Cybersecurity and Trustworthy Computing PDF
Document Details
Uploaded by EasyToUseRetinalite4645
CSUCEGS College of Engineering and Geosciences
2065 JMTH
Tags
Summary
This presentation explores cybersecurity and trustworthy computing as vital concepts in today's digital landscape. It explains the importance of building secure and reliable computing systems. The report also provides a discussion on robotics and automation.
Full Transcript
Cybersecurity and Trustworthy Computing Report by: Cybersecurit y Cybersecurity involves protecting systems, networks, and data from digital attacks, which are increasingly prevalent in today's interconnected world. It encompasses various practices and technologies aimed at safeguardin...
Cybersecurity and Trustworthy Computing Report by: Cybersecurit y Cybersecurity involves protecting systems, networks, and data from digital attacks, which are increasingly prevalent in today's interconnected world. It encompasses various practices and technologies aimed at safeguarding information from unauthorized access, theft, and damage. Trustworthy computing Trustworthy computing, on the other hand, focuses on creating systems that are reliable, secure , and resilient against threats. It emphasizes the importance of building trust in computing systems through robust security measures and ethical practices. Key Components of Cybersecurity Definition: Cybersecurity refers to the technologies, practices, and policies designed to protect systems, networks, and data from cyber threats. Importance: Protects sensitive information from theft and damage. Mitigates risks associated with cyberattacks, which can lead to financial loss, reputational damage, and legal consequences. Essential for maintaining the integrity and availability of critical infrastructure. Types of Cyber Threats: Malware: Malicious software designed to harm or exploit any programmable device or network. Phishing: Deceptive attempts to obtain sensitive information by masquerading as a trustworthy entity. Ransomware: A type of malware that encrypts data and demands payment for its release. Insider Threats: Risks posed by individuals within the organization who may misuse their access to information. Cybersecurity Strategies Incident Response Defense in Depth: Plans: Implementing multiple layers of Preparing for potential breaches security controls to protect assets. with predefined procedures to minimize damage. Security Awareness Use of Advanced Training: Technologies: Educating employees about Leveraging AI and machine potential threats and safe practices learning to detect and respond to to reduce human error. threats in real-time. Trustworthy Computing Principles Reliability: Privacy: Systems should operate correctly Safeguarding personal information and consistently under expected and ensuring that data collection conditions. practices are transparent and ethical. Security: Compliance: Protecting systems against Adhering to legal and regulatory unauthorized access and ensuring requirements related to data data integrity. protection and cybersecurity. Emerging Trends in Cybersecurity AI and Automation: Zero Trust Architecture: Increasing use of AI-driven tools for A security model that requires strict threat detection and response, identity verification for every person which can enhance efficiency and and device attempting to access effectiveness. resources, regardless of whether they are inside or outside the network perimeter. Cloud Security: Critical Infrastructure As organizations migrate to cloud environments, securing cloud- Protection: based assets becomes critical, Ensuring the security of essential following a shared responsibility services such as power grids, model. healthcare systems, and transportation networks against cyber threats. Conclusion Cybersecurity and trustworthy computing are vital in today's digital landscape, where threats are constantly evolving. Organizations must adopt comprehensive strategies that encompass both technical measures and human factors to protect their assets and maintain trust in their computing environments. Robotics and automation Report by: Robotics and automation are two interrelated fields that have transformed industries, improved efficiency, and enhanced the quality of life. They encompass a wide range of technologies and applications, from industrial robots to autonomous vehicles and smart home devices. Below is a comprehensive discussion of robotics and automation, including their definitions, components, applications, challenges, and future trend Definitions Robotics: The branch of technology that deals with the design, construction, operation, and use of robots. Robots can be programmed to perform tasks autonomously or semi-autonomously, often mimicking human actions or performing repetitive tasks with precision. Automation: The use of technology to perform tasks without human intervention. Automation can include mechanical devices, control systems, and software applications that streamline processes in various industries. Key Components of Robotics Sensors: Actuators: Controllers: Devices that detect Components that enable The "brain" of the robot, changes in the movement or control of a which processes inputs environment and provide robot. They can include from sensors and sends feedback to the robot. electric motors, hydraulic commands to actuators. Common sensors include systems, and pneumatic Controllers can be cameras, LIDAR, ultrasonic devices. microcontrollers, sensors, and embedded systems, or accelerometers. advanced processors running AI algorithms. Software: Power Supply: Programming that allows The source of energy for the robots to perform specific robot, which can be batteries, tasks. This can include solar panels, or wired everything from basic control connections. algorithms to complex artificial intelligence for decision-making. Types of Robots Collaborative Industrial Service Robots Robots: Robots: (Cobots): Used in manufacturing and Designed to assist humans Robots designed to work production lines for tasks in various tasks, including alongside humans, often in such as welding, painting, cleaning (e.g., robotic shared workspaces, assembly, and material vacuum cleaners), enhancing productivity handling. healthcare (e.g., surgical without replacing human robots), and customer workers. service (e.g., robots in hospitality). Autonomous Humanoid Vehicles: Robots: Robots that can navigate and Robots designed to resemble operate independently, such and mimic human actions, as drones, self-driving cars, often used in research, and robotic delivery systems. entertainment, and social interaction. Future Trends in Robotics and Automation Artificial Edge Human-Robot Intelligence: Computing: Collaboration: The integration of AI into Processing data closer to The development of safer robotics is expected to where it is generated (at and more intuitive enhance decision-making, the "edge") can reduce collaborative robots will learning, and adaptability, latency and improve the enable better interaction allowing robots to perform responsiveness of robotic between humans and more complex tasks. systems. robots in various settings. Swarm Increased Robotics: Customization: Inspired by nature, swarm Advances in 3D printing and robotics involves multiple modular robotics will enable robots working together to more customizable solutions accomplish tasks, improving tailored to specific industry efficiency and resilience. needs. Conclusion Robotics and automation are rapidly evolving fields with the potential to revolutionize industries and enhance everyday life. While they offer significant benefits in terms of efficiency, safety, and productivity, Space electronics and satellite technologies Report by: Space electronics and satellite technologies are critical components of modern space exploration and communication systems. They encompass a wide range of technologies designed to operate in the harsh environment of space, where factors like radiation, extreme temperatures, and vacuum conditions pose unique challenges. Space Electronics Definition: Space electronics is a specialized field focused on developing electronic systems and components that can withstand the extreme conditions of space. This includes designing devices that can collect, store, process, and transmit data effectively. Key Components: Microcontrollers and Processors: Actuators: These are the brains of space Devices that enable movement and systems, managing operations and control within spacecraft, such as processing data. They must be motors and servos. radiation-hardened to function reliably in space. Sensors: Power Systems: Used to gather data about the Solar panels and batteries provide environment, including energy to spacecraft, requiring temperature, pressure, and efficient energy management radiation levels. systems. Challenges: Vibration and Radiation Exposure: Shock: Space electronics must be Launch conditions expose designed to resist high levels electronics to significant of radiation, which can vibrations and shocks, damage components and requiring robust designs to lead to system failures. ensure reliability. Thermal Management: Electronics must operate within a specific temperature range, necessitating effective thermal control systems. Satellite Technologies Types of Satellites: Communication Earth Observation Satellites: Satellites: Facilitate Used for monitoring telecommunications, environmental changes, broadcasting, and weather forecasting, and internet services. They disaster management. are often placed in Navigation They can be in polar geostationary orbits to orbits for global maintain a fixed position Satellites: coverage. relative to Earth. Such as GPS and GLONASS, provide positioning and timing information for various applications, including navigation and mapping. Satellite Components: Payload: Bus: The instruments and The supporting structure equipment that perform that houses the the satellite's primary satellite's subsystems, mission, such as cameras, sensors, and Propulsion including power, thermal control, and communication transponders. System: communication systems. Used for orbit insertion and adjustments, ensuring the satellite remains in its designated orbit. Applications: Telecommunications: -Satellites enable global communication networks, supporting everything from mobile phones to internet services. Weather Forecasting: -Meteorological satellites provide critical data for weather prediction and climate monitoring. Scientific Research: -Satellites are used for astronomical observations, Earth science studies, and space exploration missions. Future Trends in Space Electronics and Satellite Technologies Miniaturization: -Advances in technology are leading to smaller, more efficient satellites, such as CubeSats, which are cost-effective and allow for more frequent launches. Increased Autonomy: -Future satellites will incorporate more autonomous systems, reducing the need for constant ground control and enabling real- time decision-making. Enhanced Communication Technologies: -The development of laser communication systems promises higher data rates and improved bandwidth for satellite communications. Inter-satellite Links: -Future satellite constellations will feature direct communication links between satellites, enhancing data transfer speeds and reducing latency. Sustainability: -Efforts are being made to reduce space debris and develop sustainable practices in satellite design and operation, including the use of reusable launch systems. Conclusion Space electronics and satellite technologies are integral to modern communication, navigation, and scientific research. As technology continues to advance, these fields will play an increasingly vital role in exploring and understanding our universe while providing essential services on Earth. THANK YOU Protect against cyber attacks Check Strong website url passwords Manage Keep social software media updated Internet Strengthen security home suite network 5 functions of cybersecurity 01 03 05 framework... Identify Detect Recover Despite being 02 Venus is the 04 Pluto is now red, Mars is second planet considered a actually a cold place. from the Sun. dwarf planet Protect Responds Jupiter is a gas Saturn is a gas giant and the giant and has biggest planet several rings Services resume Services Resume Description of service Mercury is the closest planet to the Sun and the smallest one Service 1 Venus has a beautiful name and is the second planet from the here Sun Service 2 Description of service here Repercussion Description of service Service 3 here Regio Europe, n Asia Description of service Service 4 here Description of service Area Urban Service 5 here Follow the link in the map to modify its data and then paste the new one here. For more info, click here Security project Utilization Cost per 120 u/day 2h Resource rate unit Output per Time to complete Labor 85% $50 worker a task Equipment 70% $100 Materials 95% $20 Rent 90% $1,000 Energy 80% $80 Software licenses 80% $200 Advertising 60% $500 Follow the link in the map to modify its data and then paste the new one here. For more info, click here Different phases in cybersecurity Key Value Customer Customer Key activities partners propositions relationships segments Identify important Identify key activities Define what sets Determine how you will Define specific partners for your that create value for your business apart interact with customers target customer business customers from competitors groups Key Channels resources Identify important Determine how you will resources needed for reach and engage with your business customers Cost structure Revenue streams Identify fixed and variable costs associated with the Define sources of revenue for your business business Our future objectives Initiative Objective Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Analyze and understand the Understanding needs of your target audience Research existing products in the Conduct research industry and analyze how successful they are Generate ideas based on user Brainstorm ideas feedback and research findings Develop a Create a basic version of the prototype product to show investors Put the prototype through rigorous testing processes to Test for usability ensure that it meets user requirements Understand the opinion of the Analyze feedback users who tried your product Thanks! Do you have any questions? [email protected] +34 654 321 432 yourwebsite.com CREDITS: This presentation template was created by Slidesgo, and includes icons by Flaticon, and infographics & images by Freepik Please keep this slide for attribution Alternative resources Here’s an assortment of alternative resources whose style fits that of this template: Photos Medium shot programmer sitting on chair Top view laptop with lock and key Programming background with person working with codes on computer Programming background with person working with codes on computer II Hacker with laptop Close up of hacker Portrait of hacker Free photo programming background with person working with codes on computer Programming background with person working with codes on computer Resources Did you like the resources in this template? Get them on these websites: Photos Business teammates working late at the office Crop woman using laptop in dark room Close up programmer sitting at desk Html and css collage concept with person Laptop with lock and chain arrangement Top view laptop with lock and key Person in front of computer working html Coworkers looking the monitor Vectors Gradient data privacy facebook template Instructions for use If you have a free account, in order to use this template, you must credit Slidesgo by keeping the Thanks slide. Please refer to the next slide to read the instructions for premium users. As a Free user, you are allowed to: Modify this template. Use it for both personal and commercial projects. You are not allowed to: Sublicense, sell or rent any of Slidesgo Content (or a modified version of Slidesgo Content). Distribute Slidesgo Content unless it has been expressly authorized by Slidesgo. Include Slidesgo Content in an online or offline database or file. Offer Slidesgo templates (or modified versions of Slidesgo templates) for download. Acquire the copyright of Slidesgo Content. For more information about editing slides, please read our FAQs or visit our blog: https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school Instructions for use (premium users) As a Premium user, you can use this template without attributing Slidesgo or keeping the "Thanks" slide. You are allowed to: Modify this template. Use it for both personal and commercial purposes. Hide or delete the “Thanks” slide and the mention to Slidesgo in the credits. Share this template in an editable format with people who are not part of your team. You are not allowed to: Sublicense, sell or rent this Slidesgo Template (or a modified version of this Slidesgo Template). Distribute this Slidesgo Template (or a modified version of this Slidesgo Template) or include it in a database or in any other product or service that offers downloadable images, icons or presentations that may be subject to distribution or resale. Use any of the elements that are part of this Slidesgo Template in an isolated and separated way from this Template. Register any of the elements that are part of this template as a trademark or logo, or register it as a work in an intellectual property registry or similar. For more information about editing slides, please read our FAQs or visit our blog: https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school Fonts & colors used This presentation has been made using the following fonts: Teko Semibold (https://fonts.google.com/specimen/Teko) Golos Text Regular (https://fonts.google.com/specimen/Golos+Text) #16488d #a5c8fd #beccdf #0d958b #00ccbc #ffffffff Storyset Create your Story with our illustrated concepts. Choose the style you like the most, edit its colors, pick the background and layers you want to show and bring them to life with the animator panel! It will boost your presentation. Check out how it works. Pana Amico Bro Rafiki Cuate Use our editable graphic resources... You can easily resize these resources without losing quality. To change the color, just ungroup the resource and click on the object you want to change. Then, click on the paint bucket and select the color you want. Group the resource again when you’re done. You can also look for more infographics on Slidesgo. JANUARY FEBRUARY MARCH APRIL MAY JUNE PHASE 1 Task 1 Task 2 PHASE 2 Task 1 Task 2 JANUARY FEBRUARY MARCH APRIL PHASE 1 Task 1 Task 2...and our sets of editable icons You can resize these icons without losing quality. You can change the stroke and fill color; just select the icon and click on the paint bucket/pen. In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons. Educational Icons Medical Icons Business Icons Teamwork Icons Help & Support Icons Avatar Icons Creative Process Icons Performing Arts Icons Nature Icons SEO & Marketing Icons Premium infographics Text 1 Text 2 Text 3 “Mercury is the “Despite being red, smallest planet in Mars is actually a the Solar System” very cold place” Add the title here 2016 2017 2018 2019 2020 “Venus is the “Neptune is the “Saturn is a gas second planet from farthest planet from giant and has the Sun and is the Sun” several rings” terribly hot” Text 4 Text 5 Text 6 Premium infographics 75% “Despite being red, Mars is actually a very cold place” 75% “Jupiter is the TITLE 1 biggest planet in the entire Solar System” “Mercury is the smallest planet in the Solar System” “Saturn is a gas giant and has several rings” Premium Icons Digital Marketing Premium Icons Online Learning Premium Icons Laboratory Premium Icons Goals & Results Premium Icons Infographic Elements