risks “thou shalt take calculated risks when computing” colin “swagster supreme” donar...
TRANSCRIPT
Risks“Thou shalt take calculated risks when
computing”
Colin “Swagster Supreme” DonarConnor “The Rock” McDowell
Kegan “The Brains” SchuchaskieFeb. 2014
Reliabilityre·li·a·bil·i·ty [ri-lahy-uh-bil-i-tee] nounthe ability to be relied on or depended on, as for accuracy, honesty,
or achievement.
Not all computers are reliable. They also can sometimes make mistakes, almost always, at the fault of the programmers.
Reliability Pentium Floating Point Unit Bug
Like in the case of the Intel Pentium Floating Point unit bug. The Processor came up with incorrect values ,when dividing, beyond the 4th decimal.
For example: (824633702441.0)*(1/824633702441.0)= 1solved by the pentium processor = 0.999999996274709702
Y2KThis is yet another programing error. This happened in
1999 when everyone was worried that the computers would malfunction because they weren’t yet year 2000 (Y2K) compatible.
Past, Present, And Future of Reliability
There will be reliability problems for as long as there is room for human error. Reliability is a problem that will probably, never go away.
News for Intel’s Pentium Bug<http://www.theinquirer.net/inquirer/feature/2256771/intels-pentium-processor-turns-20-years-old-today>
Security Software Security - Software security encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application
Network Security - Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
Security
Past, Present & Future of Security
• Security whether it be software or network has always been needed. Since the creation of the internet, people have used it with malicious intent, and you must be well equipped to handle such attacks.
• Ever since the 1970’s the effort to have computer security has been made.
• Encryption is one of the earliest techniques used to protect computer networks from hackers and other malicious computer users.
• With the evolution of technology, security is becoming much easier to use and more effective, but also the technology that causes these security breaches are becoming harder to stop and even harder to detect.
News Articles Related to Security
Target Works on Security-Heavy Credit Cards, After Breach
• http://news.cnet.com/8301-1009_3-57618283-83/target-works-on-security-heavy-credit-cards-after-breach/
Kickstarter hacked, user data stolen• http://news.cnet.com/8301-1009_3-57618976-83/kickstarter-hacked-user-data-stolen/
Nanotechnology (Nanotech)
Technology that is extremely small, highly useful, and innovative. As well as powerful at a atomic and molecular level.
Nanotechnology by definition is any type of device that is roughly between 1 - 100 nanometers in size. To give perspective a sheet of newspaper is about 100,000 nanometers thick
NanotechThere are however many ethical issues with such technology as it can be used for committing crimes, or since they are a self replicating device can malfunction and infinitely multiply causing what some call “grey goo” to envelope the world. Yet that is a far off doomsday fear. Other types of worries about the ethics of such powerful technology is that it could be used as a weapon of mass destruction as opposed as a tool for the betterment of mankind, as well as the question of who gets to use this type of technology arises.
History of NanotechThe idea of nanotechnology was first developed in 1959
Then in the 1980’s nanotechnology became an emerging field.
As the science grew the practice of manipulating atoms using nanotechnology became more common.
Then in the 2000’s controversies arose in regards of the implements of this technology and how it will be used.
In the future nanotechnology will be used to heal the sick as the nanobots attack viruses at their level.
It can be used to keep food fresher longer, as well as aid everyday life in huge ways other than what is already listed as the possibilities are endless with this technology
News Related to Nanotech
Oxford Nanopore unveils portable genome sequencer – MinION
http://phys.org/news/2014-02-oxford-nanopore-unveils-portable-genome.html
New 'pomegranate-inspired' design solves problems for lithium-ion batteries
http://phys.org/news/2014-02-pomegranate-inspired-problems-lithium-ion-batteries.html
Nanotech – 10 Points
QUESTION:
•How big is standard nanotechnology?
ANSWER:
BACK
between 1-100 nanometers in size
Nanotech – 20 Points
QUESTION:
•What year was the idea for Nanotechnology developed?
ANSWER:
BACK
1959
Nanotech – 30 Points
QUESTION:
•When did nanotechnology become an emerging field in science?
ANSWER:
BACK
1980’s
Nanotech – 40 Points
QUESTION:
•What is the name of the doomsday event involving nanotechnology?
ANSWER:
BACK
“Grey Goo”
Nanotech – 50 Points
QUESTION:
•What is a major future use of nanotechnology?
ANSWER:
BACK
Use of nanotechnology in the medical field
Reliability – 10 Points
QUESTION:
•“The ability to be relied on or depended on, as for accuracy, honesty, or achievement.” is the definition of what word?
ANSWER:
BACK
Reliability
Reliability – 20 Points
QUESTION:
•What processor company created the pentium processor?
ANSWER:
BACK
•Intel
Reliability – 50 Points
QUESTION:
•Solve (824633702441.0)*(1/824633702441.0)=
ANSWER:
BACK
1Congrats! you're smarter than the intel pentium processor.
Security – 10 Points
QUESTION:
•When did the idea and practice of computer security begin?
ANSWER:
BACK
The 1970’s
Security – 20 Points
QUESTION:
What is a form of computer security that involves encoding messages or information so that only certain people can read it.ANSWER:
BACK
Encryption
Security – 30 Points
QUESTION:
What makes network security different from software security?ANSWER:
BACK
One has to do with applications while the other has to do with networking
Security – 40 Points
QUESTION:
What is the definition of computer security? ANSWER:
BACK
information security as applied to computers and computer networks.
Security – 50 Points
QUESTION:
Who is the famous computer hacker that leaked government files that is now taking asylum in Russia. ANSWER:
BACK
Edward Snowden
Sources"Network Security." Wikipedia. Wikimedia Foundation, 19 Feb. 2014. Web. 24 Feb. 2014.”
http://en.wikipedia.org/wiki/Network_security
"Big Data Home." Techopedias. N.p., n.d. Web. 24 Feb. 2014.
http://www.techopedia.com/definition/24866/software-securityl6
"Pentium FDIV Bug." Wikipedia. Wikimedia Foundation, 22 Feb. 2014. Web. 26 Feb. 2014.
http://en.wikipedia.org/wiki/Pentium_FDIV_bug
"Nanotechnology." Wikipedia. Wikimedia Foundation, 16 Feb. 2014. Web. 25 Feb. 2014.
http://en.wikipedia.org/wiki/Nanotechnology
"What Is Nanotechnology?" What Is Nanotechnology? Center for Responsible
Nanotechnology, n.d. Web. 25 Feb. 2014. http://crnano.org/whatis.htm
"Nano." Nano. National Nanotechnology Initiative, n.d. Web. 26 Feb. 2014
http://www.nano.gov/
"Reliability." Dictionary.com. Dictionary.com, n.d. Web. 27 Feb. 2014.
http://dictionary.reference.com/browse/reliability?s=t