Documente Academic
Documente Profesional
Documente Cultură
Features in e-classes
1 platform
IES GS vide…
vide…
7
3. Cloud Computing
1. Advantages
iesgeneralstudies.com/information-processing-storage-security/ 1/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
1. Examples of AI Technology
2. AI Applications
Page
3. Machine Learning
4. Data Storage
5. Cyber Security
1. Threats Recent Posts
2. Protection
June
3. Government Actions 8,2019
0
June
Data is raw, unorganized facts that need to be processed. When data is processed,
7,2019
organized, structured or presented so as to make it useful, it is called information. 0
June 8,
Why data is very important? 2019
The next war will not be physical, it will be in cyberspace, and data will be key
weapons.
iesgeneralstudies.com/information-processing-storage-security/ 2/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Let us examine the processing, storage and applications of data in this article. Important dates for
ESE
2.Information Processing Mains exam 2019
The term information processing is now a days used for ‘the manipulation of Date: 30-06-19
digitized information by computers and other digital electronic equipment’. It is
mainly done through a process called computing. Preliminary exam 2020
Group of linked computers,
Improve performance over
Cluster working together closely in many
that provided by a single
Computing respects, so that, they work like a Sample Videos from
computer
single computer. the Course
[embedyt]
https://www.youtube.com/embe
listType=playlist&list=PLiKZmh4
iesgeneralstudies.com/information-processing-storage-security/ 3/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Is a computer that performs at
very high operational rates Scienti c and engineering
applications that must
Super Are really multiple computers that handle very large databases IES-GS Paper1
Computing perform parallel processing or do a great amount of strategy
computation
How to cra…
cra…
iesgeneralstudies.com/information-processing-storage-security/ 4/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Indian Supercomputers
India has 11 of the top 500 supercomputer in the worldas of date. Below are rst
three computers in the list.
iesgeneralstudies.com/information-processing-storage-security/ 5/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
We usually use online service to send email, edit documents, watch movies or TV,
listen to music, play games or store pictures and other les. It is likely that cloud
computing is making it all possible behind the scenes.
Cloud computing is a recent advancement, yet its adoption is very fast. Variety of
organisations—from tiny startups to global corporations and government agencies —
are increasing embracing this technology for all many reasons, which are discussed
below.
2.3.1 Advantages
1. Cost effectiveness
Cloud computing eliminates the capital expense of buying hardware and software
and setting up and running on-site data centers which need servers, the round-the-
clock electricity for power and cooling, the IT experts for managing the
infrastructure.
2. Speed
Most cloud computing services can provide vast amounts of computing resources in
minutes, typically with just a few mouse clicks
3. Global scale
Has ability to scale elastically, means delivering the right amount of IT resources—for
example, more or less computing power, storage, bandwidth etc—right when it is
needed and from the right geographic location.
4. Productivity
Cloud computing removes the need for many of the on-site datacenters tasks, so IT
teams can spend time on achieving more important business goals.
5. Performance
iesgeneralstudies.com/information-processing-storage-security/ 6/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
The biggest cloud computing services normally are regularly upgraded to the latest
generation of fast and e cient computing hardware. This offers several bene ts over
a single corporate datacenter.
6. Reliability
Cloud computing makes data backup, disaster recovery and business continuity
easier and less expensive, because data can be mirrored at multiple redundant sites
on the cloud provider’s network.
7. Security
iesgeneralstudies.com/information-processing-storage-security/ 7/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Image source: http://consultech.us/
Supply an on-demand
environment for
Is a method for delivering
The most basic category of developing, testing,
software applications
cloud computing services delivering and
over the Internet
managing software
applications
Is designed to
support the complete SaaS provides a
Rent IT infrastructure—
web application complete software
servers and virtual machines
lifecycle: building, solution which users
(VMs), storage, networks,
testing, deploying, purchase on a pay-as-
operating systems
managing and you-go basis
updating
iesgeneralstudies.com/information-processing-storage-security/ 9/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Big data processing
For large-scale data warehousing and for processing huge data sets. Google big
data analytics products like BigQuery, Cloud Data ow etc are examples of such
services
Services relates to arti cial intelligence (AI) and machine learning – Amazon
Machine Learning, Amazon Lex, Amazon Polly, Google Cloud Machine Learning
Engine and Google Cloud Speech API are examples of these services.
Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile
computing and wireless networks
Mobile devices are constrained by their processing power, battery life and
storage. Cloud computing provides to data processing and data storage happen
outside of mobile devices
3. New Devlopments
Arti cial intelligence (AI), machine learning (ML) and Bigdata are the latest buzz
words.While arti cial intelligence (AI) and machine learning (ML) concepts have been
around since the 1940s and 1950s , the availability of huge amounts of data is
iesgeneralstudies.com/information-processing-storage-security/ 10/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
making the difference now. The cloud is bringing computing power to it and ML is
creating actionable intelligence.
3.1.1 Characteristics
Big data is often characterized by 3Vs:
iesgeneralstudies.com/information-processing-storage-security/ 11/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Image source: http://whatis.techtarget.com/
Business
Policy making
Geospatial analysis for response- from data sources like incident reports, Twitter
feeds, data on police movements and mobile data. Can decide on how and when
to respond to an incident.
iesgeneralstudies.com/information-processing-storage-security/ 12/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Urban planning
AI processes include
learning – the acquisition of information and rules for using the information
reasoning – using the rules to reach approximate or de nite conclusions and
self-correction
AI can perform tasks such as identifying patterns in the data more e ciently than
humans.
iesgeneralstudies.com/information-processing-storage-security/ 13/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Weak AI(narrow AI) is an AI system that is designed and trained for a particular
task. Example – virtual personal assistants, such as Apple’s Siri
Strong AI(arti cial general intelligence) is an AI system with generalized human
cognitive abilities so that when presented with an unfamiliar task, it has enough
intelligence to nd a solution
3.2.2 AI applications
AI in healthcare
AI in business
Robotic process automation can be applied to highly repetitive tasks
iesgeneralstudies.com/information-processing-storage-security/ 14/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
AI in education
AI in nance
AI in law
AI in research
It feeds huge amount of data into the algorithm and allows it to process and learn
It uses iterative approach called deep learning to review data and arrive at
conclusions
Thus ML creates actionable intelligence on the ‘big data’ available
Deep Learning
iesgeneralstudies.com/information-processing-storage-security/ 15/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
1. Supervised learning – Data sets are labeled so that patterns can be detected and
used to label new data sets
2. Unsupervised learning- Data sets aren’t labeled and are sorted according to
similarities or differences
3. Reinforcement learning- Data sets aren’t labeled but, after performing an action or
several actions, the AI system is given feedback
Banks
loan processing
customer service
Business Process Management
to automate the processes
Health care
diagnosis services
Ecommerce
product search
product recommendations
forecasting demand and trends
4. Data Storage
Data storage is the place where data is held in different forms and accessible by a
computer system. The classi cation of various data storage are as follows.
iesgeneralstudies.com/information-processing-storage-security/ 16/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
HDDs are the most commonly used storage in personal computers, servers and
enterprise storage systems, but are rapidly giving way to faster solid-state drives
Solid-state Drives(SDDs)
iesgeneralstudies.com/information-processing-storage-security/ 17/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Is volatile.
Is relatively
insensitive
to the
number of
times data is
written to
them.
Disk drives
and adapter
cards can be
RAM- or
ash-based
Optical Storage
systems
Blu-ray disc
Is designed to display high de nition video and store large amounts of data.
Blu-ray is the successor to DVD.
Use shorter wavelength laser as opposed the larger red laser in DVDs
Blu-ray uses phase change technology to enable repeated writing to the disc.
Blu-ray also features data streams at 36 megabits per second (Mbps), fast
enough for high quality video recording
Holographic storage
Note:A hologram is a truly three-dimensional and free-standing image that does not
simulate spatial depth nor require a special viewing device.
iesgeneralstudies.com/information-processing-storage-security/ 18/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
5. Cyber Security
The security risks in cyber space are quickly and constantly evolving. Cybersecurity is
more than just a technical problem, but incorporating aspects of economics and
human psychology.
5.1 Threats
The cyber threats can be in different forms as follows
Malwares
Ransomware
The program that demands payment after launching a cyber attack on a
computer system.
This type of malware has become increasingly popular among criminals and
costs organisations millions each year. Recent example is “Wannacry”
Viruses
iesgeneralstudies.com/information-processing-storage-security/ 19/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Is a small piece of code that can replicate itself and spread from one
computer to another
It attaches itself to a computer le
Worms
Are self-replicating
Do not require a program to attach themselves to.
Worms continually look for vulnerabilities and report back to the worm author
when weaknesses are discovered
Spyware
Is a software that enables a user to obtain covert information about another’s
computer activities by transmitting data covertly from their hard drive
Trojans
Is a program that appears to perform one function (for example, virus
removal) but actually performs malicious activity when executed
Botnets
Is a collection of software robots, or ‘bots’, that creates an army of infected
computers (known as ‘zombies’)
They are remotely controlled by the originator
They can send spam emails with viruses attached
Spread all types of malware.
Can use the infected computer as part of a denial of service attack against
other system
The malicious user tells all the zombie computers to contact a speci c website or
server over and over again. And increase in the volume of tra c created,
overloads the website or server, sometimes to the point that the website or server
shuts down completely.
The attacks are “distributed” because the attacker is using multiple computers, to
launch the denial-of-service attacks.
Hacking
iesgeneralstudies.com/information-processing-storage-security/ 20/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Is mainly used for Identity theft – the fraudulent practice of using another person’s
name and personal information in order to obtain credit, loans, etc
5.2 Protection
Some basic techniques used for Application security are:
Digital signature
iesgeneralstudies.com/information-processing-storage-security/ 21/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Firewalls
Anti-virus software
Uses the Internet as a connection medium, but provide the functionality and
security of private WAN connections.
iesgeneralstudies.com/information-processing-storage-security/ 22/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
VPN saves the cost of long-distance phone service and hardware costs
associated with using dial-up or leased line connections.
A VPN solution includes advanced security technologies such as data encryption,
authentication, authorization, and Network Access Quarantine Control.
National Cyber Security Policy, 2013 by Department of Electronics and Information
Technology aims at protecting the public and private infrastructure from cyber
attacks.
A National and sectoral 24X7 mechanism has been envisaged to deal with cyber
threats through National Critical Information Infrastructure Protection Centre
(NCIIPC)
Computer Emergency Response Team (CERT-In) has been designated to act as a
nodal agency for coordination of crisis management efforts
Policy calls for effective public and private partnership and collaborative
engagements
Aims promotion of research and development in cyber security
Creating a workforce of 500,000 professionals trained in cyber security in the next
5 years is also envisaged in the policy through skill development and training
Provisions of scal schemes and incentives have been incorporated in the policy
to encourage entities to install trustworthy ICT products and continuously
upgrade information infrastructure with respect to cyber security.
iesgeneralstudies.com/information-processing-storage-security/ 23/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Aadhaar Act
Currently, Indian agencies are at the mercy of foreign agencies to get data of its own
citizens, since almost all servers and data storage locations are situated outside
India. We need a data residency regulation for regulating the data based on our
country.
iesgeneralstudies.com/information-processing-storage-security/ 24/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
6. Associated terms
6.1 Digital divide
Denotes the gulf between those who have ready access to computers and the
Internet, and those who do not. There also are persistent digital divides across
gender, geography, age, and income dimensions within each country.
iesgeneralstudies.com/information-processing-storage-security/ 25/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
Virtual reality creates a totally arti cial environment, but augmented reality uses the
existing environment and overlays new information on top of it.
IES GS
Related posts
1 Comment
Leave a Reply
Your email address will not be published. Required elds are marked *
Comment
Post Comment
iesgeneralstudies.com/information-processing-storage-security/ 26/27
6/10/2019 Information – Processing, Storage, Security – General Studies Material for UPSC ESE Paper1 by
This site uses Akismet to reduce spam. Learn how your comment data is processed.
iesgeneralstudies.com/information-processing-storage-security/ 27/27