IST195 Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

statement of AI risk

"Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war." Geoffery Hitten, Sam Alton, Dario Amodei, Bill Gates

Microsoft & IP Infringement

9/7/2023 - Microsoft announced its Copilot Copyright Commitment in response to user concerns about potential IP infringement when using outputs from their AI-powered Copilots If legal issues arise, Microsoft will take responsibility, defend the user, and cover any adverse judgments or settlements

data breach

A breach occurs when a person acquires computerized private information without valid authorization.

Blockchain

A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly Came about because of Bitcoin; can be used for more than crypto What is it? Got its popularity from Bitcoin Limitless possibilities Uses a distributed ledger to make & verify transactions

Benefits of Cloud Computing

Agility- deploy technology within minutes (storage, databases, infrastructure) Elasticity - Scale resources up based on demand or scale down Cost - We only pay for what we use; In use, pay more, not in use, pay less

AWS's - Amazon EC2 & S3

Amazon EC2 - Elasticcompute Cloud (IaaS or Paas) S3- Simple StorageService (SaaS)

ADPPA

American Data Privacy and Protection Act; preempt state laws

social engineering

Attacks to gain data Phishing - Fraudulent emails designed to steal data Smishing - Text Messages designed to steal data (SMS) Vishing - Phone calls designed to steal data (voice)

cryptonoography

Based on mathematics Method for transforming information to hide its content Encrypting: scrambling information so it is not readable until decrypted Decrypting: unscrambling information to restore it to its original formCryptography uses digital keys to encrypt and decrypt

Six funding options

Bootstrap Friends & Family Loan Crowdfunding Angel Investor Venture Capital

Information Value Loop

Create - use of sensors to gather information Communicate - transfer info from one place to another Aggregate - gathering of info from or more sources at one or more times Analyze - Look for patterns, relationships, discoveries, etc Act - Create change based on finding

decentralized ledger

Decentralized: A distributed ledger says there isn't one central place that has a ledger of transactions, but any computer on the chain has information about it Everyone has a record Impossible to hack; much more secure

multifactor authentication

Do not rely just on a username & password Passwords are compromised all the time Two-factor authentication is the most common

WIPO

Domain Name Disputes- WIPO World Intellectual Property Organization People make sites with "zelle" name, then the actual Zelle files a complaint, and other names get no money

IPv4 vs IPv6

Every Node on the internet needs an IP address to communicate IPV4 = Set of four bytes (or four 8 bit numbers)(IPv4) (32 total bytes) The problem was only 4 Billion IP addresses available IPV6 = set of 8 hexadecimal values (128 bytes)(note zeros are omitted)

GDPR

General Data Protection Regulation; European Union; very strict Meta fined $412mil

Enterprise Cloud Providers

Google Cloud, Amazon Web Services, Microsoft Azure

privacy laws

Gramm-Leach-Bliley Act protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) protects medical records Family Educational Rights and Privacy Act (FERPA) resists disclosure of educational records Payment Card Industry Data Security Standard (PCI-DSS) Covers credit card information Video Privacy Protection Act (VPPA) - Covers video watching (on cassettes)

Stegonography

Hiding a message inside another message, making the message not obvious Read every other line Take an image, and alter it

AI ethics and missuse

LLMs should not tell us how to build a nuclear weapon Not racist or sexist; shouldn't be biased What about liberal or conservative views Hard to see how you can prevent bad actors from using it to do bad things Cyber attacks i.e generate code Scams Disinformation

AI Definitions

Machine learning: computers who are learning on their own; computers getting smarter with more input/output; computer learning through experience and data Neural network: is a machine learning model that mimics the human brain; recognizes handwriting, images, etc.; gets smarter with input and data Natural language processing(NLP): focused on enabling computers to understand language the same way humans understand language spell-check/Grammarly Siri, Alexa Voice text messaging Large Language Models (LLM): built on large language models; massive amounts of data to look at and then be able to generate human-like responses

ransomware

Malicious software that encrypts your computer's data and ransoms the password to the user

digital threats

Nation States - Interested in Intellectual Property/Sabotage Hacktivists - Interested in Brand Damage, Ideological Views Wants to hurt brand for "greater good" Cyberterrorists - Interested in Data Destruction Want to delete data Cybercriminals - Interested in Financial Gain

Software as as Service

Other people manage; you just use software; easy to understand you manage nothing

Internet Protocol suite

Physical layer (cable provider, fiber connection, radio signal, etc.) Link layer (Hardwired through ethernet or wifi) Network layer (IP- Internet Protocol: defines the best route for information to take to get from sender to receiver) Transport layer: TCP- Transmission Control protocol- guarantees delivery of information (if you send an email, guarantees information will get from sender to receiver); does this by acknowledging every piece of information on its packet UDP does not guarantee delivery Application Layer: HTTP is the web (HyperText Transfer Protocol); rules in which a web browser talks to a web server

Six original U.S. Top-Level Domain Names

Restricted .gov .edu .mil Unrestricted .com .net .org

Five Principles of Blueprint for AI Bill of Rights

Safe and Effective Systems Algorithmic Discrimination Protections Data Privacy Notice and Explanation Human Alternatives, Consideration, and Fallback

Pittsburgh Surtac

Scalable Urban TrafficControl (Surtrac) Uses software to analyze data from cameras, signal controllers, and sensors 5% faster, with 40%less wait time at intersections and with30%-40% fewer stops

advantage of blockchain

Secure Open Source Decentralized

ARPANET

The Advanced Research Projects Agency Network; the first nationwide computer network, which became the first major component of the Internet (1969)- nodes to get traffic from one place to another Went from 4 to 582 in the 80s Government or academic computers

Cloud computing

The on-demand delivery of compute power, Database, storage, and other IT resources via the Internet with pay-as-you-go pricing

due dilligence

The overall process of evaluating a business opportunity including examination of financial records Product review / Tech Review Customer references Executive team references Legal Review Financial modeling / Audit Market analysis Competitive analysis.

Symmetric Cryptography

Use the same key to lock a message as we do to unlock a message Disadvantage: a weaker form of security; easy to share Advantage: fast

Assymetric Cryptography

Uses 2 keys; 1 to lock, and 1 to unlock The public key and private key

Four significant IoT Segments

Wearables, Smart Home, Smart City, Smart Industry

CPRA

anyone that applies, has the right to... Access & Deletion rights: consumers can obtain and delete their personal information Prevent the sale of data: consumers can prevent the sale of their information Right of Correction: let consumers correct personal information with businesses Right to see 'all' personal info, not just the last 12 months

smart contracts

computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions If, then, when Everything could be automated Use it as a way for every piece of the transaction to be added to the chain with conditions around it → if conditions are met, it automates Speed Trust Security

Infrastructure as a Service (IaaS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model more control over IT You manage applications, data, runtime, middleware, O/s SideArm example: we manage a bunch, but if there's a big game, we can scale up servers; pay for what you need!!!

Internet of Things

describes a system in which everyday objects are connected to the internet and in turn are able to communicate information throughout an interconnected system; sensor, connectivity, people and proccesess

ICANN

esponsible for managing and coordinating the Domain Name System ICANN delegates control each TLD to a DomainName Registry

third party cookies

generated by a 3rd party, typically an advertising company that is affiliated with the website you are visiting

first party cookies

generated only by websites you are visiting Normal; could be storing where you are located, preferences, history, etc., just to better customize your experience

hash functions

makes blockchain tamper-proof Tough to hack or alter Hash: every block in the chain contains a one-way hash (encryption) based on the previous block

PII

personally identifiable information - data like names, social security numbers, driver's license numbers, passwords, etc.

cookies

small text files stored on your hard disk from websites you visit. Leaves a trail of who you are, where you've been, etc.

John McCarthy

the founding father of AI The term "artificial intelligence" emerged in the 1950s to name the goal of duplicating human reasoning capabilities in code and circuitry (computers) Create systems that can perform better than humans John McCarthy hosted the Dartmouth Conference in 1956, bringing together the pioneers in the field

generative AI

typically built using foundation models. These models contain expansive artificial neural networks inspired by the billions of neurons connected in the human brain "Prompt engineering" — skillfully creating requests to programs like OpenAI'sChatGPT in a way that elicits a response closest to what the user is seeking.


Conjuntos de estudio relacionados

MMS Clinical Integration Student Questions Exam 8

View Set

Dental care: Achieving Patient-centered Care through Interprofessional Collaborative Practice

View Set

Chapter 4 KC - Clardy - MGMT 3341

View Set

English 1 honors (LIT. work) FOR THE THINK QUESTIONS And The Transitive sentences ONLYYY DO FLASHCARDS. IT WILL BE LESS OF A PAIN IN THE BUTT!:)

View Set

NUR 236 PrepU Chapter 45: Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set