ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017

Size: px
Start display at page:

Download "ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017"

Transcription

1 ECEN Security and Privacy for Big Data Introduction Professor Yanmin Gong 08/22/2017

2 Administrivia Course Hour: T/R 3:30-4:45 CLB 101 Office Hour: T/R 2:30-3:30 pm Any question besides assignment office hour: Contact yanmin.gong@okstate.edu and include Course 5060 in the title of the

3 Assignments (20% of Grade) Weekly reading of assigned papers/articles Lateness All assignments are due at the beginning of class Late assignments are assessed a 15% per-day late penalty, with a maximum of four days Students with legitimate reasons should contact the professor before the deadline to apply for an extension

4 Course Project (30% of Grade) Every student complete one project independently End Result: Research Presentation Motivation for an Experiment Background Related Work Experimental Approach Experimental Evaluation I will provide sample topic areas

5 Exam (50% of Grade) Two exams Grading ASSIGNMENT 20% EXAM 1 25% EXAM 2 25% PROJECT PROPOSAL 10% PROJECT PRESENTATION 10% PROJECT REPORT 10% CLASS PARTICIPATION 10% A, B, C, D, below 60 F

6 Why you should take this course Data security and privacy is one of the most important grand challenges in managing today s data! Leakage of databases happen everyday Privacy may be leaked in ways that you don t realize

7 Why you should take this course Very active field and tons of interesting research. We will read papers in: Cryptography/Security Theory Machine Learning

8 Why you should take this course Introduction to research by working on a cool project Read scientific papers about exciting data applications Implement a security/privacy-preserving solution

9 Today Bird s-eye view introduction to security and privacy in big data Privacy attacks in the real-world Course overview

10 INTRODUCTION TO BIG DATA

11 Oklahoma State University Data Explosion: Internet Generate data through online activities Estimated User Data Generated per day: 8-10 GB public content, ~4TB private content

12 Data Explosion: Mobile Track all objects all the time with mobile devices ~5 billion mobile phones in use!

13 Data Explosion: IoT Measure all kinds of data in Internet of Things (IoT)

14 Data Explosion: Computing Collect all sorts of data for scientific computing

15 Big Data Characteristics: 4 V s Volume: scale of data 43 zettabytes (i.e., 1012 GB) of data will be created by 2020 Velocity: generating speed of data 1 TB of trade information during each trading session captured by the NYSE Variety: different forms of data Database, text, image, voice, video, raw sensor data, etc. Veracity: accuracy of data Poor data quality costs the U.S. economy $3.1 trillion per year

16 The Value in Big Data Big-Data impacts all aspects of our life

17 The value in Big Data (cont.) + 79% clicks +250% clicks +43% clicks

18 The value in Big Data (cont.) Significant value in big data across sectors (Mckinsey) 60% increase in operating margin for a retailer $300+ billion every year saved for US healthcare $149 billion saving in operation efficiency improvements for EU government administration 50% decrease in production development and assembly cost for manufacturing

19 DATA SECURITY AND PRIVACY

20 Traditional security mechanisms are inadequate for big data Large-scale cloud infrastructures Diversity of data sources and formats Streaming nature of data acquisition High-volume inter-cloud migration

21 Personal Big Data

22 Sometimes users can control and know who sees their information

23 But not always Users data might be used in wrong context Compromises and data breaches

24 But not always! User s data may be used in wrong context Inference of sensitive information

25 23 and me Genome sequencing But not always Given choices that you do not really understand: one egg or two eggs?

26 Big data brings big privacy concerns Key Challenge: Big data technologies collect so much data and analyze them so efficiently that it is possible to learn far more than before Massive data collection from sensors in everything to phones Advanced data analytical tools through data mining and other analytics

27 The Massachusetts Governor Privacy Breach [Sweeney IJUFKS 2002]

28 The Massachusetts Governor Privacy Breach [Sweeney IJUFKS 2002]

29 The Massachusetts Governor Privacy Breach [Sweeney IJUFKS 2002] Governor of MA uniquely identified using Zipcode, Birth Date, and Sex Name linked to diagnosis

30 AOL data publishing fiasco AOL anonymously released a list of 21 million web search queries

31 AOL data publishing fiasco AOL anonymously released a list of 21 million web search queries User IDs were replaced by random numbers

32 No > Thelma Arnold Queries for landscapers in Lilburn, Ga, several people with the last name Arnold and homes sold in shadow lake subdivision gwinnett county georgia.

33 Privacy Breach: Informal Definition A data sharing mechanism M that allows an unauthorized party to learn sensitive information about any individual, which could not have learnt without access to M User has control over his own data

34 Trade-offs between Privacy and Utility

35 Trade-offs between Privacy and Utility

36 Course Overview Course Objective Introduce you to the emerging trends and issues in security and privacy of big data systems and applications What you will learn How to identify security and privacy issues How to choose and apply appropriate approaches, tools and technology How to evaluate the security and privacy of a solution

37 Textbook No official textbook. Course Overview Recommended: Introduction to Modern Cryptography Recommended: Algorithmic Foundation of Differential Privacy Some of the course readings will come from seminal papers in the field.

38 Outline of the Course Module 1: Introduction Module 2: Privacy, Secrecy, and Cryptography Module 3: Privacy and Differential Privacy Module 4: Real World Applications

39 Course Schedule Theory and Algorithms (Lec. 1-15) Cryptography and data security Data privacy Applications (Lec ) Project Presentations (Lec )

40 Topics Covered in this Course See Syllabus.

41 A Note on Academic Integrity Academic integrity violations include Unauthorized collaboration Multiple submissions Plagiarism Consequences Violations become part of your permanent education record. Impact your GPA, scholarship/aim funding, enrollment holds, visa status for international students etc.

I am a Data Nerd and so are YOU!

I am a Data Nerd and so are YOU! I am a Data Nerd and so are YOU! Not This Type of Nerd Data Nerd Coffee Talk We saw Cloudera as the lone open source champion of Hadoop and the EMC/Greenplum/MapR initiative as a more closed and

More information

Advanced Database Management Systems

Advanced Database Management Systems Advanced Database Management Systems Introduction Alvaro A A Fernandes School of Computer Science, University of Manchester AAAF (School of CS, Manchester) COMP60361 1 / 18 Outline Introduction What do

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks

More information

Data Security and Privacy. Topic 18: k-anonymity, l-diversity, and t-closeness

Data Security and Privacy. Topic 18: k-anonymity, l-diversity, and t-closeness Data Security and Privacy Topic 18: k-anonymity, l-diversity, and t-closeness 1 Optional Readings for This Lecture t-closeness: Privacy Beyond k-anonymity and l-diversity. Ninghui Li, Tiancheng Li, and

More information

Some Big Data Challenges

Some Big Data Challenges Some Big Data Challenges 2,500,000,000,000,000,000 Bytes (2.5 x 10 18 ) of data are created every day! (2012) or 8,000,000,000,000,000,000 (8 exabytes) of new data were stored globally by enterprises in

More information

BSc (Hons) Business Statistics with Information Technology - SHE307

BSc (Hons) Business Statistics with Information Technology - SHE307 1 BSc (Hons) Business Statistics with Information Technology - SHE307 1. Objectives Increasingly, it is being realized that the world is experiencing a data explosion. Data relevant to various aspects

More information

Art 645 Introduction to Web Site Design Los Angeles City College

Art 645 Introduction to Web Site Design Los Angeles City College Art 645 Introduction to Web Site Design Los Angeles City College Course Syllabus Spring 2018 Weekly Schedule 12131 LEC TTh 12:45 pm - 1:35 pm Chem 210 12150 LAB TTh 1:45 pm - 3:00 pm Chem 210 Office Hours

More information

AAAF (School of CS, Manchester) Advanced DBMSs / 19

AAAF (School of CS, Manchester) Advanced DBMSs / 19 AAAF (School of CS, Manchester) Advanced DBMSs 2011-2012 1 / 19 AAAF (School of CS, Manchester) Advanced DBMSs 2011-2012 2 / 19 Advanced Database Management Systems Alvaro A A Fernandes School of Computer

More information

Windows 10 IoT Overview. Microsoft Corporation

Windows 10 IoT Overview. Microsoft Corporation Windows 10 IoT Overview Microsoft Corporation 25 $7.2 BILLION TRILLION Connected things will by 2020 be in use by 2020 worldwide market for IoT solutions IDC: Worldwide and Regional Internet of Things

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

CSE Computer Security (Fall 2007)

CSE Computer Security (Fall 2007) CSE 543 - Computer Security (Fall 2007) Lecture 1 - Introduction Professor: Trent Jaeger URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ Some bedtime stories This course We are going to explore why these

More information

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

MWF 9:00-9:50AM & 12:00-12:50PM (ET) Department of Mathematics and Computer Science Adelphi University Fall 2013 0145-443-001 Database Management Systems Dr. R. M. Siegfried 214 Post Hall (516)877-4482 siegfrie@adelphi.edu Office Hours Course

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex

More information

GET 433 Course Syllabus Spring 2017

GET 433 Course Syllabus Spring 2017 Instructor: Doug Taber Telephone: 315-558-2359 Email: pdtaber@syr.edu Office: Hinds Hall 239 Location: Hinds 013 Day: Tues / Thurs Time: 8 AM to 9:20 AM Office Hours: TBA Course Overview GET 433 Enterprise

More information

Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin

Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Computing in the year 201X 2 Data Illusion of

More information

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012. Department of Mathematics and Computer Science Adelphi University Fall 2018 0145-275-001 Operating Systems Practicum Dr. R. M. Siegfried 407 Science (516)877-4482 http://home.adelphi.edu/~siegfried/cs271

More information

CSC 4900 Computer Networks: Introduction

CSC 4900 Computer Networks: Introduction CSC 4900 Computer Networks: Introduction Professor Henry Carter Fall 2017 What s this all about? 2 A Modern Day Silk Road We live with nearly constant access to the most extensive system ever built by

More information

USC Viterbi School of Engineering

USC Viterbi School of Engineering Introduction to Computational Thinking and Data Science USC Viterbi School of Engineering http://www.datascience4all.org Term: Fall 2016 Time: Tues- Thur 10am- 11:50am Location: Allan Hancock Foundation

More information

CS 498 Cloud Networking

CS 498 Cloud Networking Syllabus subject to change CS 498 Cloud Networking Course Description Computer communication networks are among the most important and influential global infrastructures that humanity has created. The

More information

CSC 1052 Algorithms & Data Structures II: Introduction

CSC 1052 Algorithms & Data Structures II: Introduction CSC 1052 Algorithms & Data Structures II: Introduction Professor Henry Carter Spring 2018 Programming This course... We will investigate a series of data structures and algorithms designed to solve common

More information

Big Data Security Internal Threat Detection. The Critical Role of Machine Learning.

Big Data Security Internal Threat Detection. The Critical Role of Machine Learning. Big Data Security Internal Threat Detection The Critical Role of Machine Learning Objectives 1.Discuss internal user risk management challenges in Big Data Environment 2.Discuss why machine learning is

More information

CS 432 Fall Mike Lam, Professor. Compilers. Advanced Systems Elective

CS 432 Fall Mike Lam, Professor. Compilers. Advanced Systems Elective CS 432 Fall 2017 Mike Lam, Professor Compilers Advanced Systems Elective Discussion question What is a compiler? Automated translation A compiler is a computer program that automatically translates other

More information

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO Bob Cagnazzi THE BUGGIE WHIP MISNOMER THE BUGGIE WHIP MISNOMER 1905 2016 WORLD OF DIGITAL TRANSFORMATION The realignment of or investment in new technology, business models, and processes to drive value

More information

Course Design Document. IS410: Advanced Data Management. Version 5.1

Course Design Document. IS410: Advanced Data Management. Version 5.1 Course Design Document IS410: Advanced Data Management Version 5.1 07 December 2010 Table of Contents 1. Versions History 2. Overview of Advanced Data Management Course 2.1. Synopsis 2.2. Prerequisites

More information

Introduction to Data Management. Lecture #1 (The Course Trailer )

Introduction to Data Management. Lecture #1 (The Course Trailer ) Introduction to Data Management Lecture #1 (The Course Trailer ) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Today s Topics v Welcome to

More information

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT CATALOG DESCRIPTION ITNW 2313 Networking Hardware. CIP 1109010007 Maintain

More information

OVERVIEW OF SUBJECT REQUIREMENTS

OVERVIEW OF SUBJECT REQUIREMENTS Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students

More information

ISM 324: Information Systems Security Spring 2014

ISM 324: Information Systems Security Spring 2014 ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department Houston Community College/Northeast Department Phone Number: 713-718-6457 ab Houston Community College ITMT 2351 - Windows Server 2008 Server Administrator Course

More information

COURSE SYLLABUS BMIS 662 TELECOMMUNICATIONS AND NETWORK SECURITY

COURSE SYLLABUS BMIS 662 TELECOMMUNICATIONS AND NETWORK SECURITY BMIS 662 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

UCD School of Information and Library Studies. IS30020: Web Publishing

UCD School of Information and Library Studies. IS30020: Web Publishing UCD School of Information and Library Studies IS30020: Web Publishing Module Coordinator: Dr Judith Wusteman Office: SILS 110, Email: judith.wusteman@ucd.ie, Tel: 716 7612 Office hour Semester 1 (Sept

More information

COURSE COUNSELING (FOR YEARS 3 & 4 IN )

COURSE COUNSELING (FOR YEARS 3 & 4 IN ) COURSE COUNSELING (FOR YEARS 3 & 4 IN 2017-18) Department of Information Engineering April 19, 2017 OUTLINE IERG & MIEG Curricula Major required & IE elective courses New IE courses IE courses offered

More information

CS 432 Fall Mike Lam, Professor. Compilers. Advanced Systems Elective

CS 432 Fall Mike Lam, Professor. Compilers. Advanced Systems Elective CS 432 Fall 2018 Mike Lam, Professor Compilers Advanced Systems Elective Discussion question What is a compiler? Automated translation A compiler is a computer program that automatically translates other

More information

Center for Cloud and Autonomic Computing (CAC)

Center for Cloud and Autonomic Computing (CAC) A CISE-funded Center University of Florida, Jose Fortes, 352.392.9265, fortes@ufl.edu Rutgers University, Manish Parashar, 732.445.4388, parashar@cac.rutgers.edu University of Arizona, Salim Hariri, 520.621.4378,

More information

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct Course Outline 31 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

JOHNSON COUNTY COMMUNITY COLLEGE COURSE SYLLABUS WEB CRN Web Scripting: JavaScript I

JOHNSON COUNTY COMMUNITY COLLEGE COURSE SYLLABUS WEB CRN Web Scripting: JavaScript I JOHNSON COUNTY COMMUNITY COLLEGE COURSE SYLLABUS WEB 114-002 CRN 12234 Web Scripting: JavaScript I TERM: Spring 2017 DIVISION: Computing Sciences & Information Technology CREDITS: 2 Pre/Corequisite: WEB

More information

C Programming for Engineers Introduction

C Programming for Engineers Introduction C Programming for Engineers Introduction ICEN 360 Spring 2017 Prof. Dola Saha 1 Introductions Instructor Prof. Dola Saha, PhD University of Colorado Boulder http://www.albany.edu/faculty/dsaha/ dsaha@albany.edu

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

Introduction to Database Systems CS432. CS432/433: Introduction to Database Systems. CS432/433: Introduction to Database Systems

Introduction to Database Systems CS432. CS432/433: Introduction to Database Systems. CS432/433: Introduction to Database Systems Introduction to Database Systems CS432 Instructor: Christoph Koch koch@cs.cornell.edu CS 432 Fall 2007 1 CS432/433: Introduction to Database Systems Underlying theme: How do I build a data management system?

More information

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Internet of Things (IOT) What It Is and How It Will Impact State Pools NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference

More information

Module: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Introduction Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Some bedtime stories 2 Some bedtime stories

More information

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring

More information

SYLLABUS. Departmental Syllabus

SYLLABUS. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: COURSE NUMBER: SQL Server CIST-0226 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):

More information

745: Advanced Database Systems

745: Advanced Database Systems 745: Advanced Database Systems Yanlei Diao University of Massachusetts Amherst Outline Overview of course topics Course requirements Database Management Systems 1. Online Analytical Processing (OLAP) vs.

More information

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS Revised: 08/14/2013 COURSE (SECTION): IST359 (M003) TERM: Fall 2013 INSTRUCTOR: Deborah Nosky FINAL EXAM: Tuesday April 30th OFFICE:

More information

Course Introduction. CSC343 - Introduction to Databases Manos Papagelis

Course Introduction. CSC343 - Introduction to Databases Manos Papagelis Course Introduction CSC343 - Introduction to Databases Manos Papagelis Thanks to Ryan Johnson, John Mylopoulos, Arnold Rosenbloom and Renee Miller for material in these slides Overview 2 What is a database?

More information

Introduction to Data Management. Lecture #1 (Course Trailer )

Introduction to Data Management. Lecture #1 (Course Trailer ) Introduction to Data Management Lecture #1 (Course Trailer ) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Today s Topics v Welcome to one

More information

Oracle NoSQL Database and Cisco- Collaboration that produces results. 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Oracle NoSQL Database and Cisco- Collaboration that produces results. 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Oracle NoSQL Database and Cisco- Collaboration that produces results 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. What is Big Data? SOCIAL BLOG SMART METER VOLUME VELOCITY VARIETY

More information

IST659 Spring2015 M001 Wang Syllabus Data Administration Concepts and Database Management

IST659 Spring2015 M001 Wang Syllabus Data Administration Concepts and Database Management IST659 Spring2015 M001 Wang Syllabus Data Administration Concepts and Database Management This version overwrites all previous versions Instructor: Yang Wang Classroom: Hinds 013 Email: ywang@syr.edu Class

More information

SYLLABUS. Departmental Syllabus. Structured Query Language (SQL)

SYLLABUS. Departmental Syllabus. Structured Query Language (SQL) SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: COURSE NUMBER: Structured Query Language (SQL) CIST0151 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:

More information

TCO REPORT. NAS File Tiering. Economic advantages of enterprise file management

TCO REPORT. NAS File Tiering. Economic advantages of enterprise file management TCO REPORT NAS File Tiering Economic advantages of enterprise file management Executive Summary Every organization is under pressure to meet the exponential growth in demand for file storage capacity.

More information

IST659 Spring 2016 Huang Syllabus Data Administration Concepts and Database Management

IST659 Spring 2016 Huang Syllabus Data Administration Concepts and Database Management School of Information Studies, Syracuse University IST 659 1 IST659 Spring 2016 Huang Syllabus Data Administration Concepts and Database Management Last Updated November 17th This version overwrites all

More information

Syllabus: Web I HTML + CSS

Syllabus: Web I HTML + CSS Syllabus: Web I HTML + CSS CE 2411/N 01 Spring 2016 SSyll Continuing [Pick the Education date][type the sender company name] Course Information: Location: Terra Hall Room 1113 Dates: Mon 02-01-2016 to

More information

1. Query and manipulate data with Entity Framework.

1. Query and manipulate data with Entity Framework. COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF MULTIMEDIA SCIENCE COURSE SYLLABUS/SPECIFICATION CODE & TITLE: ITMS 434 Developing Windows Azure and Web Services (MCSD 20486) WEIGHT: 2-2-3 PREREQUISITE:

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business Women Impacting Public Policy (WIPP) is a nonprofit, membership organization working to increase the economic

More information

CAS CS 460/660 Introduction to Database Systems. Fall

CAS CS 460/660 Introduction to Database Systems. Fall CAS CS 460/660 Introduction to Database Systems Fall 2017 1.1 About the course Administrivia Instructor: George Kollios, gkollios@cs.bu.edu MCS 283, Mon 2:30-4:00 PM and Tue 1:00-2:30 PM Teaching Fellows:

More information

Based on Big Data: Hype or Hallelujah? by Elena Baralis

Based on Big Data: Hype or Hallelujah? by Elena Baralis Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of

More information

Dr. Angela Guercio Dr. Natalia Dragan. Spring 2011

Dr. Angela Guercio Dr. Natalia Dragan. Spring 2011 CS 23021 Computer Science I Programming and Problem Solving Dr. Angela Guercio Dr. Natalia Dragan Spring 2011 Instructor Angela Guercio Office: 424, Main Hall Phone: 330 244 3424 (KSU ext 53424) Best way

More information

Sul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone:

Sul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone: Spring 217 CS 331 Computer Communications Instructor: Thea Glenn M.S. Management Information Systems Office Location: ACR 19-B Office Phone: 432-837- 849 TEXT #: 931-237-3324 (No text after 11pm or before

More information

CMSC 132: Object-Oriented Programming II. Administrivia

CMSC 132: Object-Oriented Programming II. Administrivia CMSC 132: Object-Oriented Programming II Administrivia CMSC 132 Summer 2017 1 Course Description Introduction to use of computers to solve problems Design and implement abstract data types: List, Stack,

More information

IST659 Fall 2018 M004 Class Syllabus. Data Administration Concepts and Database Management

IST659 Fall 2018 M004 Class Syllabus. Data Administration Concepts and Database Management 1 IST659 Fall 2018 M004 Class Syllabus Data Administration Concepts and Instructor Hernando A Hoyos Phone 347-806-0136 Office Heroy Geology Building Rm#113 E-mail hahoyos@syr.edu Office Hours Tue: 5:00pm-7:45pm

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Smart Cities and The Internet of Things. Howard Charney, Senior Vice President Office of the Chairman and CEO November 23, 2014

Smart Cities and The Internet of Things. Howard Charney, Senior Vice President Office of the Chairman and CEO November 23, 2014 Smart Cities and The Internet of Things Howard Charney, Senior Vice President Office of the Chairman and CEO November 23, 2014 The Big Picture A Changing World Transformation Communication Retail Healthcare

More information

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 I. COURSE DESCRIPTION An introduction to the concepts and techniques encountered in database systems. Topics include data independence,

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future

More information

CSCI 528: OBJECT ORIENTED PROGRAMMING, Fall 2015

CSCI 528: OBJECT ORIENTED PROGRAMMING, Fall 2015 CSCI 528: OBJECT ORIENTED PROGRAMMING, Fall 2015 INSTRUCTOR: Dr. Ray Maleh Adjunct Professor, Department of Computer Science Office: TBD Email: Ray_Maleh@tamuc.edu Office Hours: Mondays 7:10 PM 8:10 PM,

More information

Survey of Programming Languages Dr. R. M. Siegfried 407 Science (516) (not for homework submission)

Survey of Programming Languages Dr. R. M. Siegfried 407 Science (516) (not for homework submission) Department of Mathematics and Computer Science Adelphi University Fall 2017 0145-270-002 Survey of Programming Languages Dr. R. M. Siegfried 407 Science (516)877-4482 siegfrie@adelphi.edu (not for homework

More information

SAMPLE. ITS430 Network Enterprise Solutions. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. ITS430 Network Enterprise Solutions. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3 ITS430 Network Enterprise Solutions Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019 Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019 ITD3153 LAN/WAN Routing & Switching An advanced course on the design, configuration, and maintenance of switches, routers,

More information

Big data. Professor Dan Ariely, Duke University.

Big data. Professor Dan Ariely, Duke University. Big data BIG DATA is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it... Professor Dan Ariely,

More information

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report Friday, April 25, 2014 Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report State s first big data industry status report finds

More information

Master of Engineering in Computer Engineering Orientation. August 22, Pierce Cantrell Department of Electrical and Computer Engineering

Master of Engineering in Computer Engineering Orientation. August 22, Pierce Cantrell Department of Electrical and Computer Engineering Master of Engineering in Computer Engineering Orientation August 22, 2017 Pierce Cantrell Department of Electrical and Computer Engineering Outline Requirements for Master of Engineering in Computer Engineering

More information

Internet Web Technologies ITP 104 (2 Units)

Internet Web Technologies ITP 104 (2 Units) Internet Web Technologies ITP 104 (2 Units) Spring 2011 Objective This course is intended to teach the basics involved in publishing content on the World Wide Web. This includes the language of the Web

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

Course Syllabus. Course Information

Course Syllabus. Course Information Course Syllabus Course Information Course: MIS 6V99 Special Topics Programming for Data Science Section: 5U1 Term: Summer 2017 Meets: Friday, 6:00 pm to 10:00 pm, JSOM 2.106 Note: Beginning Fall 2017,

More information

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits New York City College of Technology/CUNY Department of Computer Systems Technology CST2400 Computer System Management and Support 4 hours 3 credits Instructor: Office Phone: Office Hours: Class Meetings:

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Data Privacy in Big Data Applications. Sreagni Banerjee CS-846

Data Privacy in Big Data Applications. Sreagni Banerjee CS-846 Data Privacy in Big Data Applications Sreagni Banerjee CS-846 Outline! Motivation! Goal and Approach! Introduction to Big Data Privacy! Privacy preserving methods in Big Data Application! Progress! Next

More information

CSCI 6312 Advanced Internet Programming

CSCI 6312 Advanced Internet Programming CSCI 6312 Advanced Internet Programming Section 01, Spring 2018, W, 5:55pm - 8:25pm Instructor: Emmett Tomai Office: ENGR 3.2100 Phone: 665-7229 Email: emmett.tomai@utrgv.edu Office hours: W 1 3pm, TR

More information

Graduate Certificate in Internet Business

Graduate Certificate in Internet Business Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part of operations in

More information

that will impact New IoT Technology Trends Production Automation

that will impact New IoT Technology Trends Production Automation New IoT Technology Trends that will impact Production Automation Alexander Körner, Software Solution Architect Watson IoT Electronics Industry Lab, Munich IBM Deutschland GmbH @AlexKoeMuc 19. Juni 2018

More information

Course Syllabus. Course Information

Course Syllabus. Course Information Course Syllabus Course Information Course: MIS 6326 Data Management Term: Fall 2015 Section: 002 Meets: Monday and Wednesday 2:30 pm to 3:45 pm JSOM 11.210 Professor Contact Information Instructor: Email:

More information

Bruno Leiniö Latin America Health Day

Bruno Leiniö Latin America Health Day Bruno Leiniö Latin America Health Day Content Diagnostics Opp. Brazilian National Development Bank IOT Opp. TechEmerge Program Opp. Diagnostics 75% of the population depend on the universal public system

More information

Web Programming Fall 2011

Web Programming Fall 2011 Web Programming Fall 2011 Course number: M&IS 24065 Section: 002 CRN: 23080 Location: BSA 110 Meeting Day: TR Meeting Time: 12:30-1:45 Instructor Information: Name: Professor Janet Formichelli, MS E-mail:

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015 Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015 I. COURSE DESCRIPTION Designed for seniors who are presently maintaining a physically active lifestyle and can pass the running, cycling,

More information

Advanced Relational Database Management MISM Course S A3 Spring 2019 Carnegie Mellon University

Advanced Relational Database Management MISM Course S A3 Spring 2019 Carnegie Mellon University Advanced Relational Database Management MISM Course S19-95736 A3 Spring 2019 Carnegie Mellon University Instructor: Randy Trzeciak Office: HBH 1104C Office hours: By Appointment Phone: 412-268-7040 E-mail:

More information

Big Data - Some Words BIG DATA 8/31/2017. Introduction

Big Data - Some Words BIG DATA 8/31/2017. Introduction BIG DATA Introduction Big Data - Some Words Connectivity Social Medias Share information Interactivity People Business Data Data mining Text mining Business Intelligence 1 What is Big Data Big Data means

More information

Lecture 1: January 23

Lecture 1: January 23 CMPSCI 677 Distributed and Operating Systems Spring 2019 Lecture 1: January 23 Lecturer: Prashant Shenoy Scribe: Jonathan Westin (2019), Bin Wang (2018) 1.1 Introduction to the course The lecture started

More information

MCT620 Distributed Systems Module Handbook

MCT620 Distributed Systems Module Handbook MCT620 Distributed Systems Module Handbook Master of Science in Software Engineering & Database Technologies (MScSED) Diploma in Software Engineering Table of Contents 1 Module Details 2 1.1 Module Description

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)

More information

IS305 Managing Risk in Information Systems [Onsite and Online]

IS305 Managing Risk in Information Systems [Onsite and Online] IS305 Information Systems [Onsite and Online] Course Description: This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of

More information

SAMPLE. ITS350: Information Systems and Security. Course Description and Outcomes

SAMPLE. ITS350: Information Systems and Security. Course Description and Outcomes ITS350: Information Systems and Security Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

Introduction to Data Management. Lecture #1 (Course Trailer )

Introduction to Data Management. Lecture #1 (Course Trailer ) Introduction to Data Management Lecture #1 (Course Trailer ) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Today s Topics! Welcome to my biggest

More information

MOBILE PHONE DATA AND OFFICIAL STATISTICS

MOBILE PHONE DATA AND OFFICIAL STATISTICS MOBILE PHONE DATA AND OFFICIAL STATISTICS 4TH INTERNATIONAL CONFERENCE ON BIG DATA 8-10 NOV 2017 BOGOTA, COLOMBIA Fernando Reis EUROSTAT Julieth Solano DANE, Colombia Juan David Olarte MINTIC, Colombia

More information