Cybersecurity and Smart Buildings futures Flashcards

1
Q

What characterizes a “man-in-the-middle” attack?

A

A “man-in-the-middle” (MITM) attack is a type of cybersecurity threat where a malicious actor intercepts and potentially alters communication between two parties without their knowledge.
1. Interception
2. Eavesdropping
3. Data manipulation
4. Impersonation
5. Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What characterizes a “denial of service” attack?

A

(DoS) attack is a type of cyber attack aimed at disrupting the normal functioning of a computer system, network, or service by overwhelming it with a flood of illegitimate requests or traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of personalization software?

A

The primary function of personalization software is to tailor and customize user experiences based on individual preferences, behavior, demographics, and other relevant data.
* User profiling
*Data analysis
* Content Recommendations
* Customized interface
* Dynamic content
etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between artificial general intelligence and narrow artificial
intelligence?

A

AGI aims to replicate human-level intelligence and perform a wide range of tasks across multiple domains, while ANI focuses on specific tasks or domains and lacks the general cognitive abilities of humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are typical uses of anomaly detection techniques in assisted-living houses?

A

anomaly detection techniques play a crucial role in assisted-living houses by providing continuous monitoring, early detection of abnormalities or emergencies, and timely intervention to ensure the safety, health, and well-being of residents.
* Fall detection
* Abnormal activity detection
* Sleep monitoring
* Emergency detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly