• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.712 ■ Summer 2022 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts

Weekly Question: 8

Zac Bloom - June 19, 2022 Leave a Comment

Threat modeling is a way IT professionals can possibly identify potential security threats and vulnerabilities and judge the severity of them. Threat modeling can also identify ways to best deal with the identified issue. One piece of legislation directed at data privacy is the California Consumer Privacy Act. A few pieces of legislation designed to regulate cybersecurity are the Health Insurance Portability and Accountability Act, the Gram-Leach-Bliley Act, and the Federal Information Security Management Act. Ransomware is a type of software that is used to hold the data of victims hostage and force the organization to pay to have their data released. Hospitals are often victims of ransomware attacks due to the fact that their data is so personal and time sensitive that often times they have no choice but to pay the ransom. One of the best ways to protect yourself online is using two-factor authentication for your passwords to make it much more difficult for your accounts to be attacked. One of the three types of AI is Narrow, which is the AI we have available today that is not smarter than a human. Another type of AI is General AI which we do not possess that is equal to human intelligence. The final type of AI is Superintelligence, which is smarter than that of human beings.  Alan Turning is the father of computers ever since he built one to break the enigma code during WWII. The Turing test is a test used to determine whether or not you are talking to a computer or a person. 

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS

Week 12 Questions

Loops tell the computer to run a function repeatedly. They are useful if … [More...] about Week 12 Questions

Weekly Questions: 13

When it comes to adding the structure to a web page HTML is used. When it … [More...] about Weekly Questions: 13

Week 11 Questions

The purpose of the if/else code in JavaScript is to execute a block of code … [More...] about Week 11 Questions

Weekly Questions: 12

Loops are a sequence of instructions that is repeated until a certain … [More...] about Weekly Questions: 12

Week 10 Questions

A function in JavaScript is a set of instructions that performs a task or … [More...] about Week 10 Questions

Week 9 Questions

A variable in JavaScript is the name of a storage location for data. For … [More...] about Week 9 Questions

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Virtual Office Hour Availability: Tue, 10 - 11:00 AM, or by appointment. Please email me to schedule an appointment outside of my normal office hours.
Virtual Office: https://temple.zoom.us/j/94115790056

ITA CONTACT INFO

ITA
Name: Anna Boykis
Email: anna.boykis@temple.edu
ITA
Name: Jessica Rakhman
Email: jessica.rakhman@temple.edu

Helpful Links

FOX Laptop Policy
FOX Laptop Support

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University