Answer To: Seven video seminars Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity...
Swati answered on Jun 17 2021
EIGHT VIDEO SEMINARS
Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity
Introduction
Three core topics picked in this discussion includes Machine Language agents, Artificial Intelligence Planner and the Barracuda. A webinar on YouTube was presented by Marek Marchelwicz was used to present these issues. For overall determination of AI behaviour by the use of cleaning robots was done with the help of AI planner. Further the ML agents that are an open source project underwent implementation by Unity. Moving ahead, the presenter tried to depict the procedure by the Barracuda for making models in ML unity. For doing this a package known as Barracuda was used. These Machine Language and Artificial Intelligence tools could help towards making several pictures and images as per the requirements. There is diversity in all these topics and they do hold much significance in ML and AI processes. Webinar session was for 1 hour 20 minutes where all these concepts were elaborated in detail by the presenter.
SFIA Skills Related to engagement activity
Various SFIA skills are associated with the Artificial Intelligence activity in this webinar based on framework related factors such as use of sports analytics, virtual chatbot, sports activities and autonomous flying along with surveillances and security. Furthermore, the Artificial Intelligence skills may be used in retail, agriculture, farming, fashion and shopping technology, manufacturing and production, medical imaging evaluation, healthcare, automated vehicles as well as self driven cars and in logistics, warehouse and the supply chain management.
Tools and Methods- Level 7- In Webinar, it was observed that narrow Artificial Intelligence was used for performance of the narrow tasks such as human speech recognition followed by conversion of same into Machine Level Language with the help of personalized and natural ways. Examples of such AI technology include Alexa, Google Assistant and Cortana. As per observation, in the webinar the illustrations by the general Artificial intelligence is done towards the universal cognitive abilities of humans such as carrying out the intensive calculations as well as processing data at an incredible speed. A computer program named AlphaGo is used for playing board game Go. It was observed that AI super intelligence is feature surpassing human intelligence which is a futuristic thing. The use of same will be done for creation of emotional relationship, making decision as well as for making diagrams and arts.
Project Management: Level 7 – As discussed regarding the Artificial Intelligence management team, it was found that all the AI activities will be implemented on large scale thus this is classified as being related to level 7 of SFIA skills.
Moving ahead, the Machine Language (ML) activity are associated with several SFIA skills framework factors that are used in forecasting, online tutorials, web related services as well as Automated machine learning.
Methods and Tools: Level 6- As per observation the tools and methods used in ML are used for identification of auto tagging and trend analysis. Also, it was found to be used in a classification at multiple levels that makes them connected to each other and is used for the activities such as prioritization and ranking.
Project management: Level 7: Furthermore, it was found that prediction as well as recommendation are two varying Machine language levels used in the field of farmers assistance and prediction during agriculture via satellite images. So, after observation of these projects as implemented by the ML teams, decision was made by me that small sized projects are handled by them which are restricted to a certain specific region so they must be classified as being Level 7 of SFIA skills.
Several factors of SFIA skills framework are associated with the Barracuda activity that are used in the networking, security, storage of network based application and cloud services field.
Method and Tools: Level 5 – Launching of virus firewall as well as spam was done by Barracuda that was used by Internet service providers as well as large enterprises.
Project Management: Level 5: After grabbing the opportunity to discuss it with the project management team of Barracuda, it was observed that the size of their projects was medium and thus it could be classified as associated with Level 5 of SFIA skills.
Connection to Webinar - Artificial Intelligence and Machine Learning in Unity CBoK Knowledge
Varying aspects of CBoK are covered under this activity where after discussion with project leads responsible for project management associated with Barracuda, ML and AI, it was found that years of experience are held by these managers specifically in the automation industry.
It was also observed that employees working on these three technologies (AI, ML and Barracuda) are evaluated on the basis of efficiency and skills as they acquired over a span of time in security management, automation, trend analysis as well as classification like that of AI in making the playing game board called ‘Go’. Thus, it can be said that most of these employees has level 7 of AQF training.
Reflection
These 3 models known as AI, ML and Barracuda thus acts as a package helping in creation of 3D robots as well as games. By this, the developers can implement and alter the Artificial Intelligence and Machine Language agents as required. Further, Barracuda is a tool helping the Machine Learning to work efficiently and effectively without any errors in general. Thus, it would help in creation of agents assisting the generation and execution of plans. So, it can be said that presenter Marek Marchelwicz was able to present the basic process of these 3 tools in efficient ways with the help of this webinar. Hence, this helped us to understand and know all about the Machine learning and Artificial intelligence along with Barracuda.
Evidence of Attendance
Topic 2
Webinar: Cyber Security - Is a secure future possible?
Introduction
“Cyber Security- Is a secure future possible?” is a webinar presented by John Williams and attended by 200 participants from varying locations globally and in Australia. One of the most synchronised way was used to conduct this seminar wherein due respect was delivered to all the owner of land as well as custodians from the location of the webinar. This included the aboriginal and Torres islanders and the elders of the community and the country. Core purpose of this webinar was discussion regarding the cyber security importance along with future development plans of same. Side desert security ventures conducted a research and found that the global cyber crime costs are expected to grow to more than 15 percent over the next 5 years making the costs from $ 3 trillion in year 2015 to $10.5 trillion by year 2025. Furthermore, it is expected that by the year 2026, there would be more than 18000 cyber security professionals along with huge number of cyber security courses such as criminology cryptography, cyber defence and cyber criminology that would be delivered in Australian universities. In the webinar, many of the participants delivered and presented their own viewpoint regarding the cyber security future as well which was analysed and discussed in detail then.
SFIA Skills Related to engagement activity
Several aspects of SFIA skills framework associated with this activity are there that is specific to private organizations as well government agencies facing issues associated with the cyber threats and the hacking.
Methods and Tools: Level 9: As per observation, the tools along with methodologies that are required include acquiring skills with the help of master degree. That means the graduates learning several cyber security management and threats must have cognitive, foundational, good communication as well as technical skills. Also, they must undertake the routine activities followed by the identification and reporting on simple problems and issues so as to become experts. Moving ahead, the discussion regarding several cyber security tools was done that are used to protect the organizational system specifically from the cyber threats. Tools studies or discussed included public key infrastructure, firewalls, antivirus software, cyber security service by MDR (Managed detection and Response), penetration testing as well as highly sophisticated training to the organizational employees.
Project Management: Level 9: By having the opportunity to discuss this problem with the project management team during webinar, we were able to find that this cyber security threat is a vital issue and is a matter of concern more specifically for the government organizations consisting of huge people database. Thus, securing as well as managing these becomes more vital which requires huge efficiency and skills. Project management team mostly handled the government issues or the large private sector related issues that we could classify this under the level 9 of SFIA skills.
Penetration Testers: Level 8 – It was observed that employees are ethical hackers generally being responsible for network testing, system, applications testing along with checking for vulnerabilities that may restrict the malicious attacks.
Connection to Webinar: Cyber Security - Is a secure future possible? CBoK Knowledge
Various aspects of CBoK knowledge are covered in the cyber security activities. While having discussion with the project leads from the project team who held main responsibility for management of cyber security project aspects, it was found that most of these projects belongs to large private organizations or government organizations wherein there are threats associated with hacking of information, ransom-ware or malware related issues. Thus, the project managers acted as chief information security officer and chief security officer being responsible for implementing the security in physical manner in the organization along with monitoring the IT security of all organizational departments.
It was also discovered through webinar that works of employees are in specific area ranges such as security architects, penetration testers, security analysts and security engineers who are majorly responsible for identifying, control, plan, and analysis as well as for carrying out the quality control of organizational system wherein most of these employees had cleared the AQF level 8 and level 9 training already.
Reflection
This discussion in webinar was a great topic wherein the protection of public health system as well as data from hackers during the Covid-19 pandemic situation was discussed. Core focus of presentation was on hackers but the spotlight was grabbed by the vulnerabilities as well that are initial root cause of problem. Also, there is need for project teams to review the software installed for hacking protection along with reviewing its accountability in case hacking takes place. Major aim of cyber security by project team would be protection against any kind of illegal, unauthorized exploitation in organizational system and associated networks by the hackers. This is because in case cyber hackers can penetrate the systems of organization, they may have devastating impacts which may further result in unauthorized access as well as damage of customer records and data of financial nature such as passwords, bank information, balance and so on. Thus, it is vital to undergo development of Cyber security tools along with advanced technologies that may help in detection and protection of cyber threats.
Evidence of Attendance
Topic-3
Webinar: ICSL MRE 2021 Cyber security Webinar
Introduction
This is a webinar presented by Simarjeet Kaur and attended by participants from varying locations wherein the ICSL model was detailed out first of all stating the stakeholders, FedUni and other researchers, strategy adopted by them and research along with application of research solutions on stakeholders. ICSL tends to conduct research applying advanced analytical techniques to internet security and cybercrime. Various conferences are used to attain the value propositions such as Malware and Reverse engineering wherein the research model works on triangle analysis gap that is from yara which undergoes clustering and on identification of variant new variants are added which results back in automatic yara rule generation. This would help in identification of Malware capabilities automatically and with more experience they could know where to look, shortcuts and the common things as well as it will save cost and time along with avoiding deeper analysis. So, this webinar would basically intend to introduce CAPA for cyber security wherein CAPA do use rules written by experts for capabilities recognition and analyzes the program along with identification of things done by program. Another program that is compared is Wannacry encryptor wherein again CAPA proves to be more...