ISQS LAST TEST. YOU. BETTER. ACE. THIS.
human discipline
"which is what we humans can do that machines for the foreseeable future, cannot emulate."
What is social engineering, and what tactics do hackers use when attempting a social engineering attack?
(Deceiving) Focusing on gaining your trust... phishing, credential harvesting, phone phishing.
What does Walmart hope will be the outcome of introducing robots, especially (but not limited to) in terms of its associates?
-"The overall trend we're seeing is that automating certain tasks gives associates more time to do work they find fulfilling and to interact with our customers," -"It relieves associates of a job that, quite frankly, is unpopular,"
What are some of the potential uses of drone technology?
-Agricultural -Infrastructure Development and Maintenance -Construction -Warehousing and Inventory -Delivery
What are the security best-practices the article mentions?
-Don't click -inform the IT Team or MSP -Lock your device before you leave your desk -Store documents in a locked cabinet -Properly discard information
According to the article, what are some of the potential benefits of using drone technology?
-Drones can perform inspections and surveys more quickly, more cheaply, and safely -more cheaply but significantly more frequently as well -increasing the amount of data gathered
According to the article, what are some of the projections/ estimates for drones and their impact on business?
-Gartner estimates that over 170,000 commercial drones will be sold this year, a 58 percent increase since 2016. Goldman Sachs predicts that businesses and civil government will spend $13 billion on drones between 2016-2020. -potential to replace $127 billion in current business services and labor costs across multiple industries.
What is the maker movement? How does this movement compare to old-style crafting?
-Individuals embracing cutting-edge manufacturing methods with, or in place of, traditional craftsmanship. -is the willingness to embrace cutting-edge manufacturing methods alongside, or even in place of, traditional craftsmanship.
What are the benefits of 3D Printing?
-Lead Time -Design Freedom -Cost (zero Tooling, Zero-Cost Complexity, Reduced Labor)
What are the different types of AR, and what differentiates these types?
-Marker Based Augmented Reality -Markerless Augmented Reality -Projection Based Augmented Reality -Superimposition Based Augmented Reality
Differentiate between the two forms of MR listed in this reading?
-Mixed reality that starts with the real world -Mixed reality that starts with the virtual world
What should a solid security awareness training program cover?
-Phishing and Social Engineering -Access, Passwords and Connection -Device Security -Physical Security
What are some applications of 3D Printing?
-PolyJet -Stereolithography -Fused Deposition Modeling -Laser Sintering -Direct Metal Laser Sintering
What is humanics, and what are its three basic pillars?
-Technical ability -Data discipline -Human discipline
What are some of the applications of reality technologies in business, and how are companies using these technologies specifically?
-VR Remote Training Employees -Mixed Reality Data Organization -Virtual Reality Communication and Collaboration
According to this reading, what differentiates AR, VR, and MR?
-Virtual reality (VR) immerses users in a fully artificial digital environment. -Augmented reality (AR) overlays virtual objects on the real-world environment. -Mixed reality (MR) not just overlays but anchors virtual objects to the real world.
According to the article, why is Walmart introducing robots in many of its stores?
-Walmart wants store workers to help out customers instead of mopping up floors and unloading boxes in backrooms. -Walmart says these "smart assistants" will reduce the amount of time workers spend on "repeatable, predictable and manual" tasks in stores and allow them to switch to selling merchandise to shoppers and other customer service roles.
What kinds of tasks will these robots undertake?
-floor scrubbers -scan boxes as they come off delivery trucks and sort them by department onto conveyer belts. -robot janitors and shelf scanners
What does the article suggest the future work (i.e., jobs, skills, etc.) may look like? What numbers (both historical and future estimates) support these suggestions?
-most workers expect computers will do much of the work currently done by humans within 50 years. -Estimates about how much of the workforce could be automated vary from about 9% to 47%. The consultancy McKinsey estimates up to 800 million workers globally could be displaced by robotic automation by 2030. Some jobs will change dramatically, while others will disappear altogether. -McKinsey suggests that by 2030, the workforce will spend 55% more time using technical skills than in 2016.
What is cyber self-defence, what are its tactics (understand the specifics here), and what is the cyber self-defense golden rule?
1.) Don't Click 2.)Seriously... Stop Clicking 3.) Use strong Passwords 4.)Don't Reuse passwords 5.) Stop using Passwords 6.)Patch Yourself "Trust, but Verify"
What are some of the main concepts underlying 3D Printing, including definitions and how 3D Printing works generally?
3D printing refers to any manufacturing process which additively builds or forms 3D parts in layers from CAD data.
What are the parts of a successful cyber security approach and what does it involve?
A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks.
What is AR?
Augmented Reality is An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user's view of the real-world, thus enhancing one's current perception of reality.
What is cyber security?
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
What are some tools to help prevent cyber attacks? Are they sufficient to help prevent the modern cyber attack? Why or why not? If not, what else can help?
Firewalls, Big Data Analytics, Next generation Security Software. Yes, but more is needed.
According to the article, what has become a major weak point for an organization's information security, and what number backs this up?
Human error has become a major weak point today; one that is easily exploited by cyber criminals. Almost 90 percent of cyber attacks are caused by human error or behavior.
Determine the most common sources for cyber attacks?
Humans???
3D printing - Supports
Most 3D printing processes require support structures to act as "scaffolding" for features that can't be built above open air, such as overhangs, undercuts, holes, cavities, etc.
According to the video, what are some of the statistics for cyber attacks and data breaches?
Only 50% of cyber attacks are succesful. The average data breach cost $3.79 Million Dollars in 2015, which is a 23% growth in those past 2 years alone.
3D printing - Orientation
Orientation refers to how and which direction a part is placed on the 3D printing build platform. For example, a part may be oriented at an angle, or lying flat/standing vertical.
Based upon this definition (see your answer above), what technologies might be considered a robot, and conversely what technologies would not be considered a robot?
Robot--A drone that senses and acts on it own. Any robot that senses and acts on its own. Not a Robot -- AI, human controlled drones, anything that has to rely solely on a human.
What is the definition of a robot, according to many roboticists?
Sense, think, act paradigm. Has to be able to sense its environment and then thinking about or planning its next action and then somehow acting on the world. an agent that acts to maximize a humans activities.
What are the methods of (or tools of the trade in) the maker movement? What kinds of machines are used?
The first of these methods was 3D printing, which creates objects by building up material, usually malleable plastic, layer by layer.
What are the different ways VR is experienced?
VR Headsets VR with smartphones Immersive videos
How is AR different than VR?
VR requires you to inhabit an entirely virtual environment, AR uses your existing natural environment and simply overlays virtual information on top of it.
How is Texas Tech using reality technologies to help students with visual impairments?
With the touch of a button, the app connects each user to a mobility and orientation specialist who will help them navigate through their environment. The specialist is given instant access to a user's surroundings through their smartphone camera, allowing them to see what a user may not be able to, and relay that information back to them in real time.
What are the main aims of cyber attacks?
accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
According to the article, what are some of the benefits of making stuff?
allows people to make more beautiful things, more durable things more quickly than they ever could before.
Why are phishing and social engineer attacks so successful?
because they're disguised to look like they come from credible, trustworthy sources.
Data discipline
navigating the sea of information that's generated by these machines.
Technical ability
understanding how machines function and how to interact with them.