M07 Case Project 14-2

docx

School

ITT Tech *

*We aren’t endorsed by this school

Course

CSIA105

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by housermatt87

Report
Matthew Houser CSIA 105 M07 Case Project 14-2 Impossible Travel detection identifies two user activities originating from geographically distant locations within a period shorter than the user could travel between locations. Research Impossible Travel. How does it work? How does Impossible Travel learn about a user's normal activities? What are the levels that the sensitivity slider allows administrators to configure to define how strict the detection logic is? What happens if a user regularly uses two more locations on a regular basis? How accurate would you determine Impossible Travel to be? How could the information gleaned by Impossible Travel pose a threat? Write a one-page analysis of your research. Impossible Travel works by identifying two user activities whether it's done in one or multiple sessions. It originates from distant locations within a time period that is shorter than the time it'd take for the user to travel themselves. This kind of detection is done by using a machine with an algorithm that ignores false positives for the traveling conditions. The detection has a learning period that can last for about seven days and it helps people learn about the new user's activity pattern. Impossible Travel detection can find unusual user activities between two different locations. The activity must be strange enough to be considered as an alert. For Impossible Travel, there is a sensitivity slider that lets people see how strict the detection logic is. The levels are high, medium, and low. Fewer activities will be suppressed if the sensitivity is high. If it is low, then the Impossible Travel alerts from the user's usual locations will be suppressed. If it is medium, then the system and the user will be suppressed. If a user regularly uses two more Locations on a regular basis, then the detectives will have to watch for the unusual patterns. I believe that Impossible Travel is really accurate. The information could pose a threat because it could mean that the user's information was stolen by someone from somewhere far away.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help