When a threat sends fraudulent emails pretending to represent a legitimate organization with the intent of gathering confidential data, this is known as ____________.
Blog
An attacker uses a large collection of known potential passw…
An attacker uses a large collection of known potential passwords from a variety of sources in an attempt to guess weak and commonly used passwords. This password cracking technique is known as a ____________ attack.
An area of AI research that attempts to replicate the way hu…
An area of AI research that attempts to replicate the way humans interact with the physical world through locomotion, sensing, and manipulation.
Carla is looking at her budget and decides the company needs…
Carla is looking at her budget and decides the company needs to lower labor costs. Which job is most likely to be replaced by an automated, artificially intelligent system?
____________ involves designing systems that can operate wit…
____________ involves designing systems that can operate without significant human intervention.
A criminal hacker has targeted a local law firm hoping to st…
A criminal hacker has targeted a local law firm hoping to steal client names, addresses, dates of birth, social security numbers, and bank account numbers. In this case, the hacker is looking for ____________.
Breaking into computers, servers, or networks to access conf…
Breaking into computers, servers, or networks to access confidential data is commonly referred to as ________.
An area of AI research that attempts to simulate the ability…
An area of AI research that attempts to simulate the ability to understand human speech.
____________ is defined as the process of creating and maint…
____________ is defined as the process of creating and maintaining information systems.
A disgruntled employee at DSA Company used their legitimate…
A disgruntled employee at DSA Company used their legitimate credentials to steal data from a client’s database and publish it online. This incident is an example of ____________.