Risks “Thou shalt take calculated risks when computing” Colin “Swagster Supreme” Donar...

34
Risks “Thou shalt take calculated risks when computing” Colin “Swagster Supreme” Donar Connor “The Rock” McDowell Kegan “The Brains” Schuchaskie Feb. 2014

Transcript of Risks “Thou shalt take calculated risks when computing” Colin “Swagster Supreme” Donar...

Risks“Thou shalt take calculated risks when

computing”

Colin “Swagster Supreme” DonarConnor “The Rock” McDowell

Kegan “The Brains” SchuchaskieFeb. 2014

Reliabilityre·li·a·bil·i·ty [ri-lahy-uh-bil-i-tee] nounthe ability to be relied on or depended on, as for accuracy, honesty,

or achievement.

Not all computers are reliable. They also can sometimes make mistakes, almost always, at the fault of the programmers.

Reliability Pentium Floating Point Unit Bug

Like in the case of the Intel Pentium Floating Point unit bug. The Processor came up with incorrect values ,when dividing, beyond the 4th decimal.

For example: (824633702441.0)*(1/824633702441.0)= 1solved by the pentium processor = 0.999999996274709702

Y2KThis is yet another programing error. This happened in

1999 when everyone was worried that the computers would malfunction because they weren’t yet year 2000 (Y2K) compatible.

Past, Present, And Future of Reliability

There will be reliability problems for as long as there is room for human error. Reliability is a problem that will probably, never go away.

Security Software Security - Software security encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application

Network Security - Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

Security

Past, Present & Future of Security

• Security whether it be software or network has always been needed. Since the creation of the internet, people have used it with malicious intent, and you must be well equipped to handle such attacks.

• Ever since the 1970’s the effort to have computer security has been made.

• Encryption is one of the earliest techniques used to protect computer networks from hackers and other malicious computer users.

• With the evolution of technology, security is becoming much easier to use and more effective, but also the technology that causes these security breaches are becoming harder to stop and even harder to detect.

News Articles Related to Security

Target Works on Security-Heavy Credit Cards, After Breach

• http://news.cnet.com/8301-1009_3-57618283-83/target-works-on-security-heavy-credit-cards-after-breach/

Kickstarter hacked, user data stolen• http://news.cnet.com/8301-1009_3-57618976-83/kickstarter-hacked-user-data-stolen/

Nanotechnology (Nanotech)

Technology that is extremely small, highly useful, and innovative. As well as powerful at a atomic and molecular level.

Nanotechnology by definition is any type of device that is roughly between 1 - 100 nanometers in size. To give perspective a sheet of newspaper is about 100,000 nanometers thick

NanotechThere are however many ethical issues with such technology as it can be used for committing crimes, or since they are a self replicating device can malfunction and infinitely multiply causing what some call “grey goo” to envelope the world. Yet that is a far off doomsday fear. Other types of worries about the ethics of such powerful technology is that it could be used as a weapon of mass destruction as opposed as a tool for the betterment of mankind, as well as the question of who gets to use this type of technology arises.

History of NanotechThe idea of nanotechnology was first developed in 1959

Then in the 1980’s nanotechnology became an emerging field.

As the science grew the practice of manipulating atoms using nanotechnology became more common.

Then in the 2000’s controversies arose in regards of the implements of this technology and how it will be used.

In the future nanotechnology will be used to heal the sick as the nanobots attack viruses at their level.

It can be used to keep food fresher longer, as well as aid everyday life in huge ways other than what is already listed as the possibilities are endless with this technology

News Related to Nanotech

Oxford Nanopore unveils portable genome sequencer – MinION

http://phys.org/news/2014-02-oxford-nanopore-unveils-portable-genome.html

New 'pomegranate-inspired' design solves problems for lithium-ion batteries

http://phys.org/news/2014-02-pomegranate-inspired-problems-lithium-ion-batteries.html

Risks

Nanotech Reliability Security

20

30

40

50

40

30

20

10

50 50

40

30

20

1010

Nanotech – 10 Points

QUESTION:

•How big is standard nanotechnology?

ANSWER:

BACK

between 1-100 nanometers in size

Nanotech – 20 Points

QUESTION:

•What year was the idea for Nanotechnology developed?

ANSWER:

BACK

1959

Nanotech – 30 Points

QUESTION:

•When did nanotechnology become an emerging field in science?

ANSWER:

BACK

1980’s

Nanotech – 40 Points

QUESTION:

•What is the name of the doomsday event involving nanotechnology?

ANSWER:

BACK

“Grey Goo”

Nanotech – 50 Points

QUESTION:

•What is a major future use of nanotechnology?

ANSWER:

BACK

Use of nanotechnology in the medical field

Reliability – 10 Points

QUESTION:

•“The ability to be relied on or depended on, as for accuracy, honesty, or achievement.” is the definition of what word?

ANSWER:

BACK

Reliability

Reliability – 20 Points

QUESTION:

•What processor company created the pentium processor?

ANSWER:

BACK

•Intel

Reliability – 30 Points

QUESTION:

• What does Y2K stand for?

ANSWER:

BACK

Year 2000

Reliability – 40 Points

QUESTION:

•What type of word is reliability?

ANSWER:

BACK

Noun

Reliability – 50 Points

QUESTION:

•Solve (824633702441.0)*(1/824633702441.0)=

ANSWER:

BACK

1Congrats! you're smarter than the intel pentium processor.

Security – 10 Points

QUESTION:

•When did the idea and practice of computer security begin?

ANSWER:

BACK

The 1970’s

Security – 20 Points

QUESTION:

What is a form of computer security that involves encoding messages or information so that only certain people can read it.ANSWER:

BACK

Encryption

Security – 30 Points

QUESTION:

What makes network security different from software security?ANSWER:

BACK

One has to do with applications while the other has to do with networking

Security – 40 Points

QUESTION:

What is the definition of computer security? ANSWER:

BACK

information security as applied to computers and computer networks.

Security – 50 Points

QUESTION:

Who is the famous computer hacker that leaked government files that is now taking asylum in Russia. ANSWER:

BACK

Edward Snowden

Sources"Network Security." Wikipedia. Wikimedia Foundation, 19 Feb. 2014. Web. 24 Feb. 2014.”

http://en.wikipedia.org/wiki/Network_security

"Big Data Home." Techopedias. N.p., n.d. Web. 24 Feb. 2014.

http://www.techopedia.com/definition/24866/software-securityl6

"Pentium FDIV Bug." Wikipedia. Wikimedia Foundation, 22 Feb. 2014. Web. 26 Feb. 2014.

http://en.wikipedia.org/wiki/Pentium_FDIV_bug

"Nanotechnology." Wikipedia. Wikimedia Foundation, 16 Feb. 2014. Web. 25 Feb. 2014.

http://en.wikipedia.org/wiki/Nanotechnology

"What Is Nanotechnology?" What Is Nanotechnology? Center for Responsible

Nanotechnology, n.d. Web. 25 Feb. 2014. http://crnano.org/whatis.htm

"Nano." Nano. National Nanotechnology Initiative, n.d. Web. 26 Feb. 2014

http://www.nano.gov/

"Reliability." Dictionary.com. Dictionary.com, n.d. Web. 27 Feb. 2014.

http://dictionary.reference.com/browse/reliability?s=t