mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 14:54:05 -06:00
vault backup: 2022-10-10 10:42:45
This commit is contained in:
parent
4d5c3664d9
commit
ed79f5fc5a
@ -4,6 +4,9 @@ aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
sr-due: 2022-10-13
|
||||
sr-interval: 3
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
# what, origins, how
|
||||
@ -82,4 +85,16 @@ plausible deniability
|
||||
should "you" be concerned
|
||||
- for your personal integrity no
|
||||
- likely not enough data for you to be faked
|
||||
-
|
||||
- "one shot deepfakes"
|
||||
- as a citizen yes
|
||||
|
||||
## responses
|
||||
- crytpographic siging to authenticate origin
|
||||
- will this work about leaked content
|
||||
|
||||
ml to analyse deepfakes (e.g., blinking)
|
||||
|
||||
another arms race
|
||||
|
||||
# summary
|
||||

|
||||
|
||||
71
content/notes/20-SE-in-IA.md
Normal file
71
content/notes/20-SE-in-IA.md
Normal file
@ -0,0 +1,71 @@
|
||||
---
|
||||
title: "20-SE-in-IA"
|
||||
aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
---
|
||||
|
||||
# why
|
||||
- apps for IoT devices contain security flaws
|
||||
- smart home security breaches
|
||||
- kindles
|
||||
- vulnerable libraries lead to vulnerable devices
|
||||
- software helps us to use hardware
|
||||
- need to make the software secure
|
||||
|
||||
# overview
|
||||
combines computer science, engineering, and maths to make software
|
||||
|
||||
- software engineering coined in 1968-1969 when discussing 'software cirsis'
|
||||
- security breaches
|
||||
- bugs etc
|
||||
|
||||
different from individual programming because of the Audience
|
||||

|
||||
|
||||
- types
|
||||
- generic software
|
||||
- stand alone systems e.e.g, word etc
|
||||
- customized software
|
||||
- designed specifically for a customer
|
||||
- generic can transistion to customised
|
||||
|
||||
# dev process
|
||||
- tried to mirror engineering process
|
||||
- software is different
|
||||
- needs to be flexible
|
||||
|
||||
timeline
|
||||
- waterfall
|
||||
- spiral
|
||||
- agile
|
||||
|
||||
# stages
|
||||
- design
|
||||
- feasability
|
||||
- 
|
||||
- financial, legal, time, etc
|
||||
- requirements specification
|
||||
- stakeholders
|
||||
- anyone affected by the system
|
||||
- 
|
||||
- features, requirements
|
||||
- 
|
||||
- 
|
||||
- 
|
||||
- system design
|
||||
- 
|
||||
- databse design
|
||||
- er model etc
|
||||
- architectural design
|
||||
- structure of application
|
||||
-
|
||||
- develop
|
||||
- validaion
|
||||
- evolution
|
||||
|
||||
may go by different names
|
||||
|
||||
|
||||
# for Information assurance
|
||||
@ -39,4 +39,4 @@ No final exam
|
||||
- [16-cloud-security](notes/16-cloud-security.md)
|
||||
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
|
||||
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
|
||||
-
|
||||
- [19-deepfakes](notes/19-deepfakes.md)
|
||||
Loading…
Reference in New Issue
Block a user