1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Consensus Mechanism
ensures all users that any block that is added to the chain is legitimate, without having to place their trust in an outside entity, such as a bank or governing body.
Proof of stake
if you’d like to add a block, you need to put your coins up as collateral. The disadvantage is that this system requires wealthy investors to create a strong initial stake.
Solana
Store of value (alternative currency), and also to create smart contracts and decentralized applications (dApps)
The universalist principle
a manager must attempt to determine if this decision is fair for all involved.
The utilitarian principle
when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.
Intellectual property consists of four categories
Patents, Trademarks, Copyrights, and Trade secrets
Cognitive computing
the use of computer models that are designed to simulate human thought processes.
unsupervised learning
machine learning algorithms are used to examine and cluster unlabeled data sets.
Clustering -used in data mining that groups unlabeled data based on parallels and variances within the data set.
Neural Networks
use interconnected notes or neurons in a layered structure that resembles the brain
Generative adversarial networks (GANs)
a type of machine learning model that uses two neural networks that compete against each other.
generative network
Part of a GAN, used to create new synthetic instances of data that are erroneously identified as real data.
discriminative network
Part of a GAN, tests and identifies which data it receives has been synthetically created.
Deep Learning
uses neural networks, solves complex problems (ex. Reviewing MRI scans)
What causes data to be biased
Cognitive bias (conscious or unconscious data) or Incomplete data
Trojan horse
appears legitimate, but executes unwanted activity when activated. Similar to viruses but don’t replicate themselves and are often found in free downloads
Integrity
covers the methods used for confirming data are authentic. Tools include: data backup, CheckSums, data correction codes and availability of information
Availability
Maintains data and system accessibility through hardware upkeep, prompt repairs, a stable computing environment, upgrades, and sufficient communication bandwidth
Planning Stage
assesses current security measures & threat analysis
Protect stage
implement safeguards
Respond stage
contain the damage that results from a cybersecurity incident. (ensuring correct procedures are in place, communication with shareholders is immediate, analyzing the incident, etc.)
Computer Fraud and Abuse Act (CFAA)
prohibits unauthorized access to a computer, especially one used in commerce, intentionally damaging a computer, and transmitting threats of extortion.
Electronic Communications Protection Act (ECPA)
Protects communications in storage and transit.
Stored Communications Act (Title II of the ECPA)
makes intentional unauthorized access of electronic communication systems (such as email) illegal.
National Institute of Standards Technology (NIST) Cybersecurity Framework
designed to assist organizations in the development of cybersecurity policies and procedures to protect against cyber threats and intrusions.
Identify (ID) function
meant to encourage organizations to develop a better understanding of how to manage cybersecurity risks that comprise their IT infrastructure
Protect (PR) framework function
It is a construct for cybersecurity analysts and teams to develop and implement appropriate safeguards to ensure delivery of critical infrastructure services.
Detect (DE) framework function
detecting the type of suspicious activity that could lead to an infection or attack and identifying a threat or breach in a timely manner
Respond (RS) framework function
establishes the necessary procedures that enable stakeholders to take action regarding a detected cybersecurity event.
Recover (RC) framework function
An organization’s ability to develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.