• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.712 ■ Summer 2022 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts

Question: 8

Ella Peltier - June 19, 2022 Leave a Comment

Threat modeling is one of the most important components of staying secure online. It is essentially the process of deciding what data you want to protect and who you’re trying to protect it from. It is figuring out what you are most worried about being hacked. To attempt to keep information secure online, the government has placed regulations involving data protection and cybersecurity. Some of these regulations include the California Consumer Privacy Act (CCPA), which is a regulation for privacy and personal data protection. Some more government cybersecurity regulations include: Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act which includes the Federal Information Security Management Act (FISMA). One way data can be breached is through ransomware. Ransomware is a type of malware from crypto-virology that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid, usually in Bitcoin. Hospitals are often a main target of ransomware because they provide critical care and rely on up-to-date information from patient records. Without quick access to their patients records such as drug histories, surgery directive and other information, patient care can get delayed, causing the hospital to likely pay the ransom rather than risk delays that could result in death and lawsuits. Although data breaches can sometimes be inevitable, there are ways you can protect yourself online. Some of these can include: Ad blockers, antivirus’s, avoiding dogs plug-ins, back-up files, disabling macros, firewalls, and VPN’s. Protecting yourself online is very important in ensuring your data and personal information is not leaked. In class, we downloaded the software 1Password, which is a password manager to help keep your data secure. It lets you know if your password is strong enough or if it needs to be changed. Aside from data security, another interesting relatively new form of technology is becoming increasingly popular, artificial intelligence. Artificial Intelligence (AI) is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment. The three main types of AI’s include narrow (ANI), general (AGI), and super intelligence (ASI). an ANI is one of the more commonly used AI’s, appearing in all computers. The most commonly used ANI’s is Siri in Apple products. AGI is the type of adaptable intellect found in humans, a flexible form of intelligence capable of learning how to carry out vastly different tasks, which can include anything from haircutting or reasoning about a wide variety of topics based on its accumulated experience. ASI is described as any intellect that greatly exceeds the cognitive performance of humans in virtually all domains of interest. Alan Turing is known as the father of AI and computer science. He was a cryptanalysis during WWII, and cracked the code that enabled the allies victory. He founded the Turing test, which is a method of inquiry in AI for determining whether or not a computer is capable of thinking like a human being. 

 

An AI professor explains: three concerns about granting citizenship to  robot SophiaRansomware 101: What Is Ransomware and How Can You Protect Your Business?

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS

Week 12 Questions

Loops tell the computer to run a function repeatedly. They are useful if … [More...] about Week 12 Questions

Weekly Questions: 13

When it comes to adding the structure to a web page HTML is used. When it … [More...] about Weekly Questions: 13

Week 11 Questions

The purpose of the if/else code in JavaScript is to execute a block of code … [More...] about Week 11 Questions

Weekly Questions: 12

Loops are a sequence of instructions that is repeated until a certain … [More...] about Weekly Questions: 12

Week 10 Questions

A function in JavaScript is a set of instructions that performs a task or … [More...] about Week 10 Questions

Week 9 Questions

A variable in JavaScript is the name of a storage location for data. For … [More...] about Week 9 Questions

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Virtual Office Hour Availability: Tue, 10 - 11:00 AM, or by appointment. Please email me to schedule an appointment outside of my normal office hours.
Virtual Office: https://temple.zoom.us/j/94115790056

ITA CONTACT INFO

ITA
Name: Anna Boykis
Email: anna.boykis@temple.edu
ITA
Name: Jessica Rakhman
Email: jessica.rakhman@temple.edu

Helpful Links

FOX Laptop Policy
FOX Laptop Support

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University