Ans:- Internet of Things
Ans:- Examining large datasets to uncover trends, patterns and insights
Ans:- A simulated experience using a head-mounted display
Ans:- A distributed ledger technology for secure transactions.
Ans:- Automating repetitive tasks using software robots
Ans:- Additive manufacturing that builds objects layer by layer
Ans:- Skills needed to work with emerging technologies like AI, IoT, Data Science etc.
Ans:- To prevent unauthorized access, data theft, and damage.
Ans:- Converting data into code to prevent unauthorized access
Ans:- A security method requiring two separate verification steps
Ans:- Malicious software designed to harm or exploit devices
Ans:- A program that can replicate itself and infect systems
Ans:- Fraudulent attempts to obtain sensitive information via pretend communications.
Ans:- Malware that encrypts user data and demands payment to restore it
Ans:- Software that secretly monitors user behavior
Ans:- Malware disguised as legitimate software
Ans:- A self-replicating malware that spreads across networks
Ans:- Updating software to fix vulnerabilities
Ans:- Policies and technologies to manage who has access to what in systems
Ans:- Verifying identity using physical traits like fingerprints or face
Ans:- Electronic signature that verifies origin and integrity of digital content.
Ans:- Virtual Private Network
Ans:- To create a secure, private network over a public Internet connection
Ans:- Encrypts data transmitted over the Internet
Ans:- An attempt to damage or gain unauthorized access to computer systems.
Ans:- When confidential or protected data is accessed or disclosed without authorization.
Ans:- Authorized practice of probing for vulnerabilities to improve system security.
Ans:- Manipulative techniques to trick people into giving confidential info
Ans:- A chain of blocks, each containing transaction records, secured cryptographically.
Ans:- Kevin Ashton
Ans:- Overlaying digital content on the real world
Ans:- Virtual Reality
Ans:- Customer Relationship Management
Ans:- Ensuring data is accessible only to authorized persons
Ans:- Ensuring data remains accurate and unaltered
Ans:- Ensuring systems and data are accessible when needed
Ans:- Keeping data on remote servers accessed via the Internet.
Ans:- A key used for encrypting data in asymmetric cryptography.
Ans:- A key kept secret for decrypting data in asymmetric cryptography.
Ans:- Extremely large datasets that require special tools to analyze.
Ans:- Technology designing and using robots
Ans:- Additive manufacturing
Ans:- Factories using automation and IoT to operate with minimal human intervention.
Ans:- Device that detects physical input and sends data to IoT network
Ans:- Processing data near its source rather than in central cloud servers.
Ans:- Type of AI where systems learn from data to improve over time.
Ans:- Using machines or software to perform tasks without human intervention
Ans:- Virtual replica of physical objects or systems
Ans:- Software as a Service.
Ans:- Platform as a Service
Ans:- Infrastructure as a Service
Ans:- Using AI/ML tools to enhance data analysis
Ans:- Technology that creates a more engaging experience (like VR or AR)
Ans:- Advanced computing using quantum-bits; still emerging.
Ans:- Intrusion Detection System
Ans:- To detect malicious or suspicious activity on networks
Ans:- Distributed Denial of Service; flooding a service with traffic.
Ans:- Network of compromised devices used to launch attacks
Ans:- Using strong, unique, and regularly updated passwords
Ans:- Requiring more than one type of authentication to grant access.
Ans:- Keeping copies of data so it can be recovered if lost
Ans:- Fake communications designed to trick users into revealing sensitive info.
Ans:- Code injection attack targeting databases via user inputs
Ans:- Security flaws unknown to the vendor, exploited before patch.
Ans:- Right of individuals to control their personal data
Ans:- General Data Protection Regulation (EU law about data privacy)
Ans:- Practices that improve digital security like updates, safe browsing etc.
Ans:- Building applications with security built in from the start
Ans:- Software that detects, blocks, or removes malware.
Ans:- A network with controls to protect data and prevent unauthorized access.
Ans:- Process of applying updates and patches to software.
Ans:- System that actively blocks intrusions in real time
Ans:- Ethical hacker who tests systems for vulnerabilities
Ans:- Malicious hacker who exploits systems illegally
Ans:- Hacker that falls somewhere between ethical and malicious motives.
Ans:- A subfield of AI using neural networks with many layers.
Ans:- Using software to automatically spot malicious behavior.
Ans:- A boot process that verifies integrity before loading OS
Ans:- Running programs in isolated environment to avoid affecting others.
Ans:- Simulated cyber-attacks to find vulnerabilities
Ans:- Guidelines to ensure AI is used fairly and safely
Ans:- Requirements to store data within a certain country.
Ans:- Measures protecting mobile devices from threats
Ans:- Regular updates to fix bugs and security holes.
Ans:- Using safe protocols, avoiding unsafe websites
Ans:- Protecting connected devices from being hacked
Ans:- Ability to use digital tools and understand digital technology.
Ans:- AI designed and used with consideration to fairness, transparency, and privacy.
Ans:- Analytics enhanced by machine learning.
Ans:- Synthetic media created using AI to misrepresent reality.
Ans:- Ability to continue operations despite cyber attacks.
Ans:- Security model that assumes no trust by default, verifies every access.
Ans:- Encryption using principles of quantum mechanics (emerging tech)
Ans:- Certificate proving skills in legal hacking for security.
Ans:- Issuing verification or credentials in digital form.
Ans:- Online learning platform for emerging tech & cybersecurity skills.