A security practice that helps protect against phishing attacks by ensuring that users don’t reuse the same password across multiple accounts.
What is using unique, strong passwords and enabling multi-factor authentication (MFA)?
This technology uses artificial intelligence to create convincing fake videos or audio recordings of individuals.
What is deepfake technology?
A security breach that impacts operations, damages physical property or environment.
What is a cyber physical attack?
A branch of computer science that aims to create machines capable of mimicking human intelligence.
What is AI?
This term refers to a vulnerability in software that is unknown to those who should be interested in its mitigation.
What is a zero-day vulnerability?
A term describes a piece of self-replicating malware that travels through a network without the need for human interaction.
What is a worm?
Deepfake technology can be used for these two malicious purposes, including impersonation and spreading this.
What are impersonation and disinformation?
Attackers breach secure military facilities, install malware, or steal sensitive equipment.
How can a physical cyber attack affect a military entity?
The network of physical devices, vehicles, appliances, and other items embedded with sensors, software, and other technologies that can connect and exchange data with other devices and systems over the internet.
What is IoT?
This attack in 2014 targeted a major entertainment company, resulting in the shutdown of its network and the leak of unreleased movies and confidential data.
What is the Sony Pictures attack?
Situation that involves creating a fabricated scenario to manipulate someone into divulging information.
What is pretexting?
To combat deepfake threats, one countermeasure involves the development of these tools that analyze media content for inconsistencies.
What are deepfake detection tools?
A common attack against a country during a presidential election.
What is Voting machine systems and Databases?
What is reshaping industries, from healthcare to transportation to finance, by offering more innovative solutions, predictive capabilities, and enhanced user experiences?
What is AIoT?
This AI-powered attack tool, created by IBM researchers, hides its malicious intent until it infects a specific target, using indicators like facial recognition and geolocation.
What is DeepLocker?
What do we call a network of compromised devices controlled by a central command (often using AI algorithms)?
What is a “botnet”?
Educating users about the existence of deepfakes and the importance of this practice is a crucial countermeasure.
What is verifying sources?
A way AI be used to gain access to voter fund raising.
What is AI created voices?
IoT devices often have constrained computational resources due to their specific functions. This limitation leaves little room for robust _______ mechanisms.
What is security?
This institute, created by the Biden-Harris Administration in 2023, will focus on AI safety and trust, especially for advanced AI models like generative AI.
What is the U.S. Artificial Intelligence Safety Institute (USAISI)?
What term describes an AI system that intentionally misleads or manipulates its output to deceive humans or other AIs?
What is “adversarial AI”?
Policies to regulate the creation and dissemination of this type of media are a key countermeasure against deepfake threats.
What is synthetic media?
The most common liability that can cause a company to be sued.
What is Legal and Regulatory Compliance?
Implementing robust IoT security protocols, including encryption, authentication mechanisms, and continuous monitoring to detect and mitigate vulnerabilities before they are exploited.
What is a countermeasure for IoT?
In 2017, a massive zero-day vulnerability in this Windows protocol led to the WannaCry ransomware attack.
What is the Server Message Block (SMB) protocol?