Ethics 2nd test review

studied byStudied by 1 person
0.0(0)
get a hint
hint

Suggested Major Components of AI

1 / 106

Tags and Description

107 Terms

1

Suggested Major Components of AI

knowledge, reasoning, language, understanding, and learning

New cards
2

How do you achieve ethics from rational behavior?

By Utilizing logic and reasoning in your action. Every art and every inquiry, and similarly every action and pursuit, is thought to aim at some good purpose

New cards
3

Rational Agents

A rational agent or rational being is a person or entity that always aims to perform optimal actions based on given premises and information. (could be an entity of action)

Formula for agents: f:P*→A

New cards
4

What is the difference between steps in AI vs AI in steps?

Know the Domain, Study the Data (Data Mining), Cleanse and Normalize Data, Choose a Model, Test and compare with other models, Short List optimum models, Fine Tune. Correct and Modify, Monitor Errors, Record Learning.

New cards
5

Safety vs. Security

Safety primarily focused on protection from physical dangers. Security refers to protection against external threats that are likely to cause harm

New cards
6

Three Main Privacy Issues

Access of private information, stealing identity for money, and hijacking your computer for illegal purposes

New cards
7

3 Foundations of Cyber-security

Privacy, Control, and Agency (or lack thereof, i.e. Surveillance)

New cards
8

Vulnerability vs Threat vs Risk

A vulnerability is a weakness, flaw or other shortcoming in a system. a threat is anything that could exploit a vulnerability, which could affect the confidentiality, integrity or availability of your systems, data, people and more. Finally, risk is the probability of a negative (harmful) event occurring as well as the potential of scale of that harm.

New cards
9

Reactive Machines AI

Based on present actions, it cannot use previous experiences to form current decisions and simultaneously update their memory.

Example: Deep Blue

New cards
10

Limited Memory AI

Used in self-driving cars. They detect the movement of vehicles around them constantly and add it to their memory.

New cards
11

Theory of Mind AI

Advanced AI that has the ability to understand emotions, people and other things in the real world.

New cards
12

Self Aware AI

AIs that posses human-like consciousness and reactions. Such machines have the ability to form self-driven actions

New cards
13

Artificial Narrow Intelligence (ANI)

General purpose AI, used in building virtual assistants like Siri

New cards
14

Artificial General Intelligence (AGI)

Also known as strong AI. An example is the Pillo robot that answers questions related to health.

New cards
15

Artificial Superhuman Intelligence (ASI)

AI that possesses the ability to do everything that a human can do and more. An example is the Alpha 2 which is the first humanoid AI robot.

New cards
16

Domains of Artificial Intelligence

Machine Learning, Neural Networks, Robotics, Expert Systems, Fuzzy Logic, and Natural Language

New cards
17

What is AI?

  1. Systems that think like humans

  2. Systems that think rationally

  3. Systems that act like humans

  4. Systems that act rationally(operational)

New cards
18

What is artificial intelligence?

Any task performed by a program or a machine that, if a human carried out the same activity, we would say the human had to apply intelligence to accomplish the task.

New cards
19

Behaviors associated with human intelligence?

  1. planning

  2. learning

  3. problem solving

  4. knowledge representation

  5. Perception motion

  6. Reasoning social intelligence /creativity

New cards
20

What is the turing test?

A machine trying to fool a human into thinking that it is human

New cards
21

What are the different types of AI?

  • reactive machines

  • limited memory

  • theory of mind

  • self aware

  • artificial narrow intelligence

  • artificial superhuman intelligence

New cards
22

In the realm of “what AI is” (i.e. datasets, models \n and predictions)

1. Bias and Fairness \n 2. Accountability and Remedi-ability \n 3. Transparency, Interpretability and \n Explain(ability).

New cards
23

In the realm of “what AI does” are issues of

1. Safety \n 2. Human-AI interaction \n 3. Cyber-security and Malicious Use \n 4. Privacy, Control and Agency (or lack thereof, i.e. \n Surveillance) 59

New cards
24

In the realm of “what AI impacts” are issues \n related to:

1. Automation, Job loss, Labor trends \n 2. Impact to Democracy and Civil rights \n 3. Human-Human interaction

New cards
25

Ethical questions in AI?

Bias: is AI Fair?

Interaction bias: data gathered/observed during human machine interaction

Latent bias: based on the type of data given to the machine, it is analyzed to ignore uncommon information

Selection bias: selecting specific information for the system

Human interaction: will we stop talking to each other

Employment: is AI getting rid of jobs

New cards
26

What is the internet?

A network of networks, joining many government, \n university and private computers together and \n providing an infrastructure for the use of E-mail, \n bulletin boards, file archives, hypertext documents, \n databases and other computational resources

New cards
27

What challenges did the creation of the internet solve?

  • Basically inventing digital networking as we know it

  • Survivability of an infrastructure to send / receive \n high-speed electronic messages

  • Reliability of computer messaging \n

New cards
28

What is internet security?

Include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent \n via Internet Protocol.

New cards
29

What is security?

Protection against intentional harm

New cards
30

What is safety?

Protection against accidental harm

New cards
31

What does a request do?

Identifies your computer and where it is located

New cards
32

What does a response do?

Carries with it unwanted hidden software

New cards
33

What is hacking?

Penetrating into someone’s \n system with their permission and a purpose \n of securing it

New cards
34

Who is a hacker?

Intelligent individuals with computer skills \n and an ability to explore the system details. \n For some, hacking is a hobby. Their intention \n can either be to gain knowledge or to explore \n and do illegal things

New cards
35

What is cracking?

Penetrating into someone’s \n system without their permission just for fun \n or to harm that system and get some \n crucial data.

New cards
36

Easy way to remember hacking

Legal activities done trying to \n improve technology

New cards
37

Easy way to remember cracking

illegal activities, hacking with a \n malicious intent

New cards
38

What can hackers and crackers do?

  • Someone who bypasses the systems and \n passwords.

  • Taking advantage of weaknesses left in \n the system by developers.

  • Computer programmers.

  • Access confidential information.

  • Broadcast confidential documents.

New cards
39

What are methods of hacking?

  • Over the internet

  • Over LAN

  • Locally

  • Offline

  • Theft

  • IP Addresses

  • Telephone

  • Email

New cards
40

Different types of hackers

  • black hat

  • white hat

  • grey hat

  • blue hat

  • hacktivist

  • script kiddie

  • elite hacker

  • bots

New cards
41

What are black hat hackers?

  • Malicious hackers

  • Villains

  • Violate Computer Security

New cards
42

What are white hat hackers?

  • Computer Security

  • A computer hacker intending to improve \n security

  • The Hero

Also called an ethical hacker, employee and authorized hacker

New cards
43

What is a grey hat hacker?

(Mixture of white and black, offers their services \n to improve the system for a fee). A hacker who will identify but \n not exploit discovered vulnerabilities, yet may still expect a \n reward for not disclosing the vulnerability openly

New cards
44

What is a blue hat hacker?

(consults firms, perform system tests before \n launch). Invites professionals to find vulnerabilities.

New cards
45

What is a hacktivist?

Utilizes technology

New cards
46

What is a script kiddie?

(Skiddie) – non-expert in technology lacking \n knowledge, immature, trying to crack into systems by using \n products created by others. Early hackers

New cards
47

What is a elite hacker?

The most skilled hacker. Master of deception

New cards
48

What is a bot?

Software tools that hackers use

New cards
49

Advantages of ethical hacking?

It helps to fight against cyber terrorism and national \n security breaches. \n ➢ It helps to take preventive actions against other hackers. \n ➢ Detects the weaknesses and closes the gaps in a system \n or a network. \n ➢ Prevents gaining access from malicious hackers. \n ➢ Provides security to banking and financial settlements

New cards
50

Disadvantages of ethical hacking?

➢ Might use the data against malicious hacking activities. \n ➢ May corrupt the files of an organization. \n ➢ Possibility to steal sensitive information on the computer \n system. 25

New cards
51

Phases of hacking

  1. reconnaissance

  2. scanning

  3. gaining access

  4. maintaining access

  5. covering tracks

New cards
52

Types of attacks?

  1. SQL Injection

  2. DDOS attack (distributed denial of service)

  3. social engineering

  4. computer virus

  5. computer worm

  6. trojan horse

  7. sniffer

New cards
53

What is an SQL injection?

a type of attack often used against data driven applications.

\n Code injection technique that might destroy database.

\n It is a technique that exploits an application \n security weaknesses.

Takes advantage of non- \n validated input vulnerabilities to pass SQL \n commands through a web application for execution \n by a backend database

New cards
54

What is an SQL injection used for?

Used to steal databases full of credit card \n information, passwords, or personal details

New cards
55

What is an SQL injection mainly used for?

To take over database servers

New cards
56

How do you prevent an SQL injection?

  • Use prepared statements

  • Use stored procedures (that can be saved and used \n over again)

  • Validate user input

New cards
57

What is a DDOS attack? (distributed denial of service)

  1. Make a machine or network resource inaccessible \n to users.

  2. Its a cyberattack that causes the servers to refuse \n to provide services to genuine clients

New cards
58

What are the 2 types of DDOS attacks? (distributed denial of service)

Flooding and crash attack

New cards
59

What is a flooding DDOS attack?

the hacker sends a huge amount of traffic to the server which the server can not handle. And hence, the server stops functioning. This type of attack is usually executed by using automated \n programs that continuously send packets to the server

New cards
60

What is a crash DDOS attack?

the hackers exploit a bug on the server resulting in the system to crash and hence the server is not able to provide service to the clients

New cards
61

What do DDOS attacks usually utilize? (distributed denial of service)

botnets

New cards
62

What is a botnet?

A number of devices connected to the internet where each \n device has one or more bots running on it. The bots on the devices and malicious scripts used to hack a victim. Can be used to steal data, send spams and execute a DDOS attack

New cards
63

How do you prevent DDOS attacks? (distributed denial of service)

  1. Use Anti-DDOS services

  2. Configure Firewalls and Routers

  3. Use Front-End Hardware (or application front- \n end hardware)

  4. Use Load Balancing: efficient distribution of \n network or applications across servers

  5. Handle Spikes in Traffic

New cards
64

What is front end hardware in DDOS attack prevention?

any hardware that optimizes or protects network \n traffic. It is placed on the network's outward-facing \n frontend or boundary

New cards
65

What is social engineering?

the art of manipulating people into divulging personal and confidential information

Requires very little technical skill, relies heavily on human interaction, most often used with other exploits, sim hijacking

New cards
66

How are malware and viruses used?

  • Used by an attacker to steal data, disrupt \n operations or access a private network.

  • Used to describe many different types of \n software including viruses, worms, \n Trojans, key loggers, spyware and others

New cards
67

What is a computer virus?

  • Any hostile computer program that can \n replicate itself and spread from one \n computer to another without input from its \n creator.

  • Needs to attach itself to an existing \n program in order for it to work.

  • They are used to deliver many different \n payloads.

New cards
68

What is a computer worm?

  • A program similar to a virus; it can replicate \n itself and spread from one computer to \n another.

  • Unlike a virus a worm does not need to be \n attached to an existing program in order to \n function.

  • Always cause harm to the network, even if it \n is just increased bandwidth consumption, \n whereas a virus will always corrupt and/or \n modify files on a computer. \n

New cards
69

What is a trojan horse?

  • A program that pretends to do one thing, but in \n reality does something else. May appear to be a \n normal program, but in fact does something \n malicious.

  • Used to record keystrokes input by a user. \n Can be used to steal usernames, passwords, \n credit card information, personal details and so on.

  • They do not replicate as viruses do, nor make \n copies of themselves as worms do.

  • They simply give access to some hacker or a \n cracker. \n

New cards
70

How do you prevent malware and viruses?

Install firewalls

  • Program/network security system used to \n monitor (allows/block) network traffic.

  • Have a set of predetermined security rules \n to filter packets trying to enter the network.

  • Usually placed between (on the boundary \n of) a trusted and untrusted networks. \n 41

New cards
71

What is a sniffer?

  • A program and/or service that monitors \n data travelling over a network. Sniffers are \n used to steal information off a network.

  • Unauthorized sniffers can be extremely \n dangerous to a network’s security because \n they are virtually impossible to detect.

  • Used especially in the Wi-Fi connection.

New cards
72

What is a temporary solution to sniffers?

  • Used to prevent access to computer \n systems by unwanted programs.

  • Utilizes many different methods to protect \n the computer.

  • Often search for signs of viruses on every \n website that is visited and do regular \n scans of the computer to check for \n infections. \n

New cards
73

What are the types of hacking and data theft?

  1. password cracking

  2. brute forcing

  3. dictionary hack

  4. packet sniffing

  5. phishing

  6. pharming

  7. spear phishing

  8. key loggers

  9. spoofing

  10. IP spoofing

New cards
74

What is password cracking?

Attempting to guess a password \n using a program

New cards
75

What is brute forcing?

A program that guesses a password \n by inputting as many randomly generated \n passwords using the computer’s processing power

New cards
76

What is dictionary hack?

A program that guesses \n passwords based on words in a dictionary or the \n program’s vocabulary

New cards
77

What is packet sniffing?

Sniffing packets sent over the internet \n to gain security details over unsecured connections

New cards
78

What is phishing?

Is the attempt to acquire sensitive \n information such as usernames, passwords, and credit \n card details (and sometimes, indirectly, money) by \n pretending as a trustworthy entity in an electronic \n communication. Legitimate looking sites designed to \n lure users. Ex. An email sent.

New cards
79

What is pharming?

Another technique used to steal confidential \n access code. It works by redirecting users to a rogue \n server. Example: malicious website that resembles a \n legitimate website – used to gather username/pwd

New cards
80

When does spear phishing occur?

when criminals \n obtain information about you from \n websites or social networking sites, and \n customize a phishing scheme to you

New cards
81

What are key loggers?

records keystrokes and can be \n software or hardware

New cards
82

What is spoofing?

can be define as misrepresenting \n the sender of a message (e-mail, IM, letter, \n resume, etc.) in a way that causes the \n human recipient to behave a certain way

New cards
83

What is IP spoofing?

Masks the IP address of a \n hacker and prevents them from being found. \n ◼ When a hacker spoofs an IP address through a \n Web site, it is known as IP / Web spoofing

New cards
84

What are the types of hacking attacks?

  1. Domain Name Server Tunneling

  2. Eavesdropping

  3. Jailbreaking

  4. Business email compromise

  5. Cross site scripting

  6. drive by attack

New cards
85

What is DNS tunneling?

an attack designed \n specifically with the intension of providing \n hackers with continual access to the target. \n ◼ Enables the hacker to insert (or tunnel) \n malware into DNS request coming from the \n client to the server by tempering with the \n HTTP (protocol)

New cards
86

What is eavesdropping?

Involves a hacker intercepting and accessing \n the data traveling across a network by \n exploiting unsecured communication

New cards
87

What is jailbreaking?

Involves a hacker “rooting your device to \n allow the installation of software that has not \n been verified by vendors or made available in \n official app stores. This leaves the device \n vulnerable to incoming malware.

New cards
88

What is BEC? (business email compromise)

attack involves hacker targeting \n employees with authorization privileges for \n various transactions.

New cards
89

What is cross site scripting?

An XSS infects users by inserting malicious \n scripts when a user visits a website, thereby \n infecting device, stealing cookies, credentials, \n etc

New cards
90

What should you do to be safe online?

Know \n -What information is sensitive \n Be Aware \n -Of how criminals try to gain access to it \n Protect it

-By taking adequate precautions \n

New cards
91

How do you protect your computer?

Use anti-virus software, use anti-spyware software, keep computer updated, use a firewall,

New cards
92

How to prevent phishing attack?

  1. Do not enter sensitive information in the \n webpages that you don’t trust

  2. Verify the site’s security

  3. Use Firewalls

  4. Use Antivirus Software that has Internet \n Security

  5. Use Anti-Phishing Toolbar \n

New cards
93

Skills to prevent cyber crime?

  1. Spam blocker

  2. Anti Virus software

  3. Firewall protection

  4. Encryption software

  5. Caution in providing personal information

  6. Secure Shopping

  7. Avoidance of scans

  8. Monitoring of your child’s computer \n activities

New cards
94

Measures to reduce shortage of skills

  1. Employ more skilled individuals \n ◼ Pros: Eliminates the need on relying on a \n small number of people \n ◼ Cons: Very costly

  2. Improve education on internet security \n and/or lower costs for fees

  3. Job Awareness: people are not aware \n certain jobs are available

  4. Higher starting wages to give potential \n employees an incentive

New cards
95

What are ways criminals manipulate us into giving information?

  • reciprocity

  • consistency

  • social proof

  • authority

  • scarcity

New cards
96

What is reciprocity?

When someone does something for us, we feel obligated to repay the favor

New cards
97

What is consistency?

When we commit to do something, we tend to feel pressure to follow through

New cards
98

What is social proof?

We like to do things other people are doing

New cards
99

What is authority?

We comply when a request comes from someone with authority

New cards
100

What is scarcity?

When something is scarce, we’re more likely to act

New cards

Explore top notes

note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 64 people
Updated ... ago
4.8 Stars(4)
note Note
studied byStudied by 27984 people
Updated ... ago
4.8 Stars(282)

Explore top flashcards

flashcards Flashcard72 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard69 terms
studied byStudied by 45 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard53 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard106 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard42 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard63 terms
studied byStudied by 312 people
Updated ... ago
4.5 Stars(4)