• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.712 ■ Summer 2022 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts

Week 8 Questions

Taylore Brownewell - June 19, 2022 2 Comments

What Is Threat Modeling? Definition, Process, Examples, and Best Practices  | Toolbox It-security

Threat modeling is a process where possible threats, such as weak passwords or the absence of appropriate safeguards, can be identified and suggestions can be made. Ransomware is the denial of a user or organization’s access to files on their computer until a ransom is paid. Hospitals are often targets because they need their data to treat patients immediately in emergent situations. 

Some methods to protect yourself online is to look your accounts up in a data breach, and then to get two-factor authentication and/or a password manager.

What Are The 3 Types Of AI? | Deccan Herald

There are three kinds of artificial intelligence (AI.) Narrow AI, which is where we are today, is designed on task by task basis. General AI is a design where the technology will perform and “think” like a human. Super AI is where the technology goes beyond human intelligence and will be in its own control.

Links to images: https://www.toolbox.com/it-security/network-security/articles/what-is-threat-modeling-definition-process-examples-and-best-practices/

https://www.deccanherald.com/brandspot/pr-spot/what-are-the-3-types-of-ai-853275.html

Reader Interactions

Comments

  1. Grace Adams says

    June 19, 2022 at 10:55 pm

    Hi Taylore. I really like the second visual you provided. It’s really good as showing where we are now and where we can go. I wonder when we will reach super AI and what that will look like. I’m sure it will be helpful for some tasks, but I am a bit apprehensive when it comes to the idea of a robot that surpasses human intelligence.

    Log in to Reply
  2. Madison Gordon says

    June 19, 2022 at 11:42 pm

    Both of your images were so informative!! I like that you explained threat modeling a little bit because that was one thing I didn’t fully understand when we learned it, your post really helped.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS

Week 12 Questions

Loops tell the computer to run a function repeatedly. They are useful if … [More...] about Week 12 Questions

Weekly Questions: 13

When it comes to adding the structure to a web page HTML is used. When it … [More...] about Weekly Questions: 13

Week 11 Questions

The purpose of the if/else code in JavaScript is to execute a block of code … [More...] about Week 11 Questions

Weekly Questions: 12

Loops are a sequence of instructions that is repeated until a certain … [More...] about Weekly Questions: 12

Week 10 Questions

A function in JavaScript is a set of instructions that performs a task or … [More...] about Week 10 Questions

Week 9 Questions

A variable in JavaScript is the name of a storage location for data. For … [More...] about Week 9 Questions

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Virtual Office Hour Availability: Tue, 10 - 11:00 AM, or by appointment. Please email me to schedule an appointment outside of my normal office hours.
Virtual Office: https://temple.zoom.us/j/94115790056

ITA CONTACT INFO

ITA
Name: Anna Boykis
Email: anna.boykis@temple.edu
ITA
Name: Jessica Rakhman
Email: jessica.rakhman@temple.edu

Helpful Links

FOX Laptop Policy
FOX Laptop Support

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University

© PRO Community, procommunityplatform.com, U.S. Patent No. 11989679.