mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
vault backup: 2022-10-10 10:42:45
This commit is contained in:
parent
4d5c3664d9
commit
ed79f5fc5a
@ -4,6 +4,9 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- comp210
|
- comp210
|
||||||
- lecture
|
- lecture
|
||||||
|
sr-due: 2022-10-13
|
||||||
|
sr-interval: 3
|
||||||
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
# what, origins, how
|
# what, origins, how
|
||||||
@ -82,4 +85,16 @@ plausible deniability
|
|||||||
should "you" be concerned
|
should "you" be concerned
|
||||||
- for your personal integrity no
|
- for your personal integrity no
|
||||||
- likely not enough data for you to be faked
|
- likely not enough data for you to be faked
|
||||||
-
|
- "one shot deepfakes"
|
||||||
|
- as a citizen yes
|
||||||
|
|
||||||
|
## responses
|
||||||
|
- crytpographic siging to authenticate origin
|
||||||
|
- will this work about leaked content
|
||||||
|
|
||||||
|
ml to analyse deepfakes (e.g., blinking)
|
||||||
|
|
||||||
|
another arms race
|
||||||
|
|
||||||
|
# summary
|
||||||
|

|
||||||
|
|||||||
71
content/notes/20-SE-in-IA.md
Normal file
71
content/notes/20-SE-in-IA.md
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
---
|
||||||
|
title: "20-SE-in-IA"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
- lecture
|
||||||
|
---
|
||||||
|
|
||||||
|
# why
|
||||||
|
- apps for IoT devices contain security flaws
|
||||||
|
- smart home security breaches
|
||||||
|
- kindles
|
||||||
|
- vulnerable libraries lead to vulnerable devices
|
||||||
|
- software helps us to use hardware
|
||||||
|
- need to make the software secure
|
||||||
|
|
||||||
|
# overview
|
||||||
|
combines computer science, engineering, and maths to make software
|
||||||
|
|
||||||
|
- software engineering coined in 1968-1969 when discussing 'software cirsis'
|
||||||
|
- security breaches
|
||||||
|
- bugs etc
|
||||||
|
|
||||||
|
different from individual programming because of the Audience
|
||||||
|

|
||||||
|
|
||||||
|
- types
|
||||||
|
- generic software
|
||||||
|
- stand alone systems e.e.g, word etc
|
||||||
|
- customized software
|
||||||
|
- designed specifically for a customer
|
||||||
|
- generic can transistion to customised
|
||||||
|
|
||||||
|
# dev process
|
||||||
|
- tried to mirror engineering process
|
||||||
|
- software is different
|
||||||
|
- needs to be flexible
|
||||||
|
|
||||||
|
timeline
|
||||||
|
- waterfall
|
||||||
|
- spiral
|
||||||
|
- agile
|
||||||
|
|
||||||
|
# stages
|
||||||
|
- design
|
||||||
|
- feasability
|
||||||
|
- 
|
||||||
|
- financial, legal, time, etc
|
||||||
|
- requirements specification
|
||||||
|
- stakeholders
|
||||||
|
- anyone affected by the system
|
||||||
|
- 
|
||||||
|
- features, requirements
|
||||||
|
- 
|
||||||
|
- 
|
||||||
|
- 
|
||||||
|
- system design
|
||||||
|
- 
|
||||||
|
- databse design
|
||||||
|
- er model etc
|
||||||
|
- architectural design
|
||||||
|
- structure of application
|
||||||
|
-
|
||||||
|
- develop
|
||||||
|
- validaion
|
||||||
|
- evolution
|
||||||
|
|
||||||
|
may go by different names
|
||||||
|
|
||||||
|
|
||||||
|
# for Information assurance
|
||||||
@ -39,4 +39,4 @@ No final exam
|
|||||||
- [16-cloud-security](notes/16-cloud-security.md)
|
- [16-cloud-security](notes/16-cloud-security.md)
|
||||||
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
|
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
|
||||||
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
|
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
|
||||||
-
|
- [19-deepfakes](notes/19-deepfakes.md)
|
||||||
Loading…
Reference in New Issue
Block a user