Artificial Intelligence (AI) Fundamentals - Introduction to IT PDF

Summary

This document provides a comprehensive introduction to artificial intelligence (AI). It covers the different types of AI, from narrow to super AI, exploring their capabilities and limitations. A history of AI is also included alongside relevant applications.

Full Transcript

Artificial Intelligence Outline What is AI? Types of Intelligence History of AI Data Science & Data Analytics Machine Learning & Deep Learning Fields of AI AI Applications 2 AI vs Automation  Automation is a bunch of...

Artificial Intelligence Outline What is AI? Types of Intelligence History of AI Data Science & Data Analytics Machine Learning & Deep Learning Fields of AI AI Applications 2 AI vs Automation  Automation is a bunch of machines doing a repetitive task without human intervention.  AI is simulation of intelligent behavior in computers, in contrast to the natural intelligence displayed by humans. Focuses on the ability of the machine to make selections and decisions based on different factors. AI helps improve the automation process by learning and improving itself.  to achieve human-level performance in all cognitive tasks 3 Artificial Intelligence (AI) Artificial Intelligence can be classified into 3 different types:  Narrow Artificial Intelligence  General Artificial Intelligence  Super Artificial Intelligence 4 Narrow Artificial Intelligence Narrow AI is the only form of AI that humanity has achieved so far. Narrow AI is good at performing a single task within a limited context/field. Examples:  Playing chess  Making purchase suggestions  Google’s translation engine Self-driving car technology is still a coordination of several narrow AIs. 5 General Artificial Intelligence General AI (human-level AI or strong AI) entails understanding and reasoning its environment as a human would:  How you perceive things  Juggle between multiple unrelated thoughts  Making use of memories when making a decision. Humans might not be able to process data as fast as computers but they can solve problems without going into the details. It’s very hard to teach a computer to invent something that isn’t there. 6 Super Artificial Intelligence When AI becomes much smarter than the best human brains in practically every field, including scientific creativity, general wisdom and social skills. Some views of scientists:  Stephen Hawking sees the development of full artificial intelligence as the potential end of humanity.  British AI researcher Demis Hassabis, believes the smarter AI gets, the better humans will become at saving the environment, curing diseases, explore the universe, etc. 7 The Turing Test You enter a room which has a computer terminal. You have a fixed period of time to type what you want into the terminal, and study the replies. At the other end of the line is either a human being or a computer system. If it is a computer system, and at the end of the period you cannot reliably determine whether it is a system or a human, then the system is deemed to be intelligent. 8 AI History 1950: The Turing Test (Imitation Game) by Alan Turing 1955: John McCarthy first coined the term Artificial Intelligence. 1956 – 1974: The golden years  Game Playing: Chess, Checkers  Machine Translation 9 AI History 1974-1979: AI Winter  AI was subject to critiques and financial setbacks, funding for AI disappeared  Limited Computer Power 1980: AI boom – Expert Systems to solve domain-specific problems 1997: Deep Blue (IBM) beats Garry Kasparov (world chess champion) 2012: Deep Learning Revolution 10 Subfields of AI 11 Machine Learning vs. Deep Learning 12 13 MACHINE LEARNING DEEP LEARNING A subset of AI, which is a A subset of Machine study of algorithms and Learning which learn from models to perform a task large amounts of data using without explicit Neural Networks. instructions. Example: Tossing Bot (Princeton) Example: Detect spam emails. 14 Visual AI: Recognition & Vision Pattern Recognition: Predicting patterns with a high amount of accuracy Computer Vision: Interpret information from images/videos Examples:  Facial Recognition: Face ID  Natural Language Processing: Siri, Cortana, Alexa (Voice Recognition – communicate with humans)  Text Recognition: detect fake news by analyzing and comparing texts. Can be used to write fake news as well.  Fraud Detection AI: used by banks to detect fake bills  Fingerprint Detection 15 Data Science & Analytics Uses scientific algorithms and tools to extract knowledge and insights from structured and unstructured data 1. Knowledge representation 2. Automated Reasoning Decision Making: Accurate and efficient analysis of a large amount of data. Replace consultants used to make decisions. Helps business companies predict future trends and outcomes. 16 Recommendation Systems These AI systems are tailored to personal use: They see what you like online Learn about you Learn from others as well Examples:  Product recommenders i.e. Amazon  Content recommenders for social media platforms i.e. Facebook and Instagram  Playlist generators for video and music services like Netflix, YouTube 17 AI in Medicine The most popular: perform accurate diagnosis. AI can be trained on multiple images of cancer and then once it has been sufficiently trained, it can diagnose whether patients have cancer or not. (Supervised learning) Robotics in AI: used to assist doctors in surgical procedures: Da Vinci Robot Surgery Program: Cleveland Abu Dhabi 18 AI application: Vera Robot Vera is being used by employers to recruit humans Here’s how it works:  Vera is connected to different job sites  Recruiters create a detailed job description and interview questions  Vera scours online resumes and cover letters to find qualified candidates  Vera then calls applicants  It uses speech recognition to ask and answer questions about the position 19 Autonomous Cars Combination of AI techniques:  Search and planning to find the most convenient route from A to B  Computer vision to identify obstacles  Decision making under uncertainty to cope with the complex and dynamic environment. Self-driving cars (Testing Phase)  Cars communicate with each other to prevent collisions.  Accurately deliver the passengers to their locations. 20 Gaming: AI agents Determine the behavior of non-player characters in games Example: In the game, Alien: Isolation: The enemy alien has 2 AI engines controlling it:  The first AI tells the alien where the player is, so it always knows where you are.  The second AI gives the alien hints as to how to get to you. The Alien learns how you play and adapts its behavior to anticipate you. 21 Smart Homes A combination of AI technologies will make this possible for ease and security. 22 UAE: AI robot to clean ocean Solar powered robot used to detect and track waste in the marine environment. – Navigate autonomously – Avoid obstacles 23 Graphics, Digital Media and Multimedia Chapter 6 Multimedia Part 1 Topics Computer Graphics Image Processing Computer vision 3D modeling Computer Aided Design (CAD) Computer Aided Manufacturing (CAM) Presentation Graphics Animation Video 25 Computer Graphics  Representation of image data by a computer, specifically with help from specialized :  Hardware: Graphics Cards, Cameras, Motion sensors, etc  Software: Adobe Photoshop, Unity, Blender, etc 26 Graphics Terminology Pixels:  Smallest element in an image.  Square shape. Image Dimensions:  Is measured by the Width x Height of a digital image  E.g. 1920 x 1080 (Full High Definition) 27 Graphic Types Bitmap Graphics (Raster graphics)  Array of pixels  Painting pixels on the screen with a pointing device like mouse, stylus, etc.  Capturing an image with a digital camera. Vector Graphics (Object Oriented Graphics)  Pointer movements translated into lines and patterns on screen using mathematical formulas 28 Bitmap/Raster Graphics Is a rectangular grid of pixels, with each pixel's color being specified by a number of bits  File Formats: JPG, BMP, PNG, GIF Painting Software's:  MS Paint, Adobe Photoshop, GIMP, etc… Factors determining image quality:  Color Depth  Resolution 29 Color Depth Color depth or bit depth:  Is the number of bits devoted to each pixel Simple bit mapped (monochrome)  Each pixel represented by 1 bit.  Can be 0 or 1  Black or White Calculate the file size of a simple bitmap image with dimensions 250 x 200  Total Number of pixels in the image = 250 * 200 = 50,000 pixels  File size = 50,000 pixels * 1 bit/pixel = 50,000 bits  I byte = 8 bits 30 Color Depth Gray-scale graphics  Uses 8 bits per pixel  E.g. Allows up to 256 different shades of gray Calculate the file size of a gray-scale image with dimensions 250 x 200  Total Number of pixels in the image = 250 * 200 = 50,000 pixels  File size = 50,000 pixels * 8 bit/pixel = 400,000 bits ~ 50,000 bytes 31 Color Depth Colored Graphics  Modern PCs uses 24-bit (True Color) to display millions of colors at a time; photorealistic color.  E.g. RGB: (Red, Green, Blue) Calculate the file size of a 24-bit colored image with dimensions 250 x 200 32 Resolution Is a measurement of the pixel density of an image.  Usually measured in pixels per inch ppi or dots per inch dpi. 33 Object Oriented Graphics (Vector graphics) Vector-based graphics are scalable graphics that are built using mathematical formulas. The advantage of vector-based graphics is that they can be resized without losing image quality. Drawing Software's: Adobe Illustrator or Inkscape  File Format: SVG – scalable vector graphic 34 Bitmap Vs Vector Bitmap Vector (Obj Oriented) Stores as objects Stores as dots More memory Less memory Texture, shading and finer Lines cleaner, Shapes details smoother Good for Paintings/ Good for graphs/ charts, Photographs Logos, Drawings , 3-D graphics 35 Image Processing Filtering and cleaning  Eliminate red eye and facial blemishes Far more powerful than photo retouching  Can distort and combine photos as in tabloids  Can create fabricated images (which look real) 36 Image Processing Medical field help doctors clean x-ray images Images from Moon and Mars missions are analyzed for detecting presence of any life- sustaining resources, and other natural resources. Natural Language Processing  Cleaning Captcha Phrases 37 Computer vision A field that includes methods for acquiring, processing, analyzing, and understanding images Some of the research areas in computer vision :  Object detection  Tracking  Action recognition  Facial Recognition 38 Object Detection Tracking 39 Action Recognition YouTube Link Facial Recognition Snapchat Filters 40 3D modeling Software Is the process of developing a mathematical representation of any surface of an object in three dimensions via specialized software. Ability to rotate it and view from different angles Can create walk through 3D environment that exists only in memory Software Tools:  Blender, 3D Max, AutoCad, Sweet Home 3D, Unity (game engine) Dorms Nightmare GamePlay; Game Created By Walid Abu Ali& Hamad Mubarak 3D Animation Showreel, By Walid Abu Ali - BS IT Multimedia 41 3D modeling Animation Movies 42 3D modeling The Hobbit movie motion capture (YouTube) 3D home design 43 CAD- Computer Aided Design CAD is the use of computer systems to assist in the creation, modification, analysis, or optimization of a design. Cheaper and faster than design-by-hand Example:  Architects build virtual plans  Engineers design bridges as well electric schematics  Design computer chips: PCB (Printed Circuit Boards)  Test product prototypes  Medical engineers develop implants and human body models 44 CAM- Computer Aided Manufacturing CAM is the use of software to control machine tools to help manufacture products. Translates the design of a product created on computer with CAD tools, into manufacturing instructions for machine tools. 45 CIM- Computer Integrated Manufacturing Combination of CAD/CAM  Is the manufacturing approach of using computers to control the entire production process. Major step towards fully automated factory  Increased productivity  Enhanced flexibility  Improved quality 46 Presentation Graphics Used for Lectures, Sales demos, seminars etc. Slide shows on screens + projectors Includes images, animation and video clips Don’t condense your slide with too much text Choose correct design theme colours Example:  MS PowerPoint  Prezi 47 Multimedia Computer information can be represented through audio, video, and animation in addition to traditional media (i.e., text, graphics/drawings, images). 48 Animation Pictures are manipulated to appear as moving images. The effect is achieved by a rapid succession of sequential images that minimally differ from each other. A frame is one of the many still images which compose the complete moving picture Frame Rate:  Is the frequency (rate) at which consecutive images called frames appear on a display.  Usually ( > 24 frames/sec  standard 30) A 20 second 30fps animation, how many frames? 49 Computer Animation Used in television and movies to create effects that would be difficult to achieve without computers Most animations are made with computer- generated imagery (CGI) Tweening: Process of generating intermediate frames between two key frames(images), to give the appearance that the first image evolves smoothly into the second image 50 Video Digital video is a series of bitmap images that, when played back, create the illusion of movement. The quality and overall file size of digital video is determined by its: 1. Frame size: Width x Height. E.g. High-definition (HD) video – 1280 x720 2. Bit depth 3. Frames per second (fps) 51 Chapter 8 Networking and Digital Communication Part 1 Topics Networking Fundamentals Network Types Network Components Networking Software Protocols Connection Types Wireless communication 53 Network Fundamentals A computer network is any system of two or more computers that are linked together.  Each computer or networked peripherals on the network is called a Node Three essential components of every computer network system:  Hardware  Software  People 54 Network Types 55 Network Types PAN (Personal Area Network)  A network used for communication between devices close to one person.  E.g. Connecting a headphone to Smartphones and tablets using wireless technologies such as Bluetooth and Wi-Fi LAN (Local Area Network)  Is a network where computers are physically close to each other.  E.g. Computer lab or Home 56 Network. Network Types MAN (Metropolitan Area Network)  Is a large network designed to provide a specific geographical area such as an entire city. WAN (Wide Area Network)  Extends over a large physical distance  The internet is the largest WAN  Each LAN site is a node on WAN 57 Bandwidth (Network Speed) Quantity of data transmitted per sec  Measured in Kilobits/sec, Mbps or Gbps Bandwidth depends on:  Transmission media: copper wire or fiber optic  1 fiber optic cable can replace 10,000 copper telephone cables  Amount of traffic on the network Measure your internet speed at home  E.g. http://www.speedtest.net/ 58 Networking Components Network Interface Card:  For each node on a network to communicate with other nodes. 59 Networking Components Routers  Hardware devices or Software programs that route messages as they travel between networks  They are used to connect two or more networks together 60 Networking Components: Switches/Hubs Allow any node on the network to communicate with any other node HUB SWITCH modem temporary 61 Networking Models Client/server model:  One or more computers act as dedicated servers, and all the remaining computers act as clients. Peer-to-peer model:  Every computer on the network is both client and server 62 Networking Software NOS (Network Operating System):  It is a system that is available on servers and handles communication and requests from multiple clients. Communication Protocols:  Is a system of rules that allow two or more entities of a communications system to transmit information.  Same protocol is required for data exchange  E.g. If one machine is “talking” at 200Kbps and the other is “listening” at 100Kbps , the message doesn’t get through 63 How does the internet work TCP/IP  The most famous protocol for computer networking  It controls the exchange of data between computers on the Internet  Example Protocols: HTTP, FTP, DHCP, DNS, etc… Information transmitted over the internet is broken into smaller pieces called packets.  E.g. An e-mail message or an image is broken into parts of a certain size 64 Making Connections Modem Connection (Dialup sound)  Transmission through Telephone lines  Conversion at both ends  Speed: up to 56.6 Kbps 65 Making Connections Broadband Connection  Greater bandwidth than modems Types  DSL: (digital subscriber line) Uses standard Tel. Lines  Cable modems: Uses fast TV cables  Satellite connection: Uses TV dishes  Optical Fiber: Sea cables 66 Wireless Networks Is a computer network that uses wireless data connections between network nodes. Examples include:  Wireless Local Area Networks  Cell Phone/Mobile Networks  Wireless Sensor Networks Wireless Technology Standards:  Wi-Fi  Wi-Max  Infrared  Bluetooth  3G, 4G, 5G 67 Wireless Connections Wi-Fi  Fastest growing Wireless technology IEEE 802.11 standard  Uses radio waves to link computers to Wireless Access Point (WAP)  Allows Peer to peer communication Is affected generally by:  Objects blocking the signals  Antenna placement  Other wireless devices in the same air space List of Standards Generatio IEEE & Bandwidths Maximum n Standard Bandwidth Wi‑Fi 6 802.11ax 600–9608 Mbit/s Wi‑Fi 5 802.11ac 433–6933 Mbit/s 68 Wireless Connections Wi-Max  Is a family of wireless broadband communication standards based on the IEEE 802.16 set of standards  New radio-based technology  A single tower can provide access to 25 square mile area 69 Wireless Connections Bluetooth:  is a wireless technology standard for exchanging data between fixed and mobile devices over short distances Designed to quickly and automatically connect devices like printers, PDAs, Cameras, etc… to computers and to each other and communicates regardless of OS. Bluetooth uses low power, low cost transmitters and receivers with a range of 10-100 meters. Wearable computing 70 Mobile Phone Networks 71 Mobile Phone Networks Tethering:  Cabling a laptop to a mobile phone to get internet connection. Mobile Hotspot:  Tethering done over Wi-Fi, where the internet- connected mobile device is acting as a portable Wireless Access Point (WAP) 72 Securing Wireless Networks Packets of information on a wireless network are broadcast through airwaves. Anyone with sufficient technical expertise can intercept these signals and decode your messages. Measures to help secure your communication:  Setup a password for your wireless network  Use encryption and wireless security protocols WEP: Wired Equivalent Privacy (Lowest protection) WPA: Wi-Fi Protected Access (Compatible with more devices) WPA2: Wi-Fi Protected Access Version 2 (Most Secure) 73 Chapter 8 Networking and Digital Communication Part 2 Topics Network Advantages Specialized Networks Interpersonal Computing  Emails  Blogs  Social Networking  Community collaboration  Online Gaming Online Survival Tips 75 Network Advantages Networks enable people to:  Share computer hardware resources  Print servers accept, prioritize, and process print jobs  Share data and software programs  Site licenses reduce costs for multiple copies of software  Work, play, and communicate together  Groupware enables several users to work on the same document at the same time. 76 77 Internet of Things IoT Video Link IoT emerged due to real-time analytics, machine learning, sensors, automation and embedded systems. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. Applications:  Smart Home  Smart Cities Challenges:  Security  Privacy  Massive amounts of Data 78 Specialized Networks Blockchain  A system in which a record of transactions are maintained across several computers that are linked in a peer-to-peer network. Transactions are verified by network nodes and recorded in a public ledger. Applications: Cryptocurrencies (Bitcoin, Ethereum, etc…) Is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions. 79 What happens on the internet in 60 seconds? 80 Interpersonal Computing Human-to-human digital communication  Users spend around 70% of connected time on the internet to communicate with other users.  Applications:  Emails  Chatting  Blogging  Video teleconferencing  Computer Telephony  Social Networking  Information Sharing 81 Online Communication Allows people to interact while being physically located at different places in the world Synchronous communication  Real time communication between all parties  Instant Messaging (IM), Audio Conferencing, and Video Conferencing Asynchronous communication  Poster and reader don’t have to be logged in simultaneously.  Examples : Emails, Newsgroup, Forums, etc  Text messaging: Uses SMS technology 82 Email Messages distributed by electronic means from one computer user to one or more recipients via a network. Email Server  Is a server that handles and delivers e-mail over a network, usually over the Internet. A mail server can receive e-mails from client computers and deliver them to other mail servers or client computers. Common Issues:  Spam: unwanted junk mail  Attachment sizes  Email size limitations 83 Audio Communication It enables two or more people to use the computer as a telephone conferencing system IP Telephony or Voice over IP (VoIP)  Use the Internet Protocols to exchange voice, fax, and other forms of information that have traditionally been carried over dedicated phone lines. Voice Mail:  Is a computer-based system that allows users and subscribers to exchange personal voice messages 84 Video Communication Video Teleconferencing:  Capability of simultaneous video and audio for communication between people in real-time. Benefits:  No need to travel  Saves time  Share resources and collaborate 85 Blogging Blogs (Web Log)  An ongoing online diary or commentary written by an individual.  Examples: Blogger, WordPress, etc… Micro blogs  Is the practice of posting small pieces of digital content— which could be text, pictures, links, short videos, or other media. Example: Twitter, Facebook, etc… Video Blog (Vlog)  Is a form of blog for which the medium is video, entries often combine embedded video (or a video link) with supporting text and images. 86 Social Network Revolution Is an online platform which people use to build social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections. 87 Social Networking Issues Pros Cons Easily accessible Privacy Inexpensive Information overload (Oversharing) Informed & connected Addicted at the expense of personal relationships How social Media is rewiring our brains? 88 Social Media Influencers Users on social media who has established credibility in a specific industry. A social media influencer has access to a large audience. They contribute content  YouTube Videos  Snapchat  Instagram  TikTok 89 Media Sharing Video sharing platforms:  YouTube, Vimeo, Dailymotion, etc.. Viral video:  Video that spreads through the process of internet sharing, in a short time period. Streaming:  Transmit or receive (data, especially video and audio material) over the Internet as a steady, continuous flow. Live Streaming  Online streaming media simultaneously recorded and broadcast in real time Podcasting:  Using the Internet to make digital recordings of broadcasts available for downloading to a computer or mobile device. 90 Community Collaboration Crowdsourcing: using the internet and the intelligence of the crowd to accomplish a task or solve a problem for the benefit of all. Different forms:  Crowdsolving: a collaborative, yet holistic way of solving a problem using many people  Crowdfunding: the collection of funds from the crowd to sponsor a project, e.g. Kickstarter, gofundme, indiegogo  Non commercial work, e.g. Anyone can contribute to it, Wikipedia 91 Online Gaming Primarily played through the Internet or another computer network Includes:  First Person shooter  Strategy Games  Massively Multiplayer Online Role-playing Games (MMORPGs) 92 Online Gaming Gaming Networks  PlayStation Network  Xbox Live  Nintendo Network Characteristics  Thousands of simultaneous players  Players take roles in the virtual worlds  Passionate addiction of the Players  Cooperation among group of players required 93 Sharing Resources Peer-to-Peer:  File sharing without posting on central server (music), e.g. torrents Grid Computing  Sharing processing power rather than data Cloud Computing  Resources come from the internet 94 Online Survival Tips Maximize work by system Don’t open suspicious links (phishing) Store Names in Address book Keep your system up to date Don’t share emails/ passwords Cross check online information Don’t display privacy matters Beware of fake stories circulating Don’t open suspicious mails Avoid information overload 95 Computer Security & Risks Chapter 11 Part 1 Outline Overview Computer Forensics Computer Theft Identity theft Malwares Virus/Worms DDoS Hacking 98 Overview Computer Security  The protection of computing systems and data from unauthorized access, change or destruction. Computers could be used for either:  Upholding laws  e.g Computer forensics, etc …  Breaking the laws  e.g Viruses, Identity theft, etc … 99 Computer Forensics Investigation of a variety of computer crimes.  Use special software to store and reference clues in complex cases  Trace digital fingerprints “deleted files” containing evidence 10 Computer Crime Cybercrime  Any crime using computers or networks  Billion of dollars are lost  Majority are conducted by company insiders  Insider crimes are covered up to avoid embarrassment 10 Computer Crime Cyberstalking  To repeatedly harm or harass people in a deliberate manner on the internet  To help yourself - limit how much personal info you share Cyber bullying  Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats.  Stop cyberbullying! 10 Cybercrime Intellectual Property Theft  Software Piracy  File sharing of copy righted songs  Illegal duplication and distribution of movies  Plagiarism of copy righted text 10 Cybercrime What is stolen?  Money  Goods  Information  Software Resources Getting sensitive data through:  Spoofing  Identity Theft  Phishing 10 Computer Theft Theft of computer itself  Laptops and Smartphones are often stolen  The software and information on the computer are more valuable than the hardware 10 Social Engineering Spoofing  Trick that target to extract secret information  E.g. Making a phone call and posing as an internet technician, to extract sensitive data especially passwords. Shoulder surfing  Is a type of social engineering technique used to obtain information by looking over the victim's shoulder.  E.g. Passwords and other confidential data 10 Social Engineering Phishing (fishing for sensitive info.)  Is the act of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication  Sending an email posing as a bank representative and asking to fill a fake bank web form.  Adults sites asking users to reveal credit card numbers to prove age 10 Facebook Phishing Example  URL: fuizuebooks/update/index4.php 10 Email/Whatsapp Phishing Example 10 Identity Theft  Extract personal information to commit a crime in another person identity  National ID  Driving License  Credit card number 11 Identity theft protection  Use separate credit card for online use  Use secure websites (https://)  Don’t disclose personal info on phone  Handle email with care  Copy your cards to get replacement in case stolen  Report Identity theft promptly 11 Software Sabotage Malicious Software  Malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems  Viruses  Worms  Trojan horses  Spyware  Ransomware 11 Viruses  Are attached to a file/program and spread when files are exchanged via email attachments or flash drives  When the virus program is opened/executed it:  Damages the Operating system  Destroys or steals data  Display annoying pop-up messages  Viruses maybe OS specific but newer types are cross- platform.  Macro viruses: attach themselves to documents containing macros, which are a set of commands to automate repetitive tasks.  e.g. MS Office files, Melissa virus (1999) 11 Worms  They are independent programs  Capable of reproducing themselves  Causes memory freezes  Spreads through the internet slowing it down Famous worm: Code Red (2001)  Didn’t attack PCs, it attacked internet servers running Microsoft Servers 11 Trojan Horse  Disguise themselves as useful programs or apps, but has hidden destructive program (viruses)  Often posted in shareware  Names sound like games or utilities  Act as a backdoor allowing the attacker to control your PC to delete/change/share data  E.g. time bomb – triggered by a date or time-related event 11 Spyware  Gets installed and collects information without user’s knowledge  Called Spybot or Tracking software  Slows down PC performance  Tracks  Keystrokes  Web sites visited  Screen displays 11 Ransomware  Malware that locks your computer and encrypts data in your hard drive.  Demands that you pay a ransom to unblock the files again. How do you get infected?  Open an infected email attachment or malicious link Attackers usually ask you to pay the ransom using digital currencies, such as Bitcoin because it is untraceable 11 Hacking and Electronic Trespassing Hackers  People who break into computer systems or networks unlawfully  Hackers can control computers or steal personal information to commit identity theft 11 Types of Hackers Black-Hat Hacker  Criminals develop new techniques to penetrate systems to gain illegal access or destroy information White Hat Hacker (Ethical Hacker)  Security experts developing new techniques to protect us.  For non-malicious reasons such as to expose/test the system weaknesses. 11 Hacking and Electronic Trespassing Zombie Computers  Internet connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the owners 12 Hacking and Electronic Trespassing Botnets  Group of software programs called bots  Run automatically on zombie computers  To perform malicious acts without knowledge of the owners 12 Hacking and Electronic Trespassing DDoS: Distributed Denial of Service  bombards servers and web sites with traffic that shuts them down  using thousands of zombie computers (botnets)  Authorized users cannot use their computer 12

Use Quizgecko on...
Browser
Browser