IST195 Midterm
statement of AI risk
"Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war." Geoffery Hitten, Sam Alton, Dario Amodei, Bill Gates
Microsoft & IP Infringement
9/7/2023 - Microsoft announced its Copilot Copyright Commitment in response to user concerns about potential IP infringement when using outputs from their AI-powered Copilots If legal issues arise, Microsoft will take responsibility, defend the user, and cover any adverse judgments or settlements
data breach
A breach occurs when a person acquires computerized private information without valid authorization.
Blockchain
A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly Came about because of Bitcoin; can be used for more than crypto What is it? Got its popularity from Bitcoin Limitless possibilities Uses a distributed ledger to make & verify transactions
Benefits of Cloud Computing
Agility- deploy technology within minutes (storage, databases, infrastructure) Elasticity - Scale resources up based on demand or scale down Cost - We only pay for what we use; In use, pay more, not in use, pay less
AWS's - Amazon EC2 & S3
Amazon EC2 - Elasticcompute Cloud (IaaS or Paas) S3- Simple StorageService (SaaS)
ADPPA
American Data Privacy and Protection Act; preempt state laws
social engineering
Attacks to gain data Phishing - Fraudulent emails designed to steal data Smishing - Text Messages designed to steal data (SMS) Vishing - Phone calls designed to steal data (voice)
cryptonoography
Based on mathematics Method for transforming information to hide its content Encrypting: scrambling information so it is not readable until decrypted Decrypting: unscrambling information to restore it to its original formCryptography uses digital keys to encrypt and decrypt
Six funding options
Bootstrap Friends & Family Loan Crowdfunding Angel Investor Venture Capital
Information Value Loop
Create - use of sensors to gather information Communicate - transfer info from one place to another Aggregate - gathering of info from or more sources at one or more times Analyze - Look for patterns, relationships, discoveries, etc Act - Create change based on finding
decentralized ledger
Decentralized: A distributed ledger says there isn't one central place that has a ledger of transactions, but any computer on the chain has information about it Everyone has a record Impossible to hack; much more secure
multifactor authentication
Do not rely just on a username & password Passwords are compromised all the time Two-factor authentication is the most common
WIPO
Domain Name Disputes- WIPO World Intellectual Property Organization People make sites with "zelle" name, then the actual Zelle files a complaint, and other names get no money
IPv4 vs IPv6
Every Node on the internet needs an IP address to communicate IPV4 = Set of four bytes (or four 8 bit numbers)(IPv4) (32 total bytes) The problem was only 4 Billion IP addresses available IPV6 = set of 8 hexadecimal values (128 bytes)(note zeros are omitted)
GDPR
General Data Protection Regulation; European Union; very strict Meta fined $412mil
Enterprise Cloud Providers
Google Cloud, Amazon Web Services, Microsoft Azure
privacy laws
Gramm-Leach-Bliley Act protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) protects medical records Family Educational Rights and Privacy Act (FERPA) resists disclosure of educational records Payment Card Industry Data Security Standard (PCI-DSS) Covers credit card information Video Privacy Protection Act (VPPA) - Covers video watching (on cassettes)
Stegonography
Hiding a message inside another message, making the message not obvious Read every other line Take an image, and alter it
AI ethics and missuse
LLMs should not tell us how to build a nuclear weapon Not racist or sexist; shouldn't be biased What about liberal or conservative views Hard to see how you can prevent bad actors from using it to do bad things Cyber attacks i.e generate code Scams Disinformation
AI Definitions
Machine learning: computers who are learning on their own; computers getting smarter with more input/output; computer learning through experience and data Neural network: is a machine learning model that mimics the human brain; recognizes handwriting, images, etc.; gets smarter with input and data Natural language processing(NLP): focused on enabling computers to understand language the same way humans understand language spell-check/Grammarly Siri, Alexa Voice text messaging Large Language Models (LLM): built on large language models; massive amounts of data to look at and then be able to generate human-like responses
ransomware
Malicious software that encrypts your computer's data and ransoms the password to the user
digital threats
Nation States - Interested in Intellectual Property/Sabotage Hacktivists - Interested in Brand Damage, Ideological Views Wants to hurt brand for "greater good" Cyberterrorists - Interested in Data Destruction Want to delete data Cybercriminals - Interested in Financial Gain
Software as as Service
Other people manage; you just use software; easy to understand you manage nothing
Internet Protocol suite
Physical layer (cable provider, fiber connection, radio signal, etc.) Link layer (Hardwired through ethernet or wifi) Network layer (IP- Internet Protocol: defines the best route for information to take to get from sender to receiver) Transport layer: TCP- Transmission Control protocol- guarantees delivery of information (if you send an email, guarantees information will get from sender to receiver); does this by acknowledging every piece of information on its packet UDP does not guarantee delivery Application Layer: HTTP is the web (HyperText Transfer Protocol); rules in which a web browser talks to a web server
Six original U.S. Top-Level Domain Names
Restricted .gov .edu .mil Unrestricted .com .net .org
Five Principles of Blueprint for AI Bill of Rights
Safe and Effective Systems Algorithmic Discrimination Protections Data Privacy Notice and Explanation Human Alternatives, Consideration, and Fallback
Pittsburgh Surtac
Scalable Urban TrafficControl (Surtrac) Uses software to analyze data from cameras, signal controllers, and sensors 5% faster, with 40%less wait time at intersections and with30%-40% fewer stops
advantage of blockchain
Secure Open Source Decentralized
ARPANET
The Advanced Research Projects Agency Network; the first nationwide computer network, which became the first major component of the Internet (1969)- nodes to get traffic from one place to another Went from 4 to 582 in the 80s Government or academic computers
Cloud computing
The on-demand delivery of compute power, Database, storage, and other IT resources via the Internet with pay-as-you-go pricing
due dilligence
The overall process of evaluating a business opportunity including examination of financial records Product review / Tech Review Customer references Executive team references Legal Review Financial modeling / Audit Market analysis Competitive analysis.
Symmetric Cryptography
Use the same key to lock a message as we do to unlock a message Disadvantage: a weaker form of security; easy to share Advantage: fast
Assymetric Cryptography
Uses 2 keys; 1 to lock, and 1 to unlock The public key and private key
Four significant IoT Segments
Wearables, Smart Home, Smart City, Smart Industry
CPRA
anyone that applies, has the right to... Access & Deletion rights: consumers can obtain and delete their personal information Prevent the sale of data: consumers can prevent the sale of their information Right of Correction: let consumers correct personal information with businesses Right to see 'all' personal info, not just the last 12 months
smart contracts
computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions If, then, when Everything could be automated Use it as a way for every piece of the transaction to be added to the chain with conditions around it → if conditions are met, it automates Speed Trust Security
Infrastructure as a Service (IaaS)
delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model more control over IT You manage applications, data, runtime, middleware, O/s SideArm example: we manage a bunch, but if there's a big game, we can scale up servers; pay for what you need!!!
Internet of Things
describes a system in which everyday objects are connected to the internet and in turn are able to communicate information throughout an interconnected system; sensor, connectivity, people and proccesess
ICANN
esponsible for managing and coordinating the Domain Name System ICANN delegates control each TLD to a DomainName Registry
third party cookies
generated by a 3rd party, typically an advertising company that is affiliated with the website you are visiting
first party cookies
generated only by websites you are visiting Normal; could be storing where you are located, preferences, history, etc., just to better customize your experience
hash functions
makes blockchain tamper-proof Tough to hack or alter Hash: every block in the chain contains a one-way hash (encryption) based on the previous block
PII
personally identifiable information - data like names, social security numbers, driver's license numbers, passwords, etc.
cookies
small text files stored on your hard disk from websites you visit. Leaves a trail of who you are, where you've been, etc.
John McCarthy
the founding father of AI The term "artificial intelligence" emerged in the 1950s to name the goal of duplicating human reasoning capabilities in code and circuitry (computers) Create systems that can perform better than humans John McCarthy hosted the Dartmouth Conference in 1956, bringing together the pioneers in the field
generative AI
typically built using foundation models. These models contain expansive artificial neural networks inspired by the billions of neurons connected in the human brain "Prompt engineering" — skillfully creating requests to programs like OpenAI'sChatGPT in a way that elicits a response closest to what the user is seeking.