ISQS unit 2 exam
What are the three categories that an IoT device can be put into?
- Sensors that collect information and then send it. -Computers that receive information and then act on it. -Things that do both.
What are some of the things that a business can do to develop a data-savvy workforce?
- start from the top with data-driven leadership - use data everywhere and embed it into your culture
What are the key challenges the article suggests need to be addressed to create a health AI ecosystem?
-BIAS bulit into data -AL-inducded bias -Teaching Al-human rules -Evaluating cases of suspected Al Bias
What is one of the biggest issues with IoT? Why?
-Lack of security -Can invade privacy
What should a robust security awareness training program cover?
-Phishing and social engineering -Access, passwords, and connection -Device security -Physical security
according to the prep material, which of the following are social engineering attacks that hackers use
-credential harvesting - phishing -phone phishing
Malware Symptoms
-slowdowns -pop-up windows -fake warnings
What are some of the things that will help to create a better relationship with your mobile device? Select all that apply.
-use the sight of other people on their phones as a reminder of your own intentions - pay attention to your body -ask yourself what you want to pay attention to -create speed bumps (or small obstacles that force you to slow down and make sure that when you do check your phone, it's the result of a conscious choice)
Malware Protection
1. Antivirus and anti spyware programs 2. Scan frequently 3. Update malware definitions 4. Open email attachments only from known sources 5. Install software updates 6. Browse only reputable Internet neighborhoods
Three categories of IoT
1. Things that collect information and then send it (sensors, data) 2. Things that receive information and act on it 3. Things that do both (1) and (2)
QR codes have gone mainstream, but they are also being used by "bad actors". According to the FBI, what are the 3 ways that cybercriminals are using QR codes for nefarious purposes?
1. email/coin-based 2. embedded malware (steal financial info) 3.directly download software
It is estimated by IDC that by 2025, ____________ IoT devices will be in use.
41.6 billion
What did research out of Oxford suggest about how many jobs may be automated by machines?
47% could be done by machines "over the next decade or two"
______ Of cyber attacks are successful
50 %
according to the prep material notes, _____ of all cyber attacks are successful
50%
Almost ______ of cyber-attacks are causes by human error or behavior
90%
What is a blockchain "at its heart"? In what ways are blockchains used for more than just the "movement of money"?
A blockchain is a record of transactions, like a traditional ledger. These transactions can be any movement of money, goods or secure data
fundamentally, how does blockchain technology work (make sure you include concepts such as blocks, hash, etc. in your explanation)?
A blockchain needs to do two things: gather and order data into blocks, and then chain them together securely using cryptography.
What is an intermediary (also called a "middleman")?
A middleman is a so called stopping point between two things
Blockchain provides a simple, secure way to establish trust for virtually any kind of transaction. true or false
true
T or F Blockchain provide a simple secure way to establish trust for virtually any kind of transaction
true
Tableau helps you to see the stories in your data. true or false
true
A ___________ bias is an issue with AL systems where biases can be created within AL system
AI induced
in-between strong & weak AI
AI informed or inspired human reasoning (human reasoning as a guide) IBM Watson: pushes the limits of strong & weak AI
What are the main aims of cyber attacks?
usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes
according to article, data are not really important unless you first understand what? Why might this be the case (and why is it the case for Google)?
what they were doing
what is data driven culture
when an organization's progress is measured using data rather than intuition (gut feel) or past examples (personal experience). In the scientific world, this is usually referred to as evidence-based decision making.
What are the security best-practices the article mentions
when it comes to passwords they're creating, especially for passwords used to access IT environments.
Some implications of IoT
Automation of mundane tasks Remote accessibility Better control over maintenance of devices LOTS of data Security concerns Privacy concerns
According to the article, how many hours per day does the average person spend interacting with his or her smartphone
Average person spends 4 hours a day interacting on there phone
Why are phishing and social engineer attacks so successful?
Because they appear to come from a credible source, deceiving the end user into thinking it's a piece of communication they can trust.
What does the article suggest are the main business benefits to IoT?
Benefits all depend on the particular implementation -Agility and effectiveness (usually top considerations) - Businesses should have more access to data about their own products -Relate data faster back to companies so they can evaluate performance
Biases in data
Biases in the data-either deliberate or unconscious-will leads to boarded output from the system
strategies to take control
GET IT FROM IQSQ SLIDES
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
What are the parts of a successful cyber security approach and what does it involve?
In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks
Key factories in IoT growth
Inexpnisive processors and seniors with low power requirements Wireless data and broadband internet ( connectivity) RFID tags IPv6 (an address for every device) Ipv4 (4.3 billion addresses) vs IPv6 (3.4 x 10^38 addresses)
What is IoT?
Internet of Things (IoT) is the collection of devices that can communicate over the Internet with each other or with a control console in order to affect and monitor the real world. IoT devices might be labeled as smart devices or smart home equipment.
According to prep material developing a deep understanding of the metrics that influence key performance indicators (KPI) and the capability to do analytical reporting
Investigate trends Predict outcomes Discover new insights
What is the overarching goal of AI? (See the AI: A textbook definition section in the article.)
Its goal is to enable the development of computers that are able to do things normally done by people -- in particular, things associated with people acting intelligently.
What is a smart contract?
Just program code that is baked into that transaction, making it conditional.
"Mounting evidence" suggests "that using a smartphone, or even hearing one ring or vibrate," does what regarding concentration, reasoning, and performance?
Makes a welter of distractions and makes it very hard for a person to concentrate
What does Carlos Sandrea, VP and head of mobile at MediaMath, suggest about new technologies and their impact on mobile?
Mobile will become the predominant media channel and will be defined beyond our smartphones to include wearables, connected cars, VR-power devices, and chatbots
What impact will blockchain have on intermediaries?
No record can be deleted or changed
Personal Safeguards
Passwords, user profiles, antivirus, and policies put in place to help ensure users/employees are taking responsible actions to improved systems security
general Al
Perform general (human) intelligent action Self-Learns and reasons whit its operating environment Learns from few examples and/or from unstructured data Full range of human cognitive abilities Leverages knowledge transfers to new domains and tasks
How might smart contracts impact various industries (as discussed in the article)
This makes the contract self-enforcing, by transferring funds only when the conditions are met
What are some of the ways the article suggests will help you to create a better relationship with your mobile device? Consider and state how these suggestions will help you specifically (if at all)?
Set up yourself for success Ask yourself what you want to pay attention to Create speed bumps
IoT is a "significant driver" of what? Why?
Significant driver of big data analytics projects This is because it allows companies to create vast data sets and analysis them
What does the article suggest businesses do to "build a data-savvy workforce"? How will each of these things help (e.g., not relying on the "HiPPO", etc.)?
Start from the top with data-driven leadership Hire data-driven team members Look within your existing ranks
human safeguards
Steps taken to protect against security threats by establishing appropriate procedures for users to follow during system use.
What is the 51% attack? How does it work?
Susceptibility to 51% attacks is inherent to most cryptocurrencies, based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining
What does the article suggest is IoT's "takeaway definition"? Also, what does the article suggest as to why IoT matters?
Takeaway: extending the power of internet connectivity beyond computers to a whole range of other things, processes, and environments. Those connected, smarter, things are used to gather information, send information, or both. Matter: IoT provides businesses and people better insight into and control over objects and environments that are currently beyond the reach of the internet. By doing so, IoT helps businesses and people to be more connected to the world around them and to do more meaningful, higher-level work.
Machine Learning ( a branch off the domains of a AI tree)
Technique for making a computer produce better results by learning from past experiences. looking for patterns
5G
The fifth-generation wireless broadband technology * handle massive data volume with high transaction rates
What is the brief history of IoT, and what technologies helped to bring about IoT as we know it today?
The overall idea of adding sensors and intelligence base object was discussed in the early 1980s and 90s (but may have been before by ancestors) The adoption of RFID tags and IPv6 was a big step in IoT
What does the article suggest is the "real power of the Internet of Things"?
The real power of IoT arises when things can both collect information act on it.
T or F Data are not really helpful unless you understand the question you need to answer
True
artifical intelligence
Type of software that can process information on its own without human intervention.
According to the article, which emerging technologies are redefining mobile technology? In what ways are each of these technologies redefining mobile?
Voice: mobile voice has an advantage over other voice-enabled home devices because the phone hardly ever leaves its owner's side. Facial regonlintion: very popular among many devices
Tableau is "designed to help you be _______, so you can make ________ _________, faster."
smarter, better decisions fast
The Tableau application allows you to "______, __________, _____________, or ________ your data in seconds."
sort, highlight, drill down or fliter
downsides of smartphones
spend a lot of time on your phone 4+ hrs depression, addictions
The Tableau application helps you to "see the ___________ in your data
story
Weak Artificial Intelligence
systems that can mimic human behavior in a narrow context ex: alexa, siri
narrow Al
technologies that can perform specific tasks as well as, or better than, humans
How does Google use data and analytics in their "People Analytics Department"?
that supports the organisation with making HR decisions with data
According to the article, what has become a major weak point for an organization's information security, and what number backs this up?
What this means is that human error is a major point of weakness. Reports have shown that as much as 90% of cyberattacks are caused by human behavior
Strong Artificial Intelligence
the computer is reasoning like a human is reasoning ex: solving puzzles, making decisions
Disintermediation
the cutting out of marketing channel intermediaries by product or service producers or the displacement of traditional resellers by radical new types of intermediaries
how many devices of IoT are to be expected by 2025
total of 41.6 billion connected lot devices by 2025
Is data privacy an issue for IoT? Why or why not?
Yes, it can invade personal privacy ( think of smart homes) -Rings -Cameras -echos/ alexas
What happens when our brains "grow dependent" on smartphones?
You develop intellectual weakness
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
What are KPIs, and how do they relate to data analytics and having a data-driven culture? What will having "a deep understanding of the metrics that influence those KPIs ..." do for organizations.
ability to develop strategic insights into what is influencing your key performance indicators (KPIs) A deep understanding of the metrics that influence those KPIs, and the capability to do analytical reporting, will help process all your data and create a data-driven team that investigates trends, predicts outcomes, and discovers new insights.
Blockchain provides a simple, secure way to establish trust for virtually any kind of transaction. true or false
ans : true
_______________ was the cryptocurrency blockchain was initially created to support?
bitcoin
According to the article, a blockchain "is a cryptographic database maintained by a
by a network of computers, each of which stores a copy of the most up-to-date version.
According to the definition provided in the article, "artificial intelligence is a sub-field of
computer science
What is a blockchain node?
computers on a network
A(n) _________ bias is an issue with artificial intelligence (AI) systems given that these systems use prior information to learn.
data
A(n) _________ bias is an issue with artificial intelligence (AI) systems given that these systems use prior information to learn. Select the best answer. data AI-induced context All of the above
data
Differentiate between data and AI-induced biases
data is previous records and AI induced bias may use data and create bad situations
What does "DeFi" stand for
decentralized finance
IBM's _____________ is a good example of a system that does not think like humans.
deep blue
IBM's _____________ is a good example of a system that does not think like humans. Watson Dartmouth Project Deep Blue All of the above
deep blue
How does IoT work?
describes the network of physical objects—"things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet
T or F The only practical app of blockchain tech is to support crypto
false
Tableau "makes analyzing data ________, ________, and _______________ for everyone."
fast, easy and beautiful
The Tableau application allows you to "bring all your data together _____________________ ________."
in one simple view
What is a blockchain protocol?
is a set of rules that dictate how the computers in the network, called nodes, should verify new transactions and add them to the database
What is cyber security?
is the practice of protecting systems, networks, and programs from digital attacks.
mobile technology
is the technology used for cellular communication
What ways does the article suggest that you can protect yourself from malicious QR codes?
make sure its legit website never scan an email QR code if you created one, make sure its the one you created
Identify the objectives for those working on building AI-based systems? (See the Strong AI, weak AI and everything in between section in the article.)
or some, the goal is to build systems that think exactly the same way that people do. Others just want to get the job done and don't care if the computation has anything to do with human thought. And some are in-between, using human reasoning as a model that can inform and inspire but not as the final target for imitation
data safeguards
protect databases and other organizational data
In Tableau, you can "keep on asking ____________ in the data until you ________________ ______________________."
question, unitl you discover the root cause