Gbe It
Gbe It
Digitalisation = synonym for digital transformation (+ strong focus on ● digitalisation = transform continuous -> concrete value
business) => special binary system of 0 and 1
"application of digital tech in all aspect of human society"
bit: smallest piece of info // info-unit w 2 states 0 or 1
Digital Transformation is driven by "Enablers" byte = 8 bits // info unit consist of 8 bits
● no need to dev new tech -> but identify & implement
opportunities based on these tech 𝑓𝑖𝑙𝑒 𝑠𝑖𝑧𝑒
𝑇𝑖𝑚𝑒 = 𝑏𝑎𝑛𝑑𝑤𝑖𝑑𝑡ℎ
10
How challenges r defined? Kilo = 2 = 1.024
20
Turing test: measure of a machine's ability to exhibit intelligent Mega = 2 = 1.024 * 1.024
behaviour equivalent to or indistinguishable from that of a human 30
Giga = 2 = 1.024 * 1.024 * 1.024
<=> first ever computer to pass: algorithm
*Kilo, Mega, Giga, etc not clearly defined
*1024 only use for file size ; for bandwidth use 1000
3 dimensions of Digital Transformation
● Development of new products and service (Value
Proposition)
○ Products enhanced by IT e.g. self-driving cars
● Improvement of internal processes (Value Creation)
○ Business process digitisation e.g. automatic invoice
creation
● Improved interface to the customer (Customer Interaction)
○ Digital communication e.g. internet banking
—
Exercise: Uber
● VP: both stakeholders using app
● Value Creation: apply IT into management (i.e. driver
management) system ❗Important:
● Customer Interaction: call/text driver through apps ● size of files & storage media given in byte
— ● bandwidth: capacity for sending data (in bit/s ; KBit/s ;
Challenges in Digital Transformation: IT, organization, value added, MBit/s)
compliance ● factor kilo, mega, etc. always stand for 1.000, 1.000.000, etc.
respectively
● Information technology
○ Know the latest enabler (current trends? which r ⭐With n bits possible to define exactly 2 states
𝑛
future-proof) —
○ Status Quo of own IT § Exercise:
1. Legal systems 1. How many states can be expressed with 4 (8, 10, 16) bits?
4
2. Interfaces 4 bits = 2 = 16 states
○ Handling of Data 8
8 bits = 2 = 256 states
○ Running IT projects 10
10 bits = 2 = 1024 states
● Organisation
16
○ Challenge of alignment of IT and organisation 16 bits = 2 = 65536 states
○ Lack support by top-level-management
○ Lack digital culture 2. How many states does a traffic-light have? How many bits
○ Resistant against change are required to code all states of the traffic light?
3
● Value Added (how to earn (more) money w digital traffic light has 3 lights ⇒ 2 = 8 states (i.e. combination of on/off for
transformation) each light)
● Compliance = act of obeying a law/rule
○ IT fast dev. -> legal problems 3. How many states does the alphabet have? How many bits
○ Data privacy (GDPR in EU) are required for its representation?
○ Ethical issue (in ML) alphabets has 26 letters = 26 states
Challenges: Legal systems ⇒ need enough bits to cover ≥ 26 possible combi
● most companies based on IT architecture -> grown past year 𝑛
⇒ 2 ≥ 26 ⇒ n = 5 ⇒ 2 = 32
5
⭐
Audio can be digitalised (~picture digitisation) Computing Epoch:
sound, music, noise rep using sound wave
1. 1st idea:
● frequency of measurement ~ resolution
a. Charles Babbage (1791-1871)
● 2 steps of audio digitalisation
i. mechanical computer sketch on paper
○ sampling of sound wave = measure value of wave w
ii. implementation failed bc lack of tech
given frequency
b. Ada Lovelace (1815-1852)
○ quantification of sample = display measurement
i. dev. 1st concept of programming
value on predefined scale
2. otw to computer (-1960)
a. electronic accounting machine
i. simple for cashier
ii. program r fixed wire + EAMs r not
computers
⇒ lack free programmability
● standardized sample 3. Epoch 1: Mainframes & Mini-computers (1959 - today)
example: Telephone (PCM) based on 8000 8-bit sample (EU) a. start of commercial usage of mainframes →
per sec ⇒ acoustic frequencies higher than 4KHz lost
❗
computer
⇔ trade off between quality (better sound) & cost (memory & b. Important: all components incl. software and the
transmission capacity) infrastructure fr one company (now: still couldn't
— produce mọi thứ theo 1 khuôn khổ)
§ Exercise 4. Epoch 2: Personal Computer (1981 - today)
1. Calculate the required transmission capacity (Bits/s) for the a. 1965 DEC introduced mini-computer
telephone (PCM) i. cheaper than IBM-mainframes
Transmission cap. = 8000 * 8 = 64000 ii. IT can be decentralized (focus on
department instead of companies)
2. How much memory does an Audio-CD have? Use the 5. Epoch 3: Client Server (Mid 80's - today)
following assumptions: a. several clients connected to 1 server thru LAN
● 44,100 Samples/s → Frequencies up to 22,050 Hz b. offer diff service (DNS, WWW, Database)
presentable c. today: multiple services offer fr diff servers
● Samples of 16 Bits → 65,536 values 6. Internet Computing (90s - today)
● The CD has up to 74 minutes audio capacity. a. global internet = distribution of TCP/IP standard
● Because of the stereo, two separate channels are required. b. success of epoch 3 ⇒ increase network (which r
Transmission cap. = 44100 * 16 = 705600 interconnected)
c. WWW offer easy access to network & its service
development mostly driven by "what is possible" rather than
7. Cloud Computing (~2000 - today)
actual need l
a. data stored thru internet (no long on local
hardware)
b. services can be taken fr internet thru cloud Moore's Law: introduction of processor-chips (1959) -> no. of
computing transistors per chip doubled every year; consequences:
c. IT provider dev. new business model offer scalable & 1. The performance of micro-processors doubles every 18
flexible cloud service months.
— 2. The performance of computers x2 every 18 months.
§ Exercise 3. The price for IT-based processing of information is only ½
Epoch 1: What kind of transformation is enabled by the mainframes every 18 months
and mini-computers? How can the IT of an epoch support this Consequences for business:
process? ● continuous price decline for hardware → when it's best to
buy?
● qualitative prognose abt IT performance: diff
● quantitative prognose about power of future IT: possible
💡
automated tracking of invoice transactions.
Tips for the exam Protocols & Standards
If you're asked which epoch you're, check the following: ● Why r standards required for computer networks? -> to
stand-alone / department enable diff components to communicate since we need
connection to the internet? (for browsing only or core rules on how EXACTLY this communication has to look like
process of company) ● Standard: consistent, widely accepted and widely used
method to implement something
current trends: ⬆mobility, digital convergence (computer network, ● Protocol: set of regulations which define the structure of the
TV network, etc), ubiquity (hard- & software no longer limited to data to be sent and the process of the communication
computer but also embedded in cars, fridges, etc.) between components of a network.
Framework
Components of a network w same protocol implemented -> able to Gateways: a piece of networking hardware/software used in
communicate w each other telecommunications networks that allows data to flow from one
Framework (aka reference models): established to classify on an discrete network to another ; able to handle >2 diff media ⇒ ability
abstract level the diff protocols ; organised in (hierarchy) layers to to "translate" from one to other
which diff protocols r assigned Hub: (similar to USB) transmit/copy all info to all output
Switch: similar to hub but know which info to which address
Router: in the middle of network: guide where to send sth
Each computer want to connect to network need an unique address
presented in hexadecimal (i.e. combination of bits)
● MAC-address assigned by manufacturer & permanently
written into a chip
—
§ Exercise
Students of XY-University get a student-number. This
student-number consists of eight digits. The last one and the second
last one are control digits (checksums). These control digits can are
based on the first six digits and can be calculated as follows:
TCP = transmission control protocol // transport layer 6
connection-based protocol connectionless ● Calculate the checksums for the given student-numbers:
923456, 543987
more reliable + more error faster ● Additional Question: Why are the digits multiplied with
prone but slower different weights? Why is no weight equal to zero? What is
IP = internet protocol // internet layer the advantage of having two digits in the checksum?
student ID: 923456
9 2 3 4 5 6
6 5 4 3 2 1
54 10 12 12 10 6
❗Important: in theory (oft in practice) you can replace a protocol 54 + 10 + 12 + 12 + 10 + = 108 mod 100 ⇒ 08
⇒ complete student ID: 92345608
w/in a layer by another protocol W/OUT impacting the other layers
❗
● quality of own web can be analysed
Chapter 8: E-commerce Marketing
● important: comparison to real physical shop, it's possible
Conversion funnel: describe diff step user → customer
to observe customer & statistically analyze → gained data
Awareness > Interest > Consideration > Purchase > Loyalty
❗
before content of webpage display e.g. youtube) Stuxnet (2010)
term (CPC or CPM) used both for an payment method and a key ● New virus attack nuclear industry device in Iran
figure ● Analysis show:
● In the first case, you have a contract and e.g. the CPC ○ Virus quite complex -> resulted by professional
defines what to pay for. The CPC is part of the contract. ○ Way of infection: complex 'cause infected
● In the second case, you might have fixed costs (for SEO) and computers r not standard PCs + not connected to
you calculate a value for the CPC (e.g: 1.000€ for SEO, 500 internet => high logistic effort to infect these
Clicks per SEO → CPC = 2€) computes
● Suspect: virus go back to security agencies
Google adwords ○ They are the only one w motivation, knowledge and
an example of SEA (search engine ad) resources to run an attack like this
advantage: ● Learning: nowaday virus (and other attack) can do "real"
● SEA lead to better ranking in organic search damage
● criteria to be place on top: ○ Not only data stolen/manipulated -> real machines
○ exact algo = Google secret were destroyed
○ page-rank-algorithm ○ Cyber war isn't only a buzzword but happening rn
○ content of page Staatstrojaner (2011) - computer and network surveillance
● SEO is not worth if just do "little SEO" ● Bavarian order to develop the Staatstrojaner
○ one has to get on 1st page ○ Monitor VoIP & Skype-telephony
○ has special combination of words ○ Prepare ss of chats
Social Media Marketing ○ Enable download of additional software
● it's not abt display ads on FB but an individual FB entry for a ● Diff critics:
product/company ○ Surveillance society based on laws?
— ○ Trojan taken over & misused by other attacjs
§ Exercise ○ Trojan detected and made public by usual anti-virus
Company XY runs a web-shop. software
● Using display-ads, SEO and SEA, the web-shop shall become ● Learning: not only bad hackers
better known
● The following key-figures should be used:
○ Its also companies & security agencies & who r ■ Each society (each democracy) requires
running tracking and surveillance programs agreements about reality → can't agree on
○ There's a grey area of WHAT'S ALLOWED a reality = society is in danger
○ We expected (data) security guaranteed by our ● Definition of data security and data privacy
state. ○ Data security: protects data against human
● Mirai (2016) (attackers)
○ Malware (malicious software) by Linux based ○ Data privacy: protects humans against (misuse) of
⭐
system data ; Data privacy require data security
■ Linux system r usually less attacked ● Main goals of Data Security (CIAC = acronym of the listed
⭐
○ No installed on classical computer but on digital goal)
cameras ○ Confidentiality (privacy)
○ In contrast, users have become sensible + make use ■ Protection against unauthorized usage of
of basic security mean (i.e. password, virus scanner) confidential data
⭐
but still, devices unprotected ■ E.g. password, TAN, PIN, results of exam
■ Admin password unchange :) ○ Integrity (data must be complete & correct)
○ Use mirai, botnet have been built up, biggest ■ Data & messages mustn't be manipulated
contained 500k+ bots or changed. At least it has to be obvious
■ IT infrastructure of Liberia under attack -> that data has been changed
⭐
later identified as test run -> server of ■ E.g. offer in ebay, answers in e-test
online platform (i.e. Spotify, Amazon, ○ Availability
Minecraft) not reachable ■ Authorized people should have access data
● WannaCry (2017) - a worm spread thru infected & service fr all defined places @ all define
computers time
○ Actively look for computers in network using ■ E.g. server of FH, own bachelor thesis
SMB-protocol (used for printer)
availability is always hard to achieve (or not achievable) when
○ Protocol relatively old -> due to backward dealing w communication
compatibility -> still available & activated in current
versions of Window
○ ⭐Accountability (who's responsible)
■ Creation/change of data can be assigned
○ WannaCry reaches. Admin status -> encrypt ~100
clearly to a person (service)
files and ask for ransom -> has to be transfer using
■ Who has accessed the webpage? Who's
bitcoin
author of email
○ Well-known security lack in window operating
● Depending on context → goals may diff
system
● Main goals of Data Security:
■ Path (correction) is available but not
○ 4 most important goals: confidentiality, integrity,
installed on every machine
availability, accountability
■ Security lack is available in older version of
Root causes of lack of data security: technical, organisation, human
window which r out of maintenance
reasons
■ Only older computer were infected but 52%
● Technical reasons: Internet started as research activity =>
of all companies still use 1+ computer w
small community so there was trust
outdated SW
○ Security not an issue -> put aside consciously =>
● Learning: situation becomes more complex
open communication protocol (most protocol still
○ Security agencies have own agenda => not
work w/out encrypting content/control data)
able/willing to protect society
○ Internet has to built on top of standards =>
○ Politic unable to cope w situation (i.e. German
attacker can analyse architecture of protocol →
change in IT security law have nothing to do w root
identify weaknesses
cause nor effect of WannaCry
● Organisational reasons
○ User can't make use of correction
○ Unclear responsibility: who's responsible for data
○ There's growing interconnection between IT and
security in the company? => security means r oft
machines between virtual world and real world ->
organised in patchwork way
real infrastructure being vulnerable
○ Insider threat
● Damage of IT infrastructure isn't just damage of a computer
○ No rules, no user concept
-> the complete functions of an org can be destroyed. If
○ Senior management not aware of digital issue
central func. of an organisation don't work anymore ->
● Human reasons: Stupidity & Ignorance
complete organisation is out of order
○ not taken terms & conditions seriously
⇒ potential damage > broken computer
Pizzagate (2016) - fake new incident where false human trafficking reasons can/can't change?
and child sex ring was reported on diff SoMe channels
⇒ Fake news r an attack to the security of the society
technical reason ❎ can't change due to
historical reason
☑️
Damage of IT attacks: organisation reason require consciousness of
● Computer - computer can't be destroy but software can be responsible person
changed/manipulated/deleted
human reasons hard to fight → need change
● Data mindset & internal edu
○ theft/deletion/manipulation/misuse of data
○ Loss of confidentiality
Different kinds of attacks / threats
○ Loss of integrity
● Viruses - copy passively
● Embedded system (device w embedded IT)
○ Example: stuxnet (nuclear power), oil pipeline, cars
○ Loss of common reality
○ Typical activity: check if system alr infected → not? ● (secured) access control
Install itself → reproduce itself → activate starting ● restricted user rights
condition → protect itself ● restrictive configuration (i.e. give fewer rights, restrict rights)
● Worms - spread actively ● keep software up-to-date + delete outdated software
● Botnet = network of remotely controlled computer // ● create backup copies
autonomous program running on computer ● anti-virus software
○ Installed via virus/trojan ● run firewalls
○ Triggered and activated using hub-bot ● use sandboxes (give potentially dangerous programmes a
○ Goal: spreading of spam , denial of service attacks "playground" to run in)
(DoS) ● disable active content
○ Botnet can be bought or rent -> organise computer ● encrypt sensitive data: pass, file, hard-disk, data during data
criminality transmission
● How botnet install? ○ authentication w pass = weak protection
○ Attack install bot. (e.g. use virus) ○ higher security level: property/physical
○ Infected computer controlled by hub-bot characteristic (e.g. fingerprint, EC-card, etc.)
○ Botnet is sold/rent ○ strong authentication = based on 2+ measure (e.g.
○ Individual computer of botnet r steered (only small 2-factor-authentication)
amount computer capacity) + host not recognised ■ smartcard (property) + PIN (secret)
he's infected -> using botnet spam r distributed/DoS
⭐
attack r executed A whitelist will restrict network access to anyone whose IP address
● The botnet can't be found backward => attackers are does not match one on the list. This improves your security. Only
"renting" infected computers to conduct criminality. users with approved devices have access to your data or systems.
Denial of Service (DoS) = bombarded w request → server break Typically, a whitelist would be created to allow an authorized user to
● A system (e.g. web-server, ftp-server) receives a big amount do things like access a network. [source]
of legal request Encryption is the process by which a readable message is converted
● Due to big no. of request → server break = not able to to an unreadable form to prevent unauthorized parties from reading
handle "real" request it. Decryption is the process of converting an encrypted message
● DoS attack r executed using botnet back to its original (readable) format.
Hash algorithm: principle that use trapdoor function/ oneway
Attacks function (ie you can encrypt but can't decrypt)
● Attacks r strike against clearly defined goals (e.g. ● Popular example: SHA2, SHA3
competitors) = usually based on known security lacks Hashing is a one-way process that converts a password to ciphertext
(exploits) in software & operation // security lacks can never using hash algorithms
fully be avoided
○ Today: important to quickly react on newly detected
security lacks
○ Problem: altho corrections available => not install :)
Malware
● software that executes func. not wanted by owner
Phishing = a phenomenon
● Try to grab confidential info →mask other identity (e.g. send
fake email) → distributed w millions of copies as a link fwd a
victim to fake webpage ask for info
Fake news:
Social hacking: being hack by attackers who knows their victims
● Platform: fake news r spread especially thru internet
● New technical possibilities: deep fake -- use AI generate
Attacking password
picture, video, audio of each and every person
How attacker get clear password?
● Goal: establish of "alternative reality"
A hashed password for a database account is maintained in
● Future challenges: agree on ONE reality
the database, while an unhashed (clear-text) version of the
Summary:
password is stored in the external directory.
○ Attacks r more complex/multifaceted
1. It's diff to reverse hashed password
○ Attackers become more professional + more
2. Once capture, attacker compare his result to captured one
differentiated (diff goal, diff methods, diff tools)
-> identical? -> yes, "reverse" done
❗LENGTH IS IMPORTANT
§ Exercise
Confidentiality Integrity Availability Accountability
🍪
GDPR: regulation by EU on data privacy
When is GDPR applicable? personal data stored, used, ggl
virus/worm: install additional software → somebody else could
analytics used, newsletter is fwd
change data (integrity) ; data could be deleted (availability) ; who's
done what = all goals r in endanger
Information privacy / privacy / data protection between the
collection and dissemination of data, tech, the public expectation of
Chapter 10: Data security – countermeasure
privacy, and the legal & political issues surrounding them
Typical operational measure:
● Protection against misuse in data processing Diff countries - diff regulations
● Info self-determination -- data abt a person belong to the ● In US, diff regulation wrt data privacy -> in EU, these
person - not to the one who collected it => company has regulations are weaker
● Primacy of data economy -- data which rn't required, ● Data to be protected (i.e. data abt individuals) mustn't be
mustn't be recorded stored in the US
● Enable american companies to store "EU data" anyhow, the
Data privacy regulated by law Safe-Harbor-Privacy-Principles were agreed on
Germany ○ This agreement was cancelled in 2015 by the
● Bundesdatenschutzgesetz European Court of Justice
● Landesdatenschutzgesetz ○ EU-US-Privacy-Shield was installed, which is
EU criticised too
● Datenschutzrichtlinine (privacy policy)
US ● Obviously: w/out info & info processing, we wouldn't
● Data privacy is hardly regulated in the US. From a EU require protection of data and info
understanding, there's hardly any data protection. ● Modern computing possibilities, data protection is
Especially, if public authorities r interested in data challenged
○ Using modern IT, mass data can be analysed
The GDPR (Datenschutzgrundverordung, DSGVO) became ○ Combine single data, user pro5 can be created
enforceable on 25th of May 2018 ● Having new technical capabilities, there r new challenges,
● Companies & administration which require new regulations
○ Have to carefully handle personal info
○ Must limit their greed for personal data Challenges in data privacy
○ Must not fwd personal data to 3rd parties ● Data privacy conflicts w other goals
● People have the right ○ Data privacy & data transparency
○ To view their personal data ○ Data privacy & costs
○ To ask for erasure of data (under certain ○ Data privacy & fight against criminality
circumstances) ○ Data privacy & research
❗
…but neither companies nor public administration stick to these ● BBA (big brother awards) r negative awards, which r
regulations assigned to administration, companies, org, ppl.
🔑
privacy has to be performed ● encryption & decryption usually done w an encryption
● All efforts wrt data privacy should be documented method +
❗When wanting to move a server onto cloud: consider if cryptography: science of encryption
there're personal data stored on the server (e.g. Ilias-server)
→ if yes, GDPR in effect.
🔑 🔑
● public encryption = 1 public + 1 private (must be a 🔑
🔑
PAIR)
classical encryption method: Caesar
⇒ problem of distribution is (nearly) solved
🔑
● method: simple shift
best known method: RSA (according Rives, Shamir, Adleman)
❓
● : 2 (shift to the R)
● implementation based on RSA (prime factorisation)
● : how secure is this cipher?
○ PGP: pretty good privacy
classical encryption method: Vignere
○ GPG: GNU privacy guard
🔑
● method: a word taken as a key
❓
● : "the chosen word"
● : how secure is this cipher?
Alice public key is published (e.g.
fwd to cert agency)
🔑
Bob decrypt secret message w
method.
🔑
implemented by all involved parties. The security depends on the
🧍 🔄 🕵️ 🔄🧍
Problem: Man-in-the-middle-attack
secrecy of the
🔑
the attacker position himself between Bob and Alice and pretend to
Modern Encryption Standard: DES and AES be the other person → Bob and Alice then exchange w the
● DES (data encryption standard) attacker
○ 1976 become official standard in US ⇒ solution: use certification agency
56
○ 56 bit i.e. 2 = 7 𝑞𝑢𝑎𝑑𝑟𝑖𝑙𝑙𝑖𝑜𝑛
○ implemented efficiently
● AES (advanced encryption standard)
🔑
○ standardized in 2002
○ having length of 128, 192 and 256 bit
○ similar properties compared to DES
🔑
both methods r used
⇒ problem: distribution of (problem of AES)
🔑
● if message shall be encrypted, receiver of message has to
get before he can start the decryption
🔑
● key need to be sent in CT (clear text) → method not
whole process relies on a trustworthy institution
anymore if security depends on secrecy of
● example: E-banking
○ PIN and TAN r not sent via internet (insecure) but
how is security handled on internet ? 🛜
● https where "s" = secure
thru sealed envelope
🔑
● method: Diffie-Hellman-Key-Exchange
🔑
○ each party create a secret for single use
Symmetric Encryption ~AES
🔑 🔑
○ both receive a public
🔑 🔑 🔑
○ new key = personal private + public received
🔑
○ new + secret = final new
🔑
⇒ final new secret + identical for both (i.e. no secret
exchanged)
*annotation:
Technology Trigger = discussed among academia
Peak of Inflated Expectation = public of news + excitement
Trough of Disillusionment = realization
Slope of Enlightenment = public again but no excitement
Plateau of Productivity = take it for granted/norm
❓ 💻
Criticism: intelligence is what you can test w intelligence tests
: in which of these abilities do perform well/badly?
What is AI?
● AI based on idea of "man as a machine"