Chapter 7 Other Emerging Technologies
Chapter 7 Other Emerging Technologies
Chapter 7 Other Emerging Technologies
Chapter 7
Learning Outcomes
After accomplishing this lesson, Students will be able to:
● As small as a nanometer is, it's still large compared to the atomic scale
● higher strength
● lighter weight
● Burning motors will likewise profit from parts that are all the more
hardwearing and higher temperature safe
Biotechnology
● It is the broad area of biology involving living systems and organisms to
develop or make products, or
● Each of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain)
○ a timestamp, and
● Distributing data throughout the network protects files from getting hacked
or lost
Cloud Computing
● Cloud computing is a means of networking remote servers that are
hosted on the Internet
Public Cloud
Private Cloud
Hybrid Cloud
Cloud computing: Public Cloud
● A third-party provider manages the servers, applications, and storage much
like a public utility
infrastructure,
web development or
a cloud-based app
● Give clients access to a quantum computer over the internet, and you have
quantum cloud computing
Quantum Computing
● Currently, the only organization which provides a quantum computer in the
cloud is IBM. They allow free access to anyone who wishes to use their 5-
qubit machine
● Google provided the fastest quantum computer with 53 qubits and speed
of 200 seconds computation while the supercomputer took 10000 years
Quantum computing
● What is qubit and how many do you need?
acquiring,
processing,
● rapid parts inspection for quality assurance using stereo vision with
specialized illumination to measure tolerances on aircraft wings or auto
body parts
Application security
● Web application vulnerabilities are a common point of intrusion for
cybercriminals
● As applications play an increasingly critical role in business, it is vital to focus on
web application security
Cybersecurity measures
Network security
● Network security is the process of protecting the usability and integrity of your network
and data
● This is achieved by conducting a network penetration test, which scans your network for
vulnerabilities and security issues
Leadership commitment
● Leadership commitment is the key to cyber resilience. Without it, it is very difficult to
establish or enforce effective processes
● Top management must be prepared to invest in appropriate cybersecurity resources,
such as awareness training
Password management
● You should implement a password management policy that provides guidance to ensure
staff create strong passwords and keep them secure
Types of cybersecurity threats
Ransomware
● It is a type of malicious software
● It is designed to extort money by blocking access to files or the
computer system until the ransom is paid
● Paying the ransom does not guarantee that the files will be recovered or
the system restored
Malware
● It is a type of software designed to gain unauthorized access or to cause
damage to a computer
Types of cybersecurity threats
Social engineering
● it is a tactic that adversaries use to trick you into revealing sensitive
information
● They can solicit a monetary payment or gain access to your confidential
data
● Social engineering can be combined with any of the threats listed
before to make you more likely to click on links, download malware, or
trust a malicious source
Types of cybersecurity threats
Phishing
● it is the practice of sending fraudulent emails that resemble emails
from reputable sources
● The aim is to steal sensitive data like credit card numbers and login
information
● It’s the most common type of cyber-attack
● You can help protect yourself through education or a technology
solution that filters malicious emails
Benefits of cybersecurity
● Business protection against malware, ransomware, phishing, and social
engineering
● Protection for data and networks
● Prevention of unauthorized users
● Improves recovery time after a breach
● Protection for end-users
● Improved confidence in the product for both developers and customers