IA 2 - UNIT 1 and 5 Flashcards
refers to extremely large and complex datasets that are difficult to process and analyze using traditional data processing tools and techniques.
Big Data
Key Characteristics of Big Data
- volume
- velocity
- veracity
- variety
- value
Refers to the massive amount of data generated every second from various sources, such as social media, sensors, transactions, and machines. Big data involves handling datasets that range from terabytes to petabytes and beyond
Volume
Describes the speed at which data is generated and processed. With big data, information is produced rapidly and continuously, requiring real-time or near-real-time processing to derive actionable insights.
Velocity
Refers to the diversity of data types, including structured (like databases), unstructured (like text, images, or video), and semi-
structured data (such as JSON or XML files). Big data involves dealing with this variety of formats from different sources.
Variety
Refers to the uncertainty or quality of the data, as big data can sometimes be incomplete, inaccurate, or inconsistent.
Veracity
Highlights the importance of extracting meaningful and valuable insights from big data.
Value
- The vast array of physical objects equipped with sensors and software that enable them to interact with little human intervention by collecting and exchanging data via a network.
- includes the many “smart,” computer-like devices so commonplace today, which can connect with the Internet or interact via wireless networks
iot
Benefits of IoT in the Society
- improved efficiency
- better health outcomes
- environmental benefits
- enhanced convinience
- enhanced safety and security
- new business opportunities
What impact will IoT have in
the economy
- job creation
- new business models
- cost savings
- increased productivity
- improved customer experience
- new revenue streams
Data Security in
IoT
- Device Authentication and Authorization
- Data Encryption
- Secure Firmware and Software Updates
- Network Security
- data integrity and verification
- privacy protection
- resilience and redundancy
- user education and awareness
One of the first steps to secure IoT systems is to make
sure only approved devices and users can connect to
the network. Using strong ways to verify identities, like
multi-factor authentication and unique device IDs,
helps block unauthorized access.
Device Authentication and Authorization
crucial for protecting information both while it is being sent and when it is stored. IoT devices often send sensitive data, and encrypting this data makes sure that even if someone intercepts it, they cannot read it.
data enctyption
Regular updates are essential for keeping IoT devices secure. However, updates can be risky if not done safely. Using secure update methods, like digitally signed firmware and over-the-air (OTA) updates, ensures that only approved updates are installed, protecting devices from harmful software.
Secure Firmware
and Software
Updates
IoT devices are usually part of larger networks, so
keeping the network secure is crucial for overall IoT
security. Using firewalls, intrusion detection systems
(IDS), and intrusion prevention systems (IPS) helps
monitor and protect the network from threats.
Network Security