IST 195 EXAM2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Statement on AI risk

"Mitigating the risk ofextinction from AIshould be a globalpriority alongside othersocietal-scale risks suchas pandemics andnuclear war."

Benefits of Cloud Computing

- reduced it cost - business agility - flexible scaling - high availability

unrestricted pre ICANN domain names

.com, .net, .org anyone can register

Original U.S. Top Level Domain name

.com, .org, .net, .gov, .edu, .int

restricted pre ICANN domain names

.gov, .edu, .int only institutions can register

How much does the Pittsburgh Surtrac cost per intersection

100,000

cybercrime

3rd largest economy in the world after the US and China

Large Language Models (LLM) -

A large language model is anartificial intelligence system (a neural network) trained on massiveamounts of text data to generate human-like text.

WIPO (World Intellectual Property Organization)

A specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.

Generative AI

AI trained on these models can performseveral functions: classify, edit, summarize,answer questions, and draft new content,among other tasks.

what did Apple introduce in 2021 for third party cookies

ATT (App Tracking Transparency) pop up windows on iPhones asking for permission to be tracked

CPRA Components

Access & Deletion rights: consumers can obtain anddelete their personal information .• Prevent the sale of data: consumers can prevent thesale of their information. • Right of Correction: let consumers correct personalinformation with businesses .• Right to see 'all' personal info, not just the last 12months.

smart industry in healthcare

By 2025 Healthcare willcomprise 1/3 of the marketfor distributed devices(McKinsey Global Institute) • Smart Beds • Monitors • Gluclose • Ultrasounds • Thermometers • Medication Dispensers

Internet Protocol Physical

Co-ax, Fiber, Radio

With IaaS, responsibility mainly falls on the....

Consumer (down to shared Network security). application, runtime, data, middleware, O/S

Information Value Loop

Create - use of sensors to gather information Communicate - transfer info from one place to another Aggregate - gathering of info from or more sources at one or more times Analyze - Look for patterns, relationships, discoveries, etc Act - Create change based on findings

How can AI be scary

Cyberattacks explode. The right prompts can now generateworking malicious code, meaning more, bigger, and increasinglydiverse cyberattacks .• Scams proliferate. The new AI-assisted phishing and fraudschemes will take the form of real-sounding pleas for help in thefaked voices of your friends and relatives, harvested from theirsocial media, making it impossible for the public to separate factand fiction .• Disinformation. Propaganda and partisan assault will beoptimized by algorithms and given mass distribution by techgiants.

Multifactor Authentication

Do not rely just on a username &password Passwords are compromised all the time Two factor identification is the most popular

smart industry impacts

Education Agriculture Infrastructure and transportation Health Retail and Logistics

Cryptography consists of

Encrypting: scrambling information so it is not readable until decrypted Decrypting: unscrambling information to restore it to its original form

Internet Protocol Link

Ethernet and Wi-fi

Natural Language Processing (NLP)

Focused on enablingcomputers to understand, interpret, and generate human language—key for translation, text analysis, speech recognition, and more

CPRA (California Privacy Rights Act)

For-profit businesses that collect personal information from Californiaresidents, • Have a gross annual revenue of over $25 million; OR• Buy, sell, or share the personal information of 100,000 or moreCalifornia residents or households; OR • Derive 50% or more of their annual revenue from selling or sharing Cali residents personal info

who left google to speak about the dangers of AI freely

Geoffrey Hinton

Enterprise Cloud Storage Solutions

Google Cloud Amazon Web Services Microsoft Azure

Internet Protocol application

HTTP, Telnet, DNS

Steganography

Hides a message inside something else, thereby making the message non-obvious Text

Steganography example

Histiaeus devised a clever newway to send hidden messages.• He shaved the head of one of his servants and then when the hair grew back after he left then the message was read

Internet Protocol Network

IP

IPv4 vs IPv6

IPv4: 32-bit number: 4 billion addresses; four sets of numbers marked off by periods IPv6: 128-bit addresses, able to handle up to 1 quadrillion addresses; almost unlimited # of addresses

PII (Personally Identifiable Information)

Information about an individual that can be used to uniquely identify them (directly or indirectly).

Ethics of AI

LLMs shouldn't tell us how to build achemical weapon .• We agree that generative AI shouldn'tbe racist or sexist .• Should generative AI models take aposition on climate change, guncontrol, abortion, or vaccines? • What about when Generative AI isbuilt on mis/disinformation

Why would people move to cloud computing

Lower cost of operations • Better compete and addressmarket demands • Lower downtime; highperforming applications • Always up-to-date • More efficient IT staff -shifting focus • Security & ComplianceText

Smart Industry Impacts Agriculture

Maximize Efficiency • Sensors in Fields • Monitor temperatures,acidity • Combine with Weather forecasts for predictive analysis • Remote monitor of livestock(i.e., drones, smartphones) • Self Driving tractors

Digital Threats

Nation States - Interested in Intellectual Property/Sabotage• Hacktivists - Interested in Brand Damage, Ideological Views• Cyberterrorists - Interested in Data Destruction• Cybercriminals - Interested in Financial Gain

GDPR (General Data Protection Regulation)

New European Union law on data protection and privacy for individuals.

Smishing

Phishing attacks committed using text messages (SMS).

Amazon EC2

Service that provides secure and resizable virtual servers on AWS

SaaS (Software as a Service)

Services for delivering and providing access to software remotely as a web-based service

EverydayAI Examples

Siri - Smartphone Assistants • Facial Recognition(Apple Photos) • Autocorrect • Google Translate • Self-driving cars • Social Media Feeds • Smart Appliances (Roomba) • Fraud Detection

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

Internet Protocol transport

TCP, UDP

IPv4

The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0".

IPv6

The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".

Machine Learning

The study of computer algorithms thatimprove automatically through experience and data. They learn fromdata rather than being explicitly programmed

What is a data breach?

Unauthorized person views, alters, or steals secured data

ADPPA (American Data Privacy and Protection Act)

United States proposed federal online privacy bill that would regulate how organizations keep and use consumer data. - has not been sent to Congress

building blocks for IaaS

Virtualization - simulating a hardwareplatform, operating system, storage, &network resources • Transforms Hardware into software • Ability to run multiple operatingsystems as VMs • Virtual Machines• VMWare and XenSoource

What. are the Four IoT segments

Wearables, asamrt Home, Smart City, Smart Industry

what can you do to avoid phishing

When in doubt, DON'T CLICK• Ask yourself these questions• Am I expecting the email attachment, links, text, phonically

Domain Name Disputes

Your domain name has been registered and is being used in bad faith. The domain name was registered for the purpose of selling the domain name to the complainant who is the owner of the trademark or service mark or to a competitor for valuable consideration The domain name was registered in order to prevent the owner of the trademark or service mark from using the mark. The domain name was registered primarily for the purpose of disrupting the business of a competitor; The registrant intentionally registered for financial gain, Internet users to the website, by creating a likelihood of confusion

Vishing

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

Ceasar Cipher

a technique for encryption that shifts the alphabet by some number of characters

The Information Value Loop

act, create, communicate, aggregate, analyze

major companies in cloud computing

amazon, google, microsoft, IBM, salesforce

Cryptography

based on math and is a method for transforming. information to hide its content

examples of connectivity in IoT

bluetooth, NFC

John McCarthy

coined the term Artificial Intelligence at the Dartmouth Conference

Wearables

continuously monitor and track user preferences and habits

third-party cookies

cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page

PCI DSS (Payment Card Industry Data Security Standard)

covers credit card information

VPPA (Video Privacy Protection Act)

covers video watching

how do IP addresses work

first two # sets are the network address third # set is subnet ex) Falk College last # set is the computer/device being used

examples of wearables

fitness and health trackers heart rate monitors wireless headphones

phishing

fraudulent emails designed to steal data

first party cookies

generated only by websites you are visiting

Ceasar Cipher number key

if number is 632 and the word is APPLE, move A six spaces over, P three spaces over, P two spaces over and repeat

Copilot Copyright Commitment

in response to user concerns about potential IPinfringement when using outputs from theirAI-powered Copilots.• If legal issues arise, Microsoft will takeresponsibility, defend the user, and coverany adverse judgments or settlements

Smart City

integrate all levels of municipal services are becoming safer more convenient places to live

Neural Network

is a machine learning model that uses artificialintelligence to teach computers to process data in a way that mimicsthe human brain. They can recognize handwriting, images, etc

Smart Home

learn a users habits to develop an automated home support for everyday tasks. Include energy efficiency, safety, entertainment, access control

Sensors (IoT)

make measurements like temperature, light levels, humidity, pressure, proximity, motion, gas/chemicals/smoke, heart/breathing rates and so on; implemented as thermocouples/thermistors, infrared detectors, inductive, photoelectric, and capacitive cells, accelerometers, gyroscopes, and more

IaaS (Infrastructure as a Service)

more control over IT resources

SAAS - You Manage

nothing the other manages it

Cloud Computing

on demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay as you go pricing

what is the problem with IPV4

only 4 billion available

Smart City applications include

open data for better urban planning, optimized energy consumption and increased public safety

Ceasar Cipher alphabet key

out the word in front of the alphabet and skip when the letters usually are in the alphabet to encrypt

What improvement was seen through the Surtrac

people to their destination 25% faster, with 40% less wait time at intersections and with 30%-40% fewer stops, which contributed overall to a 20% reduction in emission

HIPPA

protects medical records

Gramm-Leach-Bliley Act

protects personal financial information

FERPA

resists disclosure of educational records

ICANN (Internet Corporation for Assigned Names and Numbers)

responsible for managing and coordinating domain name system. delegates control over each TLD to a domain name registry

ARPANET (Advanced Research Projects Agency Network)

s the first public packet-switched computer network. It was used for academic and research purposes

People and Processes IoT

seeing your package through amazon alert ring camera

Internet of Things consist of

sensors, connectivity, and people and processes

cookies

small text files stored on hard discs from websites you visit

examples of a Smart City

smart energy grids, smart streetlights, smart public transportation

Example of Sensors in IoT

smart thermostat

most attacks happen through

social engineering (phishing, smashing, vishing)

Pittsburgh Surtrac

software to analyze data fromcameras, signal controllers and sensors

Internet of Things (IoT)

the network of products embedded with connectivity-enabled electronics

Symmetric Encryption

the same key is used to encode and decode

Internet Protocol Suite

the way the web/internet works and defines the best route that info should take to get from internet to receiver

examples of a smart home

thermostats, coffee makers, lights, smart tvs

asymmetric encryption

two keys are used; one key encodes the message, and the other key decodes the message

smart industry

use real time data analytics and M2M sensors to optimize operations, logistics and supply chain and helps them force challenges

Amazon S3

web service offered by Amazon, provides storage through web services interfaces (SaaS)

Caesar cipher key

when the number is +5 then you move the first letter five letters after on the alphabet

Connectivity (IoT)

wirelessly or physically connecting


Set pelajaran terkait

Research Methods Exam 1 Quiz Review

View Set

PREPU: CH 61 MANAGEMENT OF PATIENTS WITH NEUROLOGIC DYSFUNCTION

View Set

MG 485 Module 2 In-Depth Questions - Chapter Assignment Questions & Check Your Knowledge

View Set

Sadlier Vocabulary Workshop Level F Unit 2 Answers

View Set

Populations in Research Requiring Additional Considerations and/or Protections

View Set

NR 222- exam 1 practice questions

View Set

Ch 58: Professional Roles and Leadership

View Set

Module 13- Travel Planning, Loading, Towing and Driving Special Vehicles

View Set