vault backup: 2022-10-10 10:42:45

This commit is contained in:
Jet Hughes 2022-10-10 10:42:45 +13:00
parent 4d5c3664d9
commit ed79f5fc5a
3 changed files with 88 additions and 2 deletions

View File

@ -4,6 +4,9 @@ aliases:
tags: tags:
- comp210 - comp210
- lecture - lecture
sr-due: 2022-10-13
sr-interval: 3
sr-ease: 250
--- ---
# what, origins, how # what, origins, how
@ -82,4 +85,16 @@ plausible deniability
should "you" be concerned should "you" be concerned
- for your personal integrity no - for your personal integrity no
- likely not enough data for you to be faked - likely not enough data for you to be faked
- - "one shot deepfakes"
- as a citizen yes
## responses
- crytpographic siging to authenticate origin
- will this work about leaked content
ml to analyse deepfakes (e.g., blinking)
another arms race
# summary
![](https://i.imgur.com/H9wv8Bv.png)

View File

@ -0,0 +1,71 @@
---
title: "20-SE-in-IA"
aliases:
tags:
- comp210
- lecture
---
# why
- apps for IoT devices contain security flaws
- smart home security breaches
- kindles
- vulnerable libraries lead to vulnerable devices
- software helps us to use hardware
- need to make the software secure
# overview
combines computer science, engineering, and maths to make software
- software engineering coined in 1968-1969 when discussing 'software cirsis'
- security breaches
- bugs etc
different from individual programming because of the Audience
![](https://i.imgur.com/yuIeXpq.png)
- types
- generic software
- stand alone systems e.e.g, word etc
- customized software
- designed specifically for a customer
- generic can transistion to customised
# dev process
- tried to mirror engineering process
- software is different
- needs to be flexible
timeline
- waterfall
- spiral
- agile
# stages
- design
- feasability
- ![slide](https://i.imgur.com/KD8J4Dr.png)
- financial, legal, time, etc
- requirements specification
- stakeholders
- anyone affected by the system
- ![slide](https://i.imgur.com/NkMt4q7.png)
- features, requirements
- ![slide](https://i.imgur.com/ghNmRhj.png)
- ![use vs system reqs](https://i.imgur.com/DWSNrSu.png)
- ![functional vs non functional](https://i.imgur.com/gWwAWBV.png)
- system design
- ![slide](https://i.imgur.com/mMBkSp1.png)
- databse design
- er model etc
- architectural design
- structure of application
-
- develop
- validaion
- evolution
may go by different names
# for Information assurance

View File

@ -39,4 +39,4 @@ No final exam
- [16-cloud-security](notes/16-cloud-security.md) - [16-cloud-security](notes/16-cloud-security.md)
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md) - [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md) - [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
- - [19-deepfakes](notes/19-deepfakes.md)