Vous êtes sur la page 1sur 3

Google

News/Book Assignment
Cale Petrie
CIED 1003 Section 902


Article Title: A Big Upgrade to the F-22 & F35 Stealth Fighters Is in
the Works (As in Artificial Intelligence)

Published Date: January 20, 2017

Publication Name of Journal: The National Interest

Summary: According to Air Force Chief Scientist Gregory Zacharias, the
quick progression of technology in the Air Force Research Lab will soon
have more manned-unmanned teams with higher degrees of autonomy.
The Autonomic Logistics Information System used in F-35s has begun
the work where computers can organize information, do checklists,
make assessments, and make some decisions without the need for
human input. The ALIS system also transmits maintenance and health
information about the F-35 to a group of global technicians worldwide.
Even with all the things a computer can do, human cognition is still
more capable than a computer. With an aircrafts Electro-Optical
Targeting System, the pilot of the F-35 from a nearby aircraft could
control a small group of drones. Assessing enemy air defenses is
something that a drone could be programmed to do to reduce the risk to
pilots when the drone is flown ahead of the manned aircraft into a high-
risk area. Advancements made to algorithms could progress to a point
where certain drones may not need a flight path directed from someone
on the ground, but rather may be able to follow a fighter aircraft by
itself. With autonomous technology increasing at a rapid speed, an
unmanned fighter jet may be in the works in the not too distant future.









Title of Book: Fundamentals of Information Systems Security

Published Date: 2012

Publisher of Book: Jones & Bartlett Learning, LLC

Summary of Chapter 1: Information Systems Security

Every time a computer is connected to the Internet, risks are involved.
Some of these risks include: personal information being stolen,
cybercriminals, scam artists, and terrorists. With cyberspace being a
place to socialize, share ideas, and meet, the role of information system
security is at the forefront. Protecting information systems and the data
stored in it is the job of information systems security. There are various
laws that require organizations to protect personal and private data as
well as their intellectual data. One such example is the FISMA (Federal
Information Security Management Act). It was passed in 2002 and
requires federal civilian agencies to have security controls over things
that support federal operations. Another such act is the CIPS (Childrens
Internet Protection Act). It was passed in 2000 and requires public
libraries and schools to use an Internet safety policy, which must
address security concerns on things such as email, chat rooms, and
electronic communications. In order for information to be noted as
secure it must satisfy three properties of information. These are
availability, integrity, and confidentiality. Integrity refers to allowing
only authorized users the ability to change information. Availability
means the information is accessible by authorized users when they
request information. Only allowing authorized users the ability to view
information is referred to as confidentiality.

In order to understand how to make computers more secure, one must
know how to identify the risks, threats, and vulnerabilities involved. All
of these areas are vital to the typical IT infrastructure. A typical IT
infrastructure usually has seven domains and within the seven domains
there are risks, threats, and vulnerabilities. The seven domains are:
user domain, workstation domain, LAN domain, LAN-to WAN domain,
WAN domain, remote access domain, and system/application domain.
The people who access an organizations information system is known
as the user domain. The workstation domain refers to the area where
most users connect to the IT infrastructure, be it desktop computer,
laptop, or any other device that connects to the network. LAN, or local
area network, is a group of computers connected to one another to a
common connection medium including wires, fiber optics, cables, or
radio waves. LAN-to-WAN domain is where the IT infrastructure links
to the Internet and wide area network. The Wide Area Network (WAN)
domain connects remote locations. Remote Access Domain is critical for
employees who work in the home or in the field. This domain is the
connection of remote users to the IT infrastructure of the organization.
The last domain making up the IT infrastructure is the
system/application domain. This is the area that holds mission critical
systems, data, and applications. Authorized users here may require
secure access via second level security checks.

Vous aimerez peut-être aussi