From ed79f5fc5a3478a7fe3f25abbcf6dc4f7a4aee36 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Mon, 10 Oct 2022 10:42:45 +1300 Subject: [PATCH] vault backup: 2022-10-10 10:42:45 --- content/notes/19-deepfakes.md | 17 ++++++++- content/notes/20-SE-in-IA.md | 71 +++++++++++++++++++++++++++++++++++ content/notes/comp-210.md | 2 +- 3 files changed, 88 insertions(+), 2 deletions(-) create mode 100644 content/notes/20-SE-in-IA.md diff --git a/content/notes/19-deepfakes.md b/content/notes/19-deepfakes.md index db9f39408..b40f37f91 100644 --- a/content/notes/19-deepfakes.md +++ b/content/notes/19-deepfakes.md @@ -4,6 +4,9 @@ aliases: tags: - comp210 - lecture +sr-due: 2022-10-13 +sr-interval: 3 +sr-ease: 250 --- # what, origins, how @@ -82,4 +85,16 @@ plausible deniability should "you" be concerned - for your personal integrity no - likely not enough data for you to be faked -- + - "one shot deepfakes" +- as a citizen yes + +## responses +- crytpographic siging to authenticate origin + - will this work about leaked content + +ml to analyse deepfakes (e.g., blinking) + +another arms race + +# summary +![](https://i.imgur.com/H9wv8Bv.png) diff --git a/content/notes/20-SE-in-IA.md b/content/notes/20-SE-in-IA.md new file mode 100644 index 000000000..93e46b28c --- /dev/null +++ b/content/notes/20-SE-in-IA.md @@ -0,0 +1,71 @@ +--- +title: "20-SE-in-IA" +aliases: +tags: +- comp210 +- lecture +--- + +# why +- apps for IoT devices contain security flaws + - smart home security breaches + - kindles + - vulnerable libraries lead to vulnerable devices +- software helps us to use hardware + - need to make the software secure + +# overview +combines computer science, engineering, and maths to make software + +- software engineering coined in 1968-1969 when discussing 'software cirsis' + - security breaches + - bugs etc + +different from individual programming because of the Audience +![](https://i.imgur.com/yuIeXpq.png) + +- types + - generic software + - stand alone systems e.e.g, word etc + - customized software + - designed specifically for a customer + - generic can transistion to customised + +# dev process +- tried to mirror engineering process +- software is different + - needs to be flexible + +timeline +- waterfall +- spiral +- agile + +# stages +- design + - feasability + - ![slide](https://i.imgur.com/KD8J4Dr.png) + - financial, legal, time, etc + - requirements specification + - stakeholders + - anyone affected by the system + - ![slide](https://i.imgur.com/NkMt4q7.png) + - features, requirements + - ![slide](https://i.imgur.com/ghNmRhj.png) + - ![use vs system reqs](https://i.imgur.com/DWSNrSu.png) + - ![functional vs non functional](https://i.imgur.com/gWwAWBV.png) + - system design + - ![slide](https://i.imgur.com/mMBkSp1.png) + - databse design + - er model etc + - architectural design + - structure of application + - +- develop +- validaion +- evolution + +may go by different names + + +# for Information assurance diff --git a/content/notes/comp-210.md b/content/notes/comp-210.md index e5745dc26..899c7b3b0 100644 --- a/content/notes/comp-210.md +++ b/content/notes/comp-210.md @@ -39,4 +39,4 @@ No final exam - [16-cloud-security](notes/16-cloud-security.md) - [17-ML-in-IA-1](notes/17-ML-in-IA-1.md) - [18-ML-in-IA-2](notes/18-ML-in-IA-2.md) -- \ No newline at end of file +- [19-deepfakes](notes/19-deepfakes.md) \ No newline at end of file