Week 06_Lecture 06
Week 06_Lecture 06
W06
Tertulia:…
Lecture: Digital transformation Trends
Class activity: Simulation Debrief
Class discussion: Based on this week’s readings
Case Presentation: Team Three
Python workshop: None
1
• An open discussion about last week digital transformation news
2
3
4
5
• Internet of Things, Cybersecurity, and Cloud Computing
6
7
• Accessing computing resources in
ways that are not restricted by
physical configuration or
geographic location.
• Ability to host multiple systems
on a single physical machine
• Allows multiple operating systems
to run on one machine; increases
server utilization rates from 10-15
to 70 percent or higher of capacity
https://www.youtube.com/watch?v=iBI31dmqSX0 8
A model of computing in which computer processing, storage,
software, and other services are provided as a pool of
virtualized resources over a network, primarily the Internet
10
Infrastructure as a Platform as a Software as a
Service (IaaS) Service (PaaS) Service (SaaS)
Customers use processing, Customers use infrastructure
storage, networking and programming tools to Customers use software
resources to run their develop their own hosted on a vendor’s cloud
information systems applications
11
• Number of installed Cloud
workloads,
In million,
By service type,
Global,
2015-2010
https://www.mordorintelligence.com/industry-reports/cloud-services-brokerage-csb-market 12
• Amazon Maintains Lead in the Cloud Market
13
TYPE OF PRIVATE CLOUD HYBRID CLOUD PUBLIC CLOUD
CLOUD
DESCRIPTION Cloud infrastructure operated Combination of private Third-party service offering
solely for a single and public cloud services computing, storage, and software
organization and hosted either that remain separate services to multiple customers
internally or externally. entities and that is available to the public
MANAGED BY In-house IT or private third- In-house IT, private host, Third-party service providers
party host third-party providers
USES Companies with stringent Companies requiring Companies without major
privacy and security some in-house control of privacy concerns
requirements IT that are also willing to Companies seeking pay-as-you
Companies that must have assign part of their IT go IT services
control over data sovereignty infrastructures to a public Companies lacking IT resources
cloud and expertise
14
15
16
16
123456 123456789 qwerty password 12345
17
https://www.raconteur.net/sponsored/companies-must-act-now-to-defend-against-cyber-attacks 18
19
Security Control
Controls are methods, policies, and
Security refers to the policies,
organizational procedures ensuring
procedures, and technical measures
the
used to prevent
,
, , , or
, and
.
.
20
A computer virus Worms A Trojan horse Spyware
21
A hacker is an individual who intends to gain unauthorized access to a
computer system by finding weaknesses in the security protections websites
and computer systems employ.
Hacker activities
• system intrusion
• theft of goods and information
• system damage and cybervandalism (the intentional disruption, Defacement, destruction of a website
or corporate information system)
22
Spoofing Sniffing
• Using fake email addresses or • A program that listens in on network
pretending to be someone else. It traffic, allowing hackers to steal
can also involve redirecting a web private information like emails,
link to a different address that company files, and confidential
mimics the intended site. reports from anywhere on the
network.
23
Denial-of-Service (DoS) Attacks
A distributed denial-of-service
is flooding a network server or
(DDoS) attack uses numerous
web server with many thousands
computers to inundate and
of false communications or
overwhelm the network from
requests for services to crash the
many launch points.
network.
24
Bogus clicks to drive up pay-
per-clicks
25
Identity theft is a crime where someone uses another person’s
personal information—like social security numbers, driver’s license
numbers, or credit card details—to pretend to be them.
Phishing is when scammers create fake websites or send emails that look
like they’re from trusted businesses to trick users into sharing sensitive
personal information.
26
Security threats Social Intentional Careless
often originate engineering Malicious Behavior
inside an Behavior
organization • Tricking • Associated with
employees into • Typically ignorance of or
revealing their associated with disinterest in
• Sloppy security passwords by disgruntled or ill- security problems
procedures pretending to be willed employees • i.g., failing to
• User lack of legitimate • i.g., selling destroy sensitive
knowledge members of the customers’ info to data carelessly
company in need spammers
of information
27
General controls apply to all computerized applications and consist of a
combination of hardware, software, and manual procedures that create an
overall control environment.
Implementation
Administrative
Data security
operations
Computer
Hardware
Software
controls
controls
controls
controls
controls
controls
28
• An information systems audit examines the firm’s overall security
environment as well as controls governing individual information
systems.
29
29
30
Ubiquity of Connectivity: Technology Enablers: Awareness, Autonomy, and Layered Architecture:
Actionability:
IoT refers to the growing Improvements in processing power, Devices collect data, process IoT systems operate on three
transmission, and storage have fueled
network of connected devices, the growth of IoT.
it, and make autonomous layers
from household items to decisions, such as self-driving
industrial systems. cars. Connected objects
Autonomy
Central data platforms
Services
Actionability
Awareness
31
• IoT is in its early stage of maturity
• Interoperability Issues
• Different platforms and standards create
challenges for fully integrated IoT systems.
Connected objects
Services
32
Use Case-Driven Adoption
• IoT adoption is led by specific use cases like smart
meters, connected cars, and automated inventory.
Leading IoT connectivity technologies
• Wi-Fi, Bluetooth, and Cellular IoT make up nearly 80% of
all IoT connections.
Three major developments in the IoT market
• AI in IoT, Security, and Sustainability.
Future Growth
• IoT devices are expected to grow by 13% in 2024, leading
to 18.8 billion connected devices by 2025.
33
34
• Readings
35
36
The blockchain a distributed database technology that enables
firms and organizations to create and verify transactions on a
network nearly instantaneously without a central authority.
37
38
Block 1
Block
Genesis6
2
3
4
5
Block
39
Block 1
Genesis Block 2 Tampered
Block 3 Tampered
Block 4 Tampered
Block 5 Tampered
Block 6
Block Block 3 Block 4 Block 5 Block 6
0000 6F31 5F85 7R85
4H78 8Y45
8J63 6F31
4G22
40
41
Why is blockchain not considered a disruptive technology despite its potential
to transform industries?
How does the analogy between blockchain and TCP/IP help explain the
expected timeline for blockchain’s widespread adoption?
What are the challenges businesses might face as blockchain becomes more
integrated into economic and social systems?
42
Blockchain has the potential to remove intermediaries
like lawyers, brokers, and banks.
What industries or
In which areas would
roles are most How might this shift
it still be difficult to
vulnerable to affect businesses’
eliminate
disruption due to strategies and
intermediaries, and
blockchain workforce structures?
why?
technology?
43
High
Requires
Low risk, but Regulatory High barriers to
ecosystem-wide
limited impact uncertainty adoption
buy-in
46
by Nathan Furr and Andrew Shipilov
47
01 02 03 04 05
Digital requires Digital will Digital involves Digital is about Digital requires
radical replace physical buying startups technology overhauling
disruption of the legacy systems
value
proposition
48
49
• Team Three
Ethereum: Navigating the Blockchain's Sustainability Versus Profit Dilemma
By: Ernesto Dal Bo, Guo Xu
50
51
52
• …
53
54
55
`
ANY QUESTION? W02