Information Systems Mgmt

Key concepts

Data Bias

  • Data Correctness
    • Descriptively/Normatively Correct/Incorrect 8-13
    • Why matters 14
  • Data Bias
    • Selection Bias 15-19
    • Annotation Bias 20-24-28
    • Role of algorithm 29-31
  • Key Takeaways 35

Metadata

  • Data v. Information 2
  • Data structure 3-5
  • Data as Information 6-8
  • Metadata
    • def 9
    • examples 10-14
    • Types:
      • Descriptive 15-17
      • Administrative 18-23
      • Use 24-25
    • how 28-29
    • data sources 30-32
  • The Semantic Web 33-38
  • FAIR principle 39

————————-

Week2

XML

  • Why 2-3
  • Def 4-9
  • Structure of Well-Formed XML
    • Rules of content 10-16
    • Rules of tag 17-20-26
    • Rules of attribute 29-34
    • root, prolog 27-28
    • Entity Reference 40-41
    • Handling duplications 42-45
    • Exercises 35-39, 46-48
    • Summary 49
  • Valid XML
    • Def 50-53
    • Why 54
    • Explanation 55-61
  • Data types 62-63
  • XML schema 64-70

————————-

Week3

Distributed System

  • Introduction
    • Def 3
    • Motivation 4
    • Characteristics 5-6
    • Challenges 7
    • Pros & Cons 8
  • The Byzantine Generals 9-17
  • The Dining Philosophers Problem 18-24
  • Examples
    • MMORPG 27
    • Cloud computing 28-29
  • Consensus problem
    • What 30-31
    • Why difficult 32
    • Solutions
      • Paxos algorithm 33-34
      • Raft 35-43

————————-

Week4

Security Attacks

  • Attack types 3-5
  • Security requirements 6

History of Cryptography

  • Basic idea of cryptography 18
  • Caesar, Enigma machine, Book cipher, One-time Pad 10-15

Encryption methods and keys

  • Intro
    • types of encryption 17
    • terminologies 19
  • Symmetric encryption – use single key 21
    • Stream cipher v. Block cipher 22-25
    • Key communication 26-27
    • Key reuse 28-30

Public key

  • Def 32-34
  • Applications 35
  • Requirements 36-37
  • RSA 38-56 ————————-
  • v. Symmetric keys 7
  • Session key 8
  • Combining symmetric and asymmetric 9-10

Digital signatures 11-27

  • Intro 12-14
  • Authentication through encryption 15-17
  • Digital signing
    • def 18-20
    • Digital signature 21-22
    • Man-in-the-middle attack 23-25
    • X.509 26-27

HTTPS (TLS) 28-33

  • def 29-30
  • Stages 31-33

————————-

Week5

Basic mathematics

  • Probability 6-17
  • Ensemble 18
  • Shannon Information 19
  • Entropy 20-21

Compressing data

  • Symbol codes
    • def 23-27
    • requirements 28
      • Uniquely decodable
      • Easily decodable – prefix code 29-30
    • code length 31-41 ————————-
    • Huffman codes 6-13
  • Stream codes 15-17

Noisy-Channels

  • Noisy channel def 19-22
  • Error recovery scheme 23
  • Joint entropy, conditional entropy, mutual information 25-28
  • Channel and carried information 29-36
  • Channel capacity 37-38

————————-

Week6

Authentication of users

  • Authentication v. Authorization 9-11
  • Authentication types
    • Browser based
      • Basic authentication 14-17
      • Digest authentication 18
      • Use digital certificate as client 19-20
    • Non browser based
      • Form based authentication 22-25
      • Open standard 26
      • 2FA 27-29
      • Hardware 30-31
  • Session tracking
    • def 32
    • Cookie 33-41

————————-

Storing and Cracking passwords

  • Attack methods
    • why 6
    • Brute-force attack 7
    • Dictionary attack 8-9
    • Rainbow tables 13-15
    • Social engineering 20-21
  • Storing methods
    • Hash value 10-12
    • Add salt 16-17
  • CAPTCHA 23

Web attacks

  • Injection 30-34
  • Cross-site scripting 36-45
  • Cross-site request forgery 46-51 ————————-
  • DDoS 15-18
  • Protecting your systems 19-27

————————-

Week7

HTTP

JSON & CSV

  • Serializing data 2-3
  • CSV 7-13
  • JSON
    • def 14
    • Structure 16-20
    • XML and JSON 21-24, 30-32
    • Javascript JSON 25
    • Use in databases 26-29

————————-

Week8

RESTful API

  • API 3-11
  • Web API 15-17
  • REST API
    • def 18-19
    • Fundamental concepts 20-30
    • Resources & Representations 31-39
    • Uniform Service Interface 40-45
    • Stateless 46
    • Hypermedia constraint 47-51
    • Application Semantics 52-53
    • Media types 60-63
    • Self describing

————————-

Week9

AJAX

  • def 5-10
  • AJAX and browser 11-12
  • AJAX and Web services 13-14
  • Setting up
    • example 16-20
    • GET or POST 23-24
    • between open and send 25-27
  • Handling XML 32-36
  • Handling JSON 37-38

————————-

AJAX Security

  • SOP 7
  • JSONP 8-24
    • Access JSON Object 9-10
    • Pad JSON Object 11
    • FUnctions using JSON 12-14
    • Flickr example (Callback) 15-23
    • Security concerns 24
  • CORS 25-30
  • Preflight message 31-33
  • General security 34

————————-

Week11

Cloud and Virtualisation

  • Building a datacenter
    • why 3-4
    • defs 5-6
    • Physical requirements 7-15
    • Topology 16-18
    • Failures 19
  • Datacenter loads
    • Service models 20-22
    • Datacenter workloads 23-26
    • Big data 27-30
  • Hypervisors and virtualization
    • def 31, 33-34
    • why 32
    • pros & cons 35, 43
    • VM images 36-37
    • Hypervisor 38-40
    • Microkernels 41

————————-

Week12

  • basics
    • trust 8
    • ledger 10-11
  • blockchain
    • def 12
    • blockchain and trust 13-14
    • transaction 15-16
    • verifiable accounting 17-22
      • validation 24-25
      • verification 27
    • blockchain mining 28-32
    • 51% attack 33
      • proof of stake 34
      • proof of authority 35
    • applications 37-45

Tags:

Comments are closed

Latest Comments