A B S T R A C T W e l c o m e t o t h e n e w e r a o f b i g d a t a . P ii s Big a v data a l in t C o clou o l d I T opportu I 0 Academic essay (ITI0103) 2019 spring Introduction “Data is Everything and Everyone is Data. “[1] The ability to collect, organize, structure and analyse data on a large scale is probably the most significant trait that sets us, humans, apart from our primate friends. [1] To comprehend the opportunities and threats regarding big data loc
Misusing and Abusing the IoT - Now and in the Future The Internet of Things is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data [1]. As the amount of devices connected to the internet of things is constantly on the rise, making it innately more secure and protecting those devices from abuse, in a sense of unwanted access , manipulation by third parties and other scenarios, is rapidly turning into a pressing issue. According to some sources there were about 13.4 billion connected devices back in 2015 and the projections show there might be up to 38.5 billion such devices in 2020 [2]. As the number of devices increases, the necessity for a proper security mechanism concerning those devices becomes a priority in order to safely adopt the evergrowing internet of things into every aspect of a persons daily life. Privacy On
Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference m
Identity theft The Estonian Information Technology College Social, Professional and Ethical Aspects of Information Technology 18.10.2016 The purpose of this paper is to raise awareness about the threats associated with Identity theft. I will talk about the different types of identity theft, the most common way they take place and what consequences they might have. I will also talk about some of the examples and point out actions everyone can take to minimize the chance of becoming a victim of an identity theft. What is Identity theft Identity theft is defined as the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft oc
New Media Economy Social media information and data collection and security In this brief essay, i would like to focus on the social media platforms in our moren society. How people use them, what kind of information we give away, what companies will do with this. Information sharing and data protection has become very popular theme in the recent few years. People care more about their privacy and avoid „big brother“ foreshadowing. It is important to know what social media platforms promise and are they really going to keep it. Users should think about what they share and what kind of information they generate. Because it is all recorded and some info can be traced back to real people. Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger. When wrongly access this kind of data, a lot damage could be done by criminals. Users privacy settings should be reviewd and fixed when needed. Social media Humans hav
Eriala: Informaatika Inglise keel Referaat «Trojan horse » Lektor S.Remmelg Üliõpilane A.Parts Rühm RDIR23 Kood 103373 Introduction Trojan (also - troyamn, troyamnets, troyamnsky horse Troma) - a program used by an attacker to gather information, its destruction or modification of, computer malfunction or use of its resources in the wrong purposes. According to the principle of distribution and of the Trojans is not a virus because it does not spread by self-reproduction. This Trojan is run by the user manually or automatically - the program or part of the operating system running on a victim computer (as a module or utility). For this program file (the name, icon of the program) is called the official name of masquerading as another program (such as the installation of another program), another file type, or just give us attractive to run a name, icon, etc. Similar mali
Games Programming with Java and Java 3D Andrew Davison Dept. of Computer Engineering Prince of Songkla University HatYai, Songkhla 90112 E-mail: [email protected] Draft: 14th January 2003, #2 Abstract This article looks at the advantages and disadvantages of using Java and Java 3D for games programming. It assumes the reader is familiar with Java, but presents short overviews of gaming, the low-level APIs OpenGL and DirectX, and Java 3D. No programming examples are included here, although links to online code are supplied. 1. Background to Gaming Giving a definition for `computer game' is problematic, due to the wide range of game types. For example, the ArcadePod site (http://www.arcadePod.com) divides its hundreds of Java games into more than ten categories: 3D games, multiplayer, action
PRODUCTS and BRANDS 1. product catalogue - a list of different products of one company 2. product mix - a range of similar in some way products considered together 2. product range - different particular and specific products of a company 3. product lifecycle - the stages of product lifetime and amount of people who use it at each stage 4. product positioning - is how we see a product or how a company would like us to see it in relation to other products 5. product placement - hidden commercial of a product. Customer can see a product in films, music videos and so on. 6. raw materials - basic materials from which products are made or manufactured 7. finished goods - are goods(products) that have completed manufacturing process and are ready to be sold and used by the end user 8. consumer goods - goods which are produced to satisfy consumer current needs and are bought for individual use 9. consumer durables - long time lasting products, such as home appliances, cars and so on 10. fast
Kõik kommentaarid