IST 195 EXAM2
Statement on AI risk
"Mitigating the risk ofextinction from AIshould be a globalpriority alongside othersocietal-scale risks suchas pandemics andnuclear war."
Benefits of Cloud Computing
- reduced it cost - business agility - flexible scaling - high availability
unrestricted pre ICANN domain names
.com, .net, .org anyone can register
Original U.S. Top Level Domain name
.com, .org, .net, .gov, .edu, .int
restricted pre ICANN domain names
.gov, .edu, .int only institutions can register
How much does the Pittsburgh Surtrac cost per intersection
100,000
cybercrime
3rd largest economy in the world after the US and China
Large Language Models (LLM) -
A large language model is anartificial intelligence system (a neural network) trained on massiveamounts of text data to generate human-like text.
WIPO (World Intellectual Property Organization)
A specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.
Generative AI
AI trained on these models can performseveral functions: classify, edit, summarize,answer questions, and draft new content,among other tasks.
what did Apple introduce in 2021 for third party cookies
ATT (App Tracking Transparency) pop up windows on iPhones asking for permission to be tracked
CPRA Components
Access & Deletion rights: consumers can obtain anddelete their personal information .• Prevent the sale of data: consumers can prevent thesale of their information. • Right of Correction: let consumers correct personalinformation with businesses .• Right to see 'all' personal info, not just the last 12months.
smart industry in healthcare
By 2025 Healthcare willcomprise 1/3 of the marketfor distributed devices(McKinsey Global Institute) • Smart Beds • Monitors • Gluclose • Ultrasounds • Thermometers • Medication Dispensers
Internet Protocol Physical
Co-ax, Fiber, Radio
With IaaS, responsibility mainly falls on the....
Consumer (down to shared Network security). application, runtime, data, middleware, O/S
Information Value Loop
Create - use of sensors to gather information Communicate - transfer info from one place to another Aggregate - gathering of info from or more sources at one or more times Analyze - Look for patterns, relationships, discoveries, etc Act - Create change based on findings
How can AI be scary
Cyberattacks explode. The right prompts can now generateworking malicious code, meaning more, bigger, and increasinglydiverse cyberattacks .• Scams proliferate. The new AI-assisted phishing and fraudschemes will take the form of real-sounding pleas for help in thefaked voices of your friends and relatives, harvested from theirsocial media, making it impossible for the public to separate factand fiction .• Disinformation. Propaganda and partisan assault will beoptimized by algorithms and given mass distribution by techgiants.
Multifactor Authentication
Do not rely just on a username &password Passwords are compromised all the time Two factor identification is the most popular
smart industry impacts
Education Agriculture Infrastructure and transportation Health Retail and Logistics
Cryptography consists of
Encrypting: scrambling information so it is not readable until decrypted Decrypting: unscrambling information to restore it to its original form
Internet Protocol Link
Ethernet and Wi-fi
Natural Language Processing (NLP)
Focused on enablingcomputers to understand, interpret, and generate human language—key for translation, text analysis, speech recognition, and more
CPRA (California Privacy Rights Act)
For-profit businesses that collect personal information from Californiaresidents, • Have a gross annual revenue of over $25 million; OR• Buy, sell, or share the personal information of 100,000 or moreCalifornia residents or households; OR • Derive 50% or more of their annual revenue from selling or sharing Cali residents personal info
who left google to speak about the dangers of AI freely
Geoffrey Hinton
Enterprise Cloud Storage Solutions
Google Cloud Amazon Web Services Microsoft Azure
Internet Protocol application
HTTP, Telnet, DNS
Steganography
Hides a message inside something else, thereby making the message non-obvious Text
Steganography example
Histiaeus devised a clever newway to send hidden messages.• He shaved the head of one of his servants and then when the hair grew back after he left then the message was read
Internet Protocol Network
IP
IPv4 vs IPv6
IPv4: 32-bit number: 4 billion addresses; four sets of numbers marked off by periods IPv6: 128-bit addresses, able to handle up to 1 quadrillion addresses; almost unlimited # of addresses
PII (Personally Identifiable Information)
Information about an individual that can be used to uniquely identify them (directly or indirectly).
Ethics of AI
LLMs shouldn't tell us how to build achemical weapon .• We agree that generative AI shouldn'tbe racist or sexist .• Should generative AI models take aposition on climate change, guncontrol, abortion, or vaccines? • What about when Generative AI isbuilt on mis/disinformation
Why would people move to cloud computing
Lower cost of operations • Better compete and addressmarket demands • Lower downtime; highperforming applications • Always up-to-date • More efficient IT staff -shifting focus • Security & ComplianceText
Smart Industry Impacts Agriculture
Maximize Efficiency • Sensors in Fields • Monitor temperatures,acidity • Combine with Weather forecasts for predictive analysis • Remote monitor of livestock(i.e., drones, smartphones) • Self Driving tractors
Digital Threats
Nation States - Interested in Intellectual Property/Sabotage• Hacktivists - Interested in Brand Damage, Ideological Views• Cyberterrorists - Interested in Data Destruction• Cybercriminals - Interested in Financial Gain
GDPR (General Data Protection Regulation)
New European Union law on data protection and privacy for individuals.
Smishing
Phishing attacks committed using text messages (SMS).
Amazon EC2
Service that provides secure and resizable virtual servers on AWS
SaaS (Software as a Service)
Services for delivering and providing access to software remotely as a web-based service
EverydayAI Examples
Siri - Smartphone Assistants • Facial Recognition(Apple Photos) • Autocorrect • Google Translate • Self-driving cars • Social Media Feeds • Smart Appliances (Roomba) • Fraud Detection
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
Internet Protocol transport
TCP, UDP
IPv4
The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0".
IPv6
The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".
Machine Learning
The study of computer algorithms thatimprove automatically through experience and data. They learn fromdata rather than being explicitly programmed
What is a data breach?
Unauthorized person views, alters, or steals secured data
ADPPA (American Data Privacy and Protection Act)
United States proposed federal online privacy bill that would regulate how organizations keep and use consumer data. - has not been sent to Congress
building blocks for IaaS
Virtualization - simulating a hardwareplatform, operating system, storage, &network resources • Transforms Hardware into software • Ability to run multiple operatingsystems as VMs • Virtual Machines• VMWare and XenSoource
What. are the Four IoT segments
Wearables, asamrt Home, Smart City, Smart Industry
what can you do to avoid phishing
When in doubt, DON'T CLICK• Ask yourself these questions• Am I expecting the email attachment, links, text, phonically
Domain Name Disputes
Your domain name has been registered and is being used in bad faith. The domain name was registered for the purpose of selling the domain name to the complainant who is the owner of the trademark or service mark or to a competitor for valuable consideration The domain name was registered in order to prevent the owner of the trademark or service mark from using the mark. The domain name was registered primarily for the purpose of disrupting the business of a competitor; The registrant intentionally registered for financial gain, Internet users to the website, by creating a likelihood of confusion
Vishing
a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
Ceasar Cipher
a technique for encryption that shifts the alphabet by some number of characters
The Information Value Loop
act, create, communicate, aggregate, analyze
major companies in cloud computing
amazon, google, microsoft, IBM, salesforce
Cryptography
based on math and is a method for transforming. information to hide its content
examples of connectivity in IoT
bluetooth, NFC
John McCarthy
coined the term Artificial Intelligence at the Dartmouth Conference
Wearables
continuously monitor and track user preferences and habits
third-party cookies
cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page
PCI DSS (Payment Card Industry Data Security Standard)
covers credit card information
VPPA (Video Privacy Protection Act)
covers video watching
how do IP addresses work
first two # sets are the network address third # set is subnet ex) Falk College last # set is the computer/device being used
examples of wearables
fitness and health trackers heart rate monitors wireless headphones
phishing
fraudulent emails designed to steal data
first party cookies
generated only by websites you are visiting
Ceasar Cipher number key
if number is 632 and the word is APPLE, move A six spaces over, P three spaces over, P two spaces over and repeat
Copilot Copyright Commitment
in response to user concerns about potential IPinfringement when using outputs from theirAI-powered Copilots.• If legal issues arise, Microsoft will takeresponsibility, defend the user, and coverany adverse judgments or settlements
Smart City
integrate all levels of municipal services are becoming safer more convenient places to live
Neural Network
is a machine learning model that uses artificialintelligence to teach computers to process data in a way that mimicsthe human brain. They can recognize handwriting, images, etc
Smart Home
learn a users habits to develop an automated home support for everyday tasks. Include energy efficiency, safety, entertainment, access control
Sensors (IoT)
make measurements like temperature, light levels, humidity, pressure, proximity, motion, gas/chemicals/smoke, heart/breathing rates and so on; implemented as thermocouples/thermistors, infrared detectors, inductive, photoelectric, and capacitive cells, accelerometers, gyroscopes, and more
IaaS (Infrastructure as a Service)
more control over IT resources
SAAS - You Manage
nothing the other manages it
Cloud Computing
on demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay as you go pricing
what is the problem with IPV4
only 4 billion available
Smart City applications include
open data for better urban planning, optimized energy consumption and increased public safety
Ceasar Cipher alphabet key
out the word in front of the alphabet and skip when the letters usually are in the alphabet to encrypt
What improvement was seen through the Surtrac
people to their destination 25% faster, with 40% less wait time at intersections and with 30%-40% fewer stops, which contributed overall to a 20% reduction in emission
HIPPA
protects medical records
Gramm-Leach-Bliley Act
protects personal financial information
FERPA
resists disclosure of educational records
ICANN (Internet Corporation for Assigned Names and Numbers)
responsible for managing and coordinating domain name system. delegates control over each TLD to a domain name registry
ARPANET (Advanced Research Projects Agency Network)
s the first public packet-switched computer network. It was used for academic and research purposes
People and Processes IoT
seeing your package through amazon alert ring camera
Internet of Things consist of
sensors, connectivity, and people and processes
cookies
small text files stored on hard discs from websites you visit
examples of a Smart City
smart energy grids, smart streetlights, smart public transportation
Example of Sensors in IoT
smart thermostat
most attacks happen through
social engineering (phishing, smashing, vishing)
Pittsburgh Surtrac
software to analyze data fromcameras, signal controllers and sensors
Internet of Things (IoT)
the network of products embedded with connectivity-enabled electronics
Symmetric Encryption
the same key is used to encode and decode
Internet Protocol Suite
the way the web/internet works and defines the best route that info should take to get from internet to receiver
examples of a smart home
thermostats, coffee makers, lights, smart tvs
asymmetric encryption
two keys are used; one key encodes the message, and the other key decodes the message
smart industry
use real time data analytics and M2M sensors to optimize operations, logistics and supply chain and helps them force challenges
Amazon S3
web service offered by Amazon, provides storage through web services interfaces (SaaS)
Caesar cipher key
when the number is +5 then you move the first letter five letters after on the alphabet
Connectivity (IoT)
wirelessly or physically connecting