What is the purpose of a “Red Team” in the context of AI development?
How do you categorize algorithms which are trained by provid…
How do you categorize algorithms which are trained by providing explicit examples of results sought?
What are tools that put users in control so that they can cr…
What are tools that put users in control so that they can create custom reports on a as-needed basis by selecting fields, ranges, summary conditions and other parameters?
What term does our textbook apply to a protester seeking to…
What term does our textbook apply to a protester seeking to make a political point by leveraging technology tools, often though system infiltration, defacement, or damage?
What is the term for the physical threat of gaining compromi…
What is the term for the physical threat of gaining compromising information through observation?
What term does our textbook apply to a con (or scam) execute…
What term does our textbook apply to a con (or scam) executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software?
What are small pieces of code that are accessible via the ap…
What are small pieces of code that are accessible via the application server, and permit interoperable machine-to-machine interaction over a network?
What are attacks so new that they haven’t been clearly ident…
What are attacks so new that they haven’t been clearly identified, and haven’t made it into security screening systems?
What is the term our textbook uses referring to an online co…
What is the term our textbook uses referring to an online community that allows users to establish a personal profile and communicate with others?
What does our textbook provide as an example of a software p…
What does our textbook provide as an example of a software program that makes requests of the server program?