.org/latestnews/
Computer Crime Research Center
Prof. Lili Saghafi
26
•Social Networking
27. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Many cyber police is getting more complaints about Orkut these days
as many fake profiles being created and thus leads to crime.
• Orkut is a social networking service which is run by Google and
named after its creator, an employee of Google - Orkut Büyükkökten.
• The service states that it was designed to help users meet new friends
and maintain existing relationships.
• Similar to Facebook, Friendster and MySpace, Orkut goes a step
further by permitting the creation of easy-to-set-up simple forums
(called "communities") of users.
• Since October 2006, Orkut has permitted users to create accounts
without an invitation.
• Orkut is the most visited website in India and 2nd most visited
site in Brazil.
• The initial target market for orkut was the United States, but the
majority of its users are in India and Brazil.
• In fact, as of March 2008, 67.5% of the traffic comes from Brazil,
followed by 15.4%, which comes from India.
Orkut
27 Prof. Lili Saghafi
28. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Cyber Crime
• Although the term cyber crime is usually restricted to
describing criminal activity in which the computer or network
is an essential part of the crime, this term is also used to
include traditional crimes in which computers or networks are
used to enable the illicit activity.
• Definition
Cyber Crime
28 Prof. Lili Saghafi
29. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• By the use of Social Media and Social Networking the number
of Cyber Crimes increased dramatically
Prof. Lili Saghafi
29
•Cyber Crime
30. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber Security Prevent Cyber Crimes
Prof. Lili Saghafi
30
•Cyber Security
31. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• You've heard the news stories about credit card numbers
being stolen and email viruses spreading.
• Maybe you've even been a victim yourself.
• One of the best defenses is understanding the risks, what
some of the basic terms mean, and what you can do to
protect yourself against them.
Prof. Lili Saghafi
31
Why is Cyber Security a Problem?
32. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It seems that everything relies on computers and the internet
now — communication (email, cellphones), entertainment
(digital cable, mp3s), transportation (car engine systems,
airplane navigation), shopping (online stores, credit cards),
medicine (equipment, medical records), and the list goes on.
• How much of your daily life relies on computers? How much
of your personal information is stored either on your own
computer or on someone else's system?
• Cyber security involves protecting that information by
preventing, detecting, and responding to attacks.
Prof. Lili Saghafi
32
•What is cyber security?
33. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• There are many risks, some more serious than
others.
• Among these dangers are viruses erasing your
entire system, someone breaking into your system
and altering files, someone using your computer
to attack others, or someone stealing your credit
card information and making unauthorized
purchases. (Hacking and Cracking)
• Unfortunately, there's no 100% guarantee that
even with the best precautions some of these
things won't happen to you, but there are steps
you can take to minimize the chances.
Prof. Lili Saghafi
33
What are the risks?
34. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The first step in protecting yourself is to
recognize the risks and become familiar with
some of the terminology associated with
them:
1. Hacker, attacker, or intruder
2. Malicious code
3. Vulnerability
Prof. Lili Saghafi
34
What can you do?
35. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• These terms are applied to the people who seek to
exploit weaknesses in software and computer
systems for their own gain.
• Although their intentions are sometimes fairly benign and
motivated solely by curiosity, ( Hacking) their actions are
typically in violation of the intended use of the systems
they are exploiting.
• The results can range from mere mischief (creating a virus
with no intentionally negative impact) to malicious activity
(stealing or altering information, Conficker).
Prof. Lili Saghafi
35
Hacker, attacker, or intruder -
36. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Malicious code, sometimes called malware, is a broad category that
includes any code that could be used to attack your computer. Malicious
code can have the following characteristics:
• It might require you to actually do something before it infects your
computer. This action could be opening an email attachment or going
to a particular web page.
• Some forms propagate without user intervention and typically start by
exploiting a software vulnerability. Once the victim computer has
been infected, the malicious code will attempt to find and infect other
computers. This code can also propagate via email, websites, or
network-based software, or even with a call on your cell!. Mobile
Viruses
• Some malicious code claims to be one thing while in fact doing
something different behind the scenes. For example, a program that
claims it will speed up your computer may actually be sending
confidential information to a remote intruder.
• Viruses and worms are examples of malicious code.
Prof. Lili Saghafi
36
•Malicious code -
37. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In most cases, vulnerabilities are caused by programming
errors in software.
• Attackers might be able to take advantage of these errors to
infect your computer, so it is important to apply updates or
patches that address known vulnerabilities
Prof. Lili Saghafi
37
•Vulnerability -
38. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Confidentiality, Privacy
2. Integrity (information hasn’t change)
3. Availability
4. Authentication ( the person is who they say they are)
5. Non repudiation ( legal aspect of tiding a contract and
signature)
• Examples: Health care Data and Records
INFORMATION Assurance Is Based On
5 Pillars
38 Prof. Lili Saghafi
39. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Capability
2. Resources
3. Intent
4. Motivation
5. Access
6. Risk Version
•Treat / Adversary Model
39 Prof. Lili Saghafi
40. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime which the
computer or network is a tool of the
criminal activity include :
• Spamming and
• Criminal copyright crimes,
particularly those facilitated through
peer-to-peer networks.
A- Examples of CyberCrime
40 Prof. Lili Saghafi
41. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a target
of criminal activity include:
•Unauthorized access (i.e, defeating
access controls),
•Malicious code
•Denial-of-service DSA attacks.
•B- Examples of CyberCrime
41 Prof. Lili Saghafi
42. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a place
of criminal activity include :
•Theft of service (in particular,
telecom fraud)
•Certain financial frauds.
•C- Examples of CyberCrime
42 Prof. Lili Saghafi
43. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, examples of traditional crimes
facilitated through the use of computers or
networks include :
• Nigerian 419 or other gullibility or
• Social engineering frauds (e.g., hacking
"phishing", identity theft, child pornography,
online gambling, securities fraud, etc.).
• Cyberstalking is an example of a traditional crime
-- harassment -- that has taken a new form when
facilitated through computer networks.
•D- Examples of CyberCrime
43 Prof. Lili Saghafi
44. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Additionally, certain other information
crimes, including:
• Trade secret theft
• industrial or economic espionage, are
sometimes considered cybercrimes
when computers or networks are
involved.
•E- Examples of CyberCrime
44 Prof. Lili Saghafi
45. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cybercrime in the context of national security
• may involve hacktivism (online activity
intended to influence policy),
• traditional espionage, or
• information warfare and related activities.
Prof. Lili Saghafi
45
•F- Examples of CyberCrime
46. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Another way to define cybercrime is simply as criminal activity
involving the information technology infrastructure, including:
• illegal access (unauthorized access),
• illegal interception (by technical means of non-public
transmissions of computer data to, from or within a computer
system),
• data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data),
• systems interference (interfering with the functioning of a
computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer
data),
• misuse of devices, forgery (ID theft), and electronic fraud.
• CYBERCRIME
46 Prof. Lili Saghafi
47. • One of the recent researches
showed that a new cybercrime is
being registered every 10 seconds
in Britain.
• During 2006 the computer crooks
were able to strike 3.24 million
times.
• The comparable volume for 2009 is
almost double at 491.2 million
• Some crimes performed on-line
even surpassed their equivalents in
real world 2012. In addition, experts
believe that about 90% of
cybercrimes stay unreported.
•RECENT RESEARCHES
47
Prof. Lili Saghafi
48. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• According to a study performed by Shirley McGuire, a
specialist in psychology of the University of San
Francisco, the majority of teenagers who hack and
invade computer systems are doing it for fun rather
than with the aim of causing harm.
• Shirley McGuire mentioned that quite often parents
cannot understand the motivation of the teenage hackers.
She performed an anonymous experiment, questioning
more than 4,800 students in the area of San Diego.
• Her results were presented at the American
Psychological Association conference:
•Research
48 Prof. Lili Saghafi
49. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• 38% of teenagers were involved in software piracy;
• 18% of all youngsters confessed of entering and using the
information stored on other personal computer or website;
• 13% of all the participants mentioned they performed changes in
computer systems or computer files.
• A criminal may represent himself to be a teenager, professional or
anyone who suits the purpose of both the parties. Adults are just as
susceptible to these crimes as the kids are.
• Proper awareness and guidance are an absolute necessity so that
the crimes can be controlled before becoming a full-grown
technological menace.
• http://theviewspaper.net/cyber_crimes/
•RESEARCH RESULT
49 Prof. Lili Saghafi
50. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The study revealed that only 1 out of 10
hackers were interested in causing certain
harm or earn money.
• Most teenagers performed illegal computer
actions of curiosity, to experience
excitement.
•RESEARCH RESULT
50 Prof. Lili Saghafi
51. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• A U.S. government report entitled Annual Report to
Congress on the Military Power of some countries talks
extensively about the increasing role of some countries
ability to conduct war over the Internet. In the past, such
talk of a "digital Pearl Harbor" has been dismissed by some
security experts as largely political hot air.
• Yet more and more evidence suggests that a politically
sponsored Internet event could occur sooner rather than later.
•Cyber War
51 Prof. Lili Saghafi
52. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Criminal hackers follow three basic motivations:
• prestige,
• profit
• politics
• The three Ps.
•The three Ps.
52 Prof. Lili Saghafi
53. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• "All of our security defense models," "were built based on a
model of threat which was purely prestige driven,"
referring to the virus writer who only wanted his
creation mentioned on the evening news. (Josh Corman,
principal security strategist for IBM Internet Security Systems)
• Now, we're currently living in a time of profit, and
have begun to react to that. I am talking about criminal
hackers--either independent or state sponsored--entering
the realm of politics.
•The three Ps.
53 Prof. Lili Saghafi
54. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
"'Political' means different things," "I was telling
people not to be surprised if we saw the botnets (Botnet
is a jargon term for a collection of software robots, or bots, which run autonomously and
automatically) They run on groups of zombie computers
controlled remotely.
• This can also refer to the network of computers using
distributed computing software Participate in the
presidential primaries in the U.S." And then, in
October 2007, a Ukranian botnet was linked to a
flood of "Ron Paul for President" spam.
• But that's small potatoes compared to what I thinks
is possible.
•Getting political
54 Prof. Lili Saghafi
55. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Those same botnet systems could "take down candidate
sites, send a whole bunch of free advertising or free smear
campaigns, and potentially have an impact on who became
the presidential candidates or who was successful on
fundraising." Worse "'political' could mean a cyber
protest, it could mean cyber espionage, or cyber
reconnaissance." Such political action has already
happened in 2009.
55 Prof. Lili Saghafi
56. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• At least two "one-offs" within the last year. The
first is Estonia last spring, where a flash
mob of ethnic Russian students in Estonia
crippled the country's infrastructure for
several weeks.
• The other one-off is the recent CIA disclosures to
Congress about foreign-state-sponsored attacks
on U.S. military installations.
Some recent examples
56 Prof. Lili Saghafi
57. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Neither were the crippling examples that worry me, and
neither were apparently well coordinated.
• I think we're at a point right now where the more we talk
about it, the more we use examples, we'll start to get to a
critical mass awareness."
• On profit-based attacks, "it wasn't until a number of
large corporations were hit with a data breach, a targeted
attack, or spear phishing that the security community
really took notice. (The enterprise people) said 'Ouch!'
Sometimes someone has to say, 'Ouch!'" I hopes that no
one has to be stung by a political attack before the
security community starts to take that threat seriously.
Critical mass awareness
57 Prof. Lili Saghafi
58. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• How to Report Cyber and IP Crime How to
Report Computer- and Internet-Related Crime
• How to Report Intellectual Property Crime
Computer Crime & Intellectual Property
Section
United States Department of Justice
58 Prof. Lili Saghafi
59. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Recently, the police captured four men who had kidnapped a
Johannesburg girl. The men had reportedly lured the young
women from her home in Kempton Park, through her
Facebook page.
• The girl was rescued by police, because she managed to SMS
her mother, with what she thought was her location.
• In another incident last year, two men in their mid-30s were
charged with the kidnapping and rape of a 14-year-old
Pretoria girl, who met the men on the popular chat room
application Mxit
Police tackle cyber crime
By Candice Jones, ITWeb online telecoms editor
Johannesburg, 17 Mar 2010
http://www.itweb.co.za/index.php?option=com_content&view=article&id=31384:police-tackle-cyber-
crime&catid=160:it-in-government
59 Prof. Lili Saghafi
60. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• CyberTipline
• Protect Children online
Prof. Lili Saghafi
60
•CyberTipline
61. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Online Fraud and Identity Theft have become a growing
problem. One of the means that is used to obtain your personal
and financial information is through a technique known as
Phishing. (pronounced"fishing") A lot of information is obtained
through e-mail that appears legitimate but is not. These e-mails
then ask you to click on a link that appears correct but in fact,
re-directs you to another site which then captures your sensitive
information. Below is a 3 minute video from Microsoft that
some have found useful in better understanding Online Fraud
and Identity Theft.
•
http://www.microsoft.com/athome/security/videos/Phishing8-
hi.swf
Prof. Lili Saghafi
61
•Identity Theft
62. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Mobile Phones Malwares and Viruses
• Download
• Direct by sharing
• MMS (Multimedia message Signal) Commworrier
• Bluetooth
• Solution
• Antivirus
• Walk away
Prof. Lili Saghafi
62
Mobile Phones Hackers
63. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Reports from various sources in the security industry show
that a large takedown of servers associated with the
“Bredolab” trojan occurred within few weeks.
• While most of the reports have focused around the idea
that this infrastructure was solely related to the command
and control of Bredolab, research shows that these servers
were used as an all-purpose hosting infrastructure for
criminal activity.
• November 4, 2010
•“Bredolab” trojan
http://www.networkforensics.com/category/cybercrime/
63 Prof. Lili Saghafi
64. The number of Web
sites infected with
malware has doubled
from a year ago to more
than 1.2 million,
according to a study
released today
November 22, 2010 ,by
Internet security
company Dasient.
.
•Report: Infected Web sites double in 2010
Star
Burst!
http://news.cnet.com/8301-27080_3-20023576-245.html?tag=mncol;posts
64 Prof. Lili Saghafi
65. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Simulation of your Computer display on Hackers Computer
• Clickjacking
Prof. Lili Saghafi
65
•Conficker
66. • The definition of safe computing has
changed. Within ISS and IBM, started an
education awareness campaign called
"The Evolving Threat." "We do seminars,
we made a videogame, we're trying to
make some of these new security
concepts more tangible and digestible to
both enterprise practitioners and the
consumers because some of this is
simply the weakest link. "What's allowing
(the Storm botnet) to be so successful is
not an unpatched system per se, but it's
an uninformed end user."
•Solution
Recognizing the weakest link
66 Prof. Lili Sagh
67. Also important is end-user awareness.
"Among ourselves in the security
intelligentsia, those of us who do security for
a living, we talk about practicing safe
computing. That used to include 'it's OK, just
don't double-click on an executable, but it's
fine to open a GIF, a JPEG, or an MP3.' But as
you've seen, botnets are now using MP3s as
a source of an infection. I mean, just the very
podcasts you're listening to could be a source
of infection."
•Solution
Awareness Among ourselves in the security intelligentsia
67 Prof. Lili Sagh
68. • Democratic politicians are
proposing a novel approach
to cybersecurity: fine
technology companies
$100,000 a day unless they
comply with directives
imposed by the U.S.
Department of Homeland
Security.
• A "bunker" in this case is a
new IP address served to a
business that is under
persistent DDoS attack but
lacks the funds or resources
to protect itself.
• Traffic from the DDoS attack
continues to hit the original IP
address while the business
remains in operation under a
new address.
• Distributed Denial of Service
(DDoS) attacks
• Google has launched
a program to
encourage outsiders
to find security
vulnerabilities in its
Web properties.
• http://news.cnet.com/8301-
30685_3-20021436-
264.html?tag=mncol;mlt_related
Cybersecurity bill gives DHS
power to punish tech firms
http://news.cnet.com/8301-
13578_3-20023464-
38.html#ixzz16BwzIU9M
Fights Ddos Attacks With
Digital 'Bunkers‘
http://news.cnet.com/8301-
1009_3-20023260-
83.html?tag=nl.e757
Google offers cash for finding
Web security holes
68 Prof. Lili Saghafi
69. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Facebook application developers are able to store their own check-in data in the
Facebook Places database and retrieve information from the database.
• But Facebook is far from the only source of "leakage" for this location data.
• EPIC cites an AT&T research paper (PDF) that found some kind of private data leaked to third
parties in all 20 of the mobile online social networks studied. The services examined include
Facebook, MySpace, Twitter, Flickr, Foursquare, Yelp, and Loopt.
• While these services may have robust privacy policies, the advertisers and developers
they deal with may be less secure.
• As reported last February on the ReadWriteWeb, a site named PleaseRobMe aggregated
information from several location-based services to indicate houses whose
residents were away, making them easy pickings for thieves.
•
Report Your Location To A Social Network And Get A Coupon For
Discounts And Prizes. The Price?
http://news.cnet.com/8301-13880_3-20022700-
68.html#ixzz16C5xfMhX
69 Prof. Lili Saghafi
70. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Location-based services promise to make it
easier to connect with family, friends, and
associates and to be rewarded for being a
loyal customer.
• But in their current form, the services make it
too easy for people and organizations to
access your private information without your
explicit consent.
• Prevent Facebook friends from checking you in
•Solution
70 Prof. Lili Saghafi
71. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cloud computing is Internet-based computing,
whereby shared resources, software, and
information are provided to computers and other
devices on demand, as with the electricity grid.
• Cloud computing is a natural evolution of the
widespread adoption of virtualization, Service-
oriented architecture and utility computing.
• Details are abstracted from consumers, who no
longer have need for expertise in, or control over, the
technology infrastructure "in the cloud" that supports
them.
Prof. Lili Saghafi
71
Is Cloud the Solution?
72. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The major cloud service providers include Amazon,
Salesforce, SAP, Microsoft and Google.
• Some of the larger IT firms that are actively involved in
cloud computing are Fujitsu, Dell, Hewlett Packard, IBM,
VMware, NetApp and Microsoft.
Prof. Lili Saghafi
72
•Cloud Computing
73. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We have all kinds of controls, but they
don't work very well
• It's the little things that lead to most
internal compromises, like walking
away from your desk and not locking
your screen
• It would be very easy for an IT guy to
swap out a hard-drive and just
take it (impact on financial
institution)
Prof. Lili Saghafi
73
Internal Problem VS External Problems
74. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Most chief security information officers CSIO focus on outside
threats -- cyber attacks, socially engineered breaches like
phishing and vishing (phishing over phones) , and the
interception of transaction data.
• While it might not be easy to limit the information employees
must access, it is relatively easy to monitor that
access -- keeping an eye on what
information and files are being
viewed, by whom and how often,
Prof. Lili Saghafi
74
Internal Problem VS External Problems
75. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage (Spy versus spy)
• Technology race (Space, atomic weapon)
•Cold War in 70
75 Prof. Lili Saghafi
76. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage - Cyber
• Technology Race – Cyber
Prof. Lili Saghafi
76
•Cold War Now
77. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In the past government was target now is technology
• Who are the adversary was clear on COLDWAR
• today are unknown hackers in CYBERWAR
• Consider the Model of adversary every hacker/kid /
organized cyber crime has it
1. Capability (computer knowledge)
2. Resources (a laptop computer and access to internet)
3. Intent
4. Motivation
5. Access (to homes cyber)
6. Risk Version (no risk for them)
Prof. Lili Saghafi
77
•Comparison
78. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber terrorists can use unprotected
systems to aggressively target our
nation’s critical infrastructure.
• Are you an easy target?
Cyber Terrorism:
How Vulnerable Are We?
78 Prof. Lili Saghafi
79. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The malicious software, known as Stuxnet, was discovered in
mid July 2010, at least several months after its creation, by
VirusBlokAda, a Belarussian computer security company that
was alerted by a customer.
• The malicious software has infected an unknown number of
power plants, pipelines and factories over the past year is the
first program designed to cause serious damage in the
physical world
• The Stuxnet spreads through previously unknown holes in
Microsoft’s Windows operating system and then looks for a
type of software made by Siemens and used to control
industrial components, including valves and brakes.
Prof. Lili Saghafi
79
•Stuxnet Worm
80. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet can hide itself, wait for certain conditions
and give new orders to the components that reverse
what they would normally do.
• The commands are so specific that they appear
aimed at an industrial sector, mostly atomic centers
but officials do not know which one or what the
affected equipment would do.
• Cyber attacks on computer networks have slowed or
stopped communication in countries such as Estonia
and Georgia,
• Stuxnet is the first aimed at physical destruction and
it heralds a new era in cyberwar.
Prof. Lili Saghafi
80
•Stuxnet
81. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• “It is not speculation that this is the first directed cyber
weapon”, or one aimed at a specific real-world process, said
Joe Weiss, a US expert who has testified to Congress on
technological security threats to the electric grid and other
physical operations.
• “The only speculation is what it is being used against, and by
whom.”
Prof. Lili Saghafi
81
The first directed cyber weapon
82. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet’s knowledge of Microsoft’s Windows operating
system, the Siemens program and the associated hardware
of the target industry make it the work of a well-financed,
highly organized team.
• The malicious software marks the first attack on critical
industrial infrastructure that sits at the foundation of modern
economies.
Prof. Lili Saghafi
82
Stuxnet’s knowledge of Microsoft’s Windows
operating system,
83. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
• The Operation Aurora, Zeus, and piracy
• While we still use many of the same old names - viruses, Trojans, and
worms - today's malware deserves much more respect than many are
giving it. Where traditional viruses mostly aimed to disrupt operations
or win fame for their coders' cleverness,
• today's malware enables potent multistage attacks called
advanced persistent threats. In these carefully sequenced attacks,
criminals rely on custom and constantly changing malware being
placed where it will go unnoticed, returning the maximum value from
their investment.
Prof. Lili Saghafi
83
How 3 Cyber Threats Transform Incident
Response: Oct 2012
Targeted Attacks, System Exploits, Data Theft,
and You
84. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Intrinsic -try to build it right -commercial/technology
component should change frequently
• Extrinsic - evaluate it so you know something about
residual risk
• Implementation – Combine component in the best way
maintain system, patch, scan frequently
• Operational – Monitor everything ,update, look for bad
behaviour, Authentication, privileges and different users
level of accessibility
• Don’t only block everything have strategy
Prof. Lili Saghafi
84
How to build the assurance
A Tip for IT MANAGERS
85. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It Is very real
• Cyber activity is constant
• All of us are target
• We need to be hard target, (people are strongest link if we
make them hard target)
• This is the matter of life and Death , it is about freedom
our way of life
Prof. Lili Saghafi
85
•Cyber Crime
86. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We need strong technology
• We need users understanding of treats
and respond (.com/.cm) masquerading
and spoofing
• We need cyber professional to know
the risk/treats and mitigation
Prof. Lili Saghafi
86
•Solution
87. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In home you can prevent 90%
attacks,
• In industry 80% of attacks are
known , 10% are too new to be
known , and 10% we just don’t know
it exist.
• RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an
algorithm for public-key cryptography in information Security
Prof. Lili Saghafi
87
2010 RSA Conference research result
88. REMEMBER
People are the strongest link to build the security
assurance , Together we can , Remember we are the
Masterpiece of God , he Breathed into us, we are capable
of doing anything.
88 Prof. Lili Saghafi
89. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Computer Crime Research Center
• http://www.crime-research.org/news/20.03.2010/3779/
• Network Forensics Blog » cybercrime
• http://www.networkforensics.com/category/cybercrime/
• Information Policy
• http://www.i-policy.org/cybercrime/
• Security
• http://news.cnet.com/security/?tag=hdr;snav
• RSA Conference
• Computer Crime & Intellectual Property Section
United States Department of Justice
• FORBES Magazine
•REFERENCES
89 Prof. Lili Saghafi
90. Thank you for being
great audience
Any
Question?
90 Prof. Lili Saghafi