COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Al applications lace threats from cybersecurity attacks, but Al may also be used as a tool for ____ and ____ against attacks.
A
Detecting & Defending
B
Detecting & Rectifying
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -AI-powered malware: Malware that uses AI has been taught to think for itself, adapt its course of action in response to the situation, and particularly target its victims’ systems. Malicious software that uses AI to avoid detection and adapt to changing environments, makes defense more difficult.

Detailed explanation-2: -Bots are a growing threat in cybersecurity, used for malicious activities like spreading malware and stealing data. AI can recognize and block bots by identifying their patterns, creating more secure captchas, and deploying honeypots to trap them.

Detailed explanation-3: -Predictive models mean AI can highlight potential weak spots in security. By learning what is “model behavior, ‘’ this type of software can quickly and efficiently spot anomalies-picking up on phishing scams and malware, for example.

There is 1 question to complete.