0% found this document useful (0 votes)
5 views

Computer Notes

The document discusses the dual nature of hacking, highlighting the risks of data breaches and the role of ethical hackers in enhancing security. It also explores facial recognition technology, its benefits, and various applications in security and banking. Additionally, it touches on big data analytics and the importance of lateral reading to combat misinformation.

Uploaded by

ellarose4598
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer Notes

The document discusses the dual nature of hacking, highlighting the risks of data breaches and the role of ethical hackers in enhancing security. It also explores facial recognition technology, its benefits, and various applications in security and banking. Additionally, it touches on big data analytics and the importance of lateral reading to combat misinformation.

Uploaded by

ellarose4598
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

COMPUTERS

1. Hacking – the good and bad of it

The Bad

With increasing frequency, news stories are focussing on data security breaches, and names
such as Julian Assange, Wikileaks, and Anonymous are making headlines. But when so much
of our modern lives are digital – from our private conversations, to our workplace records -
how can we ensure our protection?

Security breach, DDoS attacks, crippling everything often aim at financial robbery and target
individuals and corporations such as banks. However, money is not the only asset vulnerable
to attack; all kinds of records, images, and other sensitive data could be targeted depending
on the aims of the attacker, which include revenge.

The Good

They go by many names: ethical hackers; penetration testers; ‘white hats’. Some do it for
glory, whilst others do it for financial gain. Their aim is to expose the faults and flaws in a
security system – before it’s too late.

Most ‘white hat’ hackers work for computer security agencies, providing reports or training.
Typically, these experts will work from within a company, and operate with the company’s
full knowledge, to deliver reports on the threats and weaknesses faced. From time to time,
these hackers may also be used to expose cases of fraud.

The so-called ethical hacker is someone with the same technical skills and abilities as the
cyber criminals they try to defend against. They often court as much controversy as they do
praise, with some claiming that they are simply bad criminals trying to make amends. The
profession, however, is finding relevance and credibility as the digital world pervades.

In these times, companies and corporations, individuals, and even entire countries should
know which measures to take to protect their data from hacking. Every size of organisation
should employ adequate security measures, and due to this being an issue of increasing
importance, there is a growing demand for candidates with skills in this field.

2. New Technology Facial Recognition

Facial recognition is a way of identifying or confirming the identity of an individual using an


image of their face. Facial recognition systems can be used to identify people in real time,
or used to identify people in photos or videos.

What are the benefits of facial recognition technology?

Some benefits of face recognition systems are as follows:


Efficient security

Facial recognition is a quick and efficient verification system. It can be faster and more
convenient compared to other biometric technologies like fingerprints or retina scans. There
are also fewer touchpoints in facial recognition compared to entering passwords or PINs. It
supports multifactor authentication for additional security verification.

Improved accuracy

Facial recognition can be a more accurate way to identify individuals than simply using a
mobile number, email address, mailing address, or IP address. For example, most exchange
services, from stocks to cryptos, now rely on facial recognition to protect customers and
their assets.

Easier integration

Face recognition technology is compatible and integrates easily with most security software.
For example, smartphones with front-facing cameras have built-in support for facial
recognition algorithms or software code.

What are the use cases of facial recognition systems?

The following are some practical applications of a face recognition system:

Fraud detection

Companies use facial recognition to uniquely identify users creating a new account on an
online platform. After this is done, facial recognition can be used to verify the identity of the
actual person using the account in case of risky or suspicious account activity.

Cybersecurity

Companies use facial recognition technology instead of, or in addition to, passwords to
strengthen cybersecurity measures. Face recognition software is also a convenient and
accurate security tool for unlocking smartphones and other personal devices.

Airport and border control

Many airports use biometric data as passports, allowing travelers to skip long lines and walk
through an automated terminal to reach their gate faster. Face recognition technology in
the form of e-passports reduces wait times and can improve security.

Banking

Individuals authenticate transactions by simply looking at their phone or computer instead


of using one-time passwords or two-step verification. Facial recognition can be safer as
there are no passwords for hackers to compromise. Similarly, some ATM cash withdrawals
and checkout registers can use facial recognition for approving payments.
Healthcare

Facial recognition can be used to control access to patient records. It can streamline the
patient registration process in a healthcare facility.

3. Big Data and Targeted Marketing


What Is Big Data Analytics?
The term "big data analytics" refers to the process of extracting valuable insights from large
amounts of data, such as hidden patterns, unexplored connections and correlations, market
trends and customer preferences. With new technological advances, it's possible to analyze
company data and get answers instantly—a process that would be much less efficient with
more conventional business intelligence solutions.

Machine Learning

Lateral Reading

In this day and age, staying informed is both essential and somewhat dangerous. The
danger I am referring to is the extremely high probability of being misinformed we are
facing whenever we read something, especially online.

Getting caught up in a misinformation campaign can leave you on the wrong side in an important
debate or even push your way of thinking in a completely wrong direction. That is where lateral
reading steps in and becomes your possible savior.
Lateral reading helps you determine an author's credibility, intent and biases by searching for
articles on the same topic by other writers (to see how they are covering it) and for other articles by
the author you're checking on.

You might also like