100% found this document useful (1 vote)
84 views18 pages

Assign ET

This document contains a summary of an employee's department and sections on discussing ethics in technology. It addresses: 1) The employee's name, ID number, and department. 2) How new technologies like big data, AI, and algorithms present challenges for ethics in fields like accounting. 3) Key ethical principles like avoiding harm, being honest, and respecting privacy that still apply as technologies advance.

Uploaded by

Dawit ashebr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
84 views18 pages

Assign ET

This document contains a summary of an employee's department and sections on discussing ethics in technology. It addresses: 1) The employee's name, ID number, and department. 2) How new technologies like big data, AI, and algorithms present challenges for ethics in fields like accounting. 3) Key ethical principles like avoiding harm, being honest, and respecting privacy that still apply as technologies advance.

Uploaded by

Dawit ashebr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

NAME abel wondwosen

ID 422/14
DEPARTMENT PHARMACY SECTION B

1. Describe and State Technology of Ethics.


 Ethics is particularly important for the accountancy profession, with a code for professional Ethics
based on five basic principles:-  Integrity

• Objectivity
• Competence and Due care
• Confidentiality
• Professional behavior.
 However, the emergence of new technologies raises some new challenges for the profession to
address.

2. What is the new Ethical question?

 The increasing use of big data, algorithmic decision-making, and artificial intelligence can enable
more consistent, evidence-based and accurate judgments or decisions, often more quickly and
efficiently.

Example
Outputs can be based on biased data, which could lead to discriminatory outcomes. Indeed, where
systems learn from real-world data, there is a significant risk that those systems simply recreate
the past and subsequently build in errors or systemic biases. Closely linked to discrimination is
personalization, and the impact of tailoring decisions very specifically to individuals, based on
preferences, activity and other feature.

3. Discuss and clarify the general Ethical principles?


1. Contribute to society and to human well-being, acknowledging that all people are stakeholders in
computing.

2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative works, and computing
artifacts.
1
6. Respect privacy.
7. Honor confidentiality

4. Write the difference and similarity of professional responsibilities and professional


leadership principles?

 Professional responsibilities
1. Strive to achieve high quality in both the processes and products of professional work.
2. Maintain high standards of professional competence, conduct, and ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.

6. Perform work only in areas of competence.


7. Foster public awareness and understanding of computing, related technologies, and their
consequences.

8. Access computing and communication resources only when authorized or when compelled by
the public good.

9. Design and implement systems that are robustly and usably secure
 Professional leadership principles
1. Ensure that the public good is the central concern during all professional computing work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by
members of the organization or group.

3. Manage personnel and resources to enhance the quality of working life.

4. Articulate, apply, and support policies and processes that reflect the principles of the Code.

5. Create opportunities for members of the organization or group to grow as professionals.


6. Use care when modifying or retiring systems. Interface changes, the removal of features, and
even software updates have an impact on the productivity of users and the quality of their

work.

7. Recognize and take special care of systems that become integrated into the infrastructure of
society.

2
5. Discuss and describe the following terms.

A. Digital privacy

 Digital Privacy is the protection of personally identifiable or business identifiable information


that is collected from respondents through information collection activities or from other
sources.

 It is a collective definition that encompasses three sub-related categories; information privacy,


communication privacy, and individual privacy It is often used in contexts that promote
advocacy on behalf of individual and consumer privacy rights in digital spheres, and is
typically used in opposition to the business practices of many
emarketers/businesses/companies to collect and use such information and data.

B. Information Privacy

 In the context of digital privacy, information privacy is the notion that individuals should have
the freedom, or right, to determine how their digital information, mainly that pertaining to
personally identifiable information, is collected and used.

 Every country has various laws that dictate how information may be collected and used by
companies. Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used.

C. Communication Privacy

 In the context of digital privacy, communication privacy is the notion that individuals should
have the freedom, or right, to communicate information digitally with the expectation that
their communications are secure; meaning that messages and communications will only be
accessible to the sender's original intended recipient.

 An example of this is a failure to read a company's privacy policy regarding communications


on their platform could lead one to assume their communication is protected when it is in fact
not.

 Additionally, companies frequently have been known to lack transparency in how they use
information, this can be both intentional and unintentional. Discussion of communication
privacy necessarily requires consideration of technological methods of protecting
information/communication in digital mediums, the effectiveness, and ineffectiveness of such
methods/systems, and the development/advancement of new and current technologies.

D. Individual Privacy
3
 In the context of digital privacy, individual privacy is the notion that individuals have a right
to exist freely on the internet, in that they can choose what types of information they are
exposed to, and more importantly that unwanted information should not interrupt them.

 An example of a digital breach of individual privacy would be an internet user receiving


unwanted ads and emails/spam, or a computer virus that forces the user to take actions they
otherwise wouldn't.

 In such cases the individual, during that moment, doesn't exist digitally without interruption
from unwanted information; thus, their individual privacy has been infringed upon.

6. Write Treats and challenges of the following. A.


Ethical and regulatory challenges

 With Technology moving at a fast pace it is always been a challenge for Security. As security
professionals, we need to keep pace with ever-changing technology and be aware of the AI, IoT, Big
Data, Machine Learning, etc

 Emerging technologies are making an impact include:


1. Counter-terrorism and law enforcement informatics via predictive analytics and artificial
intelligence.

2. Real-time horizon scanning and data mining for threats and information sharing
3. Automated cyber security and information assurance
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones, facial
recognition, license plate readers)

5. Simulation and augmented reality technologies for training and modeling


6. Safety and security equipment (including bullet and bomb proof) made with lighter and
stronger materials

7. Advanced forensics enabled by enhanced computing capabilities (including future


quantum computing)

8. Situational awareness capabilities via GPS for disaster response and crisis response
scenarios
9. Biometrics: assured identity security screening solutions by bio-signature: (every aspect of
your physiology can be used as a bio-signature. Measure unique heart/pulse rates,
electrocardiogram sensor, blood oximetry, skin temperature)

4
10. Robotic Policing (already happening in Dubai!) B. Challenges in Using Artifical
Intelligence

 AI is only as good as the data it is exposed to, which is where certain challenges may present
themselves. How a business teaches and develops its AI will be the major factor in its usefulness.

 Humans could be the weak link here, as people are unlikely to want to input masses of data into a
system.

C. Challenges In Using Robotics In Manufacturing


 With automation and robotics moving from production lines out into other areas of work and
business, the potential for humans losing jobs is great here too. As automation technologies
become more advanced, there will be a greater capability for automation to take over more and
more complex jobs.

 As robots learn to teach each other and themselves, there is the potential for much greater
productivity but this also raises ethical and cybersecurity concerns.

D. Challenges in using the Internet of Things

 As more and more connected devices (such as smart watches and fitness trackers) join the Internet
of Things (IoT) the amount of data being generated is increasing. Companies will have to plan
carefully how this will affect the customer-facing application and how to best utilize the masses of
data being produced.

 There are also severe security implications of mass connectivity that need to be addressed.

E. Challenges in Big Data

 Almost all the technologies mentioned above have some relation to Big Data. The huge amount of
data being generated on a daily basis has the potential to provide businesses with better insight
into their customers as well as their own business operations.

 Although data can be incredibly useful for spotting trends and analyzing impacts, surfacing all this
data to humans in a way that they can understand can be challenging. AI will play a role here.

5
7. Describe the following technology.

A. Nanotechnology How
it started?

 The ideas and concepts behind nanoscience and nanotechnology started with a talk entitled
―There‘s plenty of room at the bottom‖ by physicist Richard Feynman at an American Physical
Society meeting at the California Institute of Technology (CalTech) on December 29, 1959, long.

 Fundamental concepts in nanoscience and nanotechnology

It‘s hard to imagine just how small nanotechnology is. One nanometer is a billionth of a meter or 10-9 of
meters. Here are a few illustrative examples:

 There are 25,400,000 nanometers in an inch


 A sheet of newspaper is about 100,000 nanometers thick
 On a comparative scale, if a marble were a nanometer, then one meter would be the size of the
Earth

 First, nanomaterial‘s have a relatively larger surface area when compared to the same mass of
material produced in a larger form

 Second, quantum effects can begin to dominate the behavior of matter at the nanoscale
particularly at the lower end – affecting the optical, electrical and magnetic behavior of materials.
 Applications of nanotechnology
 Medicine: customized nanoparticles the size of molecules that can deliver drugs directly to
diseased cells in your body. When it's perfected, this method should greatly reduce the damage
treatment such as chemotherapy does to a patient's healthy cells.

 Electronics: it has some answers for how we might increase the capabilities of electronics
devices while we reduce their weight and power consumption.

 Food: it has an impact on several aspects of food science, from how food is grown to how it is
packaged. Companies are developing nanomaterials that will make a difference not only in the
taste of food but also in food safety and the health benefits that food delivery.

 Agriculture: nanotechnology can possibly change the whole agriculture part and nourishment
industry anchor from generation to preservation, handling, bundling, transportation, and even
waste treatment.

6
 Vehicle manufacturers: Much like aviation, lighter and stronger materials will be valuable
for making vehicles that are both quicker and more secure. Burning motors will likewise profit
from parts that are all the more hardwearing and higher temperature safe.

B. Biotechnology
 It is the broad area of biology involving living systems and organisms to develop or make
products, or "any technological application that uses biological systems, living organisms, or
derivatives thereof, to make or modify products or processes for specific use".

 At its simplest, biotechnology is technology based on biology - biotechnology harnesses


cellular and biomolecular processes to develop technologies and products that help improve
our lives and the health of our planet. We have used the biological processes of
microorganisms for more than 6,000 years to make useful food products, such as bread and
cheese, and to preserve dairy products.

 Brewing and baking bread are examples of processes that fall within the concept of
biotechnology (use of yeast (= living organism) to produce the desired product). Such
traditional processes usually utilize the living organisms in their natural form (or further
developed by breeding), while the more modern form of biotechnology will generally involve
a more advanced modification of the biological system or organism.

B. Blockchain Technology

 ―Blocks‖ on the blockchain are made up of digital pieces of information. Specifically, they have three
parts:
1. Blocks store information about transactions like the date, time, and dollar amount of your most
recent purchase from Amazon. (NOTE: This Amazon example is for illustrative purchases;
Amazon retail does not work on a blockchain principle)

2. Blocks store information about who is participating in transactions. A block for your splurge
purchase from Amazon would record your name along with Amazon.com, Inc. Instead of using
your actual name, your purchase is recorded without any identifying information using a unique

―digital signature,‖ sort of like a username.

3. Blocks store information that distinguishes them from other blocks. Much like you and I have
names to distinguish us from one another, each block stores a unique code called a ―hash‖ that
allows us to tell it apart from every other block. Let‘s say you made your splurge purchase on
Amazon, but while it‘s in transit, you decide you just can‘t resist and need a second one. Even
though the details of your new transaction would look nearly identical to your earlier purchase, we
can still tell the blocks apart because of their unique codes.

 In order for a block to be added to the blockchain, however, four things must happen:

7
1. A transaction must occur. Let‘s continue with the example of your impulsive Amazon
purchase discussed in the introduction part of blockchain technology. After hastily clicking
through multiple checkouts prompt, you go against your better judgment and make a purchase.

2. That transaction must be verified. After making that purchase, your transaction must be
verified. With other public records of information, like the Securities Exchange Commission,

Wikipedia, or your local library, there‘s someone in charge of vetting new data entries. With
blockchain, however, that job is left up to a network of computers.

3. That transaction must be stored in a block. After your transaction has been verified as
accurate, it gets the green light. The transaction‘s dollar amount, your digital signature, and

Amazon‘s digital signature are all stored in a block. There, the transaction will likely join
hundreds, or thousands, of others like it.

4. That block must be given a hash. Not unlike an angel earning its wings, once all of a block‘s
transactions have been verified, it must be given a unique, identifying code called a hash. The
block is also given the hash of the most recent block added to the blockchain. Once hashed,
the block can be added to the blockchain.

Blockchain Explained

 A blockchain carries no transaction cost. (An infrastructure cost yes, but no transaction
cost.) The blockchain is a simple yet ingenious way of passing information from A to B in a fully
automated and safe manner.

 One party to a transaction initiates the process by creating a block. This block is verified
by thousands, perhaps millions of computers distributed around the net. The verified block is
added
to a chain, which is stored across the net, creating not just a unique record, but a unique record
with a unique history.

 Falsifying a single record would mean falsifying the entire chain in millions of instances.
That is virtually impossible. Bitcoin uses this model for monetary transactions, but it can be
deployed in many other ways.

The Three Pillars of Blockchain Technology

The three main properties of Blockchain Technology are:


1. Decentralization
 In a decentralized system, the information is not stored by one single entity. In fact, everyone in
the network owns the information.

8
 In a decentralized network, if you wanted to interact with your friend then you can do so directly
without going through a third party. That was the main ideology behind Bitcoins. You and only
you alone are in charge of your money. You can send your money to anyone you want without

having to go through a bank.

2. Transparency
 One of the most interesting and misunderstood concepts in blockchain technology is
―transparency.‖ Some people say that blockchain gives you privacy while some say that it is
transparent. Why do you think that happens?

 A person‘s identity is hidden via complex cryptography and represented only by their public
address. So, if you were to look up a person‘s transaction history, you will not see ―Bob sent 1
BTC‖ instead you will see ―1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC‖.

 So, while the person‘s real identity is secure, you will still see all the transactions that were done
by their public address. This level of transparency has never existed before within a financial
system. It adds that extra, and much needed level of accountability which is required by some of
these biggest institutions.

2. Immutability

 Immutability, in the context of the blockchain, means that once something has been entered into
the blockchain, it cannot be tampered with.

 The reason why the blockchain gets this property is that of the cryptographic hash function.
 In simple terms, hashing means taking an input string of any length and giving out an output of a
fixed length. In the context of cryptocurrencies like bitcoin, the transactions are taken as input and
run through a hashing algorithm (Bitcoin uses SHA-256) which gives an output of a fixed length.

 Let‘s see how the hashing process works. We are going to put in certain inputs. For this exercise,
we are going to use the SHA-256 .
How Blockchain Works
 Imagine the number of legal documents that should be used that way. Instead of passing them to
each other, losing track of versions, and not being in sync with the other version, why can‘t all
business documents become shared instead of transferred back and forth? So many types of legal
contracts would be ideal for that kind of workflow. You don‘t need a blockchain to share
documents, but the shared documents analogy is a powerful one.‖

 The reason why the blockchain has gained so much admiration is that:
• It is not owned by a single entity, hence it is decentralized
9
• The data is cryptographically stored inside
• The blockchain is immutable, so no one can tamper with the data that is inside the
blockchain

• The blockchain is transparent so one can track the data if they want to
Application of block chain

1. The sharing economy


 With companies like Uber and Airbnb flourishing, the sharing economy is already a proven
success. Currently, however, users who want to hail a ride-sharing service have to rely on an
intermediary like Uber. By enabling peer-to-peer payments, the blockchain opens the door to
direct interaction between parties a truly decentralized sharing economy results.

1. Crowdfunding
 Crowdfunding initiatives like Kickstarter and GoFundMe are doing the advance work for the
emerging peer-to-peer economy. The popularity of these sites suggests people want to have a
direct say in product development. Blockchains take this interest to the next level, potentially
creating crowd-sourced venture capital funds.

 In 2016, one such experiment, the Ethereum-based DAO (Decentralized Autonomous


Organization), raised an astonishing $200 million USD in just over two months. Participants
purchased ―DAO tokens‖ allowing them to vote on smart contract venture capital investments
(voting power was proportionate to the number of DAO they were holding).

1. Governance
 By making the results fully transparent and publicly accessible, distributed database technology
could bring full transparency to elections or any other kind of poll taking. Ethereum-based smart
contracts help to automate the process.

 The app, Boardroom, enables organizational decision-making to happen on the blockchain. In


practice, this means company governance becomes fully transparent and verifiable when
managing digital assets, equity or information.
1. Supply chain auditing
 Consumers increasingly want to know that the ethical claims companies make about their products
are real. Distributed ledgers provide an easy way to certify that the backstories of the things we
buy are genuine. Transparency comes with blockchain-based timestamping of a date and location
— on ethical diamonds, for instance — that corresponds to a product number.

10
 The UK-based Provenance offers supply chain auditing for a range of consumer goods. Making
use of the Ethereum blockchain, a Provenance pilot project ensures that fish sold in Sushi
restaurants in Japan have been sustainably harvested by its suppliers in Indonesia.

1. File storage
 Decentralizing file storage on the internet brings clear benefits. Distributing data throughout the
network protects files from getting hacked or lost.

 Interplanetary File System (IPFS) makes it easy to conceptualize how a distributed web might
operate.

D. Cloud Computing

 Cloud computing is a means of networking remote servers that are hosted on the Internet. Rather
than storing and processing data on a local server, or a PC's hard drive, one of the following three
types of cloud infrastructure is used.

 The first type is a public cloud. Here a third-party provider manages the servers, applications, and
storage much like a public utility. Anyone can subscribe to the provider‘s cloud service, which is
usually operated through their own data center.

 A business or organization would typically use a private cloud. This might be hosted on their
onsite data center, although some companies host through a third-party provider instead. Either
way, the computing infrastructure exists as a private network accessible over the Internet.

Advantages of cloud computing

 Well, much like with any utility -a business benefits from economy of scale, which means cheap
computing power. Because a cloud provider‘s hardware and software are shared, there‘s no need
for the initial costly capital investment. And it goes much further than that. Businesses save on the
electricity required 24/7 to power and cool that computing infrastructure. In effect, energy costs
are shared.

 It gets better. Cloud providers have vast resources of computing power at their fingertips. They
can allocate these whenever required with just a few mouse clicks. Cloud providers source on a
global scale, so they can deliver the precise bandwidth, storage and power business needs when it
needs it.
E. Quantum Computing

 Quantum computers truly do represent the next generation of computing. Unlike classic
computers, they derive their computing power by harnessing the power of quantum physics.
11
Because of the rather nebulous science behind it, a practical, working quantum computer still
remains a flight of fancy.

 Give clients access to a quantum computer over the internet, and you have quantum cloud
computing. Currently, the only organization which provides a quantum computer in the cloud is
IBM. They allow free access to anyone who wishes to use their 5-qubit machine. Earlier this year
they installed a 17-qubit machine. So far over 40,000 users have taken advantage of their online
service to run experiments.

 Not to be outdone, Google provided the fastest quantum computer with 53qubits and speed of 200
seconds computation while the supercomputer took 10000 years. So, what is qubit and how many
do you need?

E. Autonomic Computing (AC)


 Autonomic computing (AC) is an approach to address the complexity and evolution problems in
software systems. It is a self-managing computing model named after, and patterned on, the
human body's autonomic nervous system.

 An autonomic computing system would control the functioning of computer applications and
systems without input from the user, in the same way, that the autonomic nervous system regulates
body systems without conscious input from the individual.

 The goal of autonomic computing is to create systems that run themselves, capable of high-level
functioning while keeping the system's complexity invisible to the user.

Characteristics of Autonomic Systems


 An autonomic system can self-configure at runtime to meet changing operating environments,
self-tune to optimize its performance, self-heal when it encounters unexpected obstacles during its
operation, and of particular current interest.

 Protect itself from malicious attacks.


 An autonomic system can self-manage anything including a single property or multiple properties
(see picture below).

12
Autonomic systems/applications exhibit eight defining characteristics:-

 Self-Awareness: An autonomic application/system ―knows itself‖ and is aware of its state and its
behaviors.

 Self-Configuring: An autonomic application/system should be able to configure and reconfigure


itself under varying and unpredictable conditions.

 Self-Optimizing: An autonomic application/system should be able to detect suboptimal behaviors


and optimize itself to improve its execution.

 Self-Healing: An autonomic application/system should be able to detect and recover from


potential problems and continue to function smoothly.

 Self-Protecting: An autonomic application/system should be capable of detecting and protecting


its resources from both internal and external attacks and maintaining overall system security and
integrity.

 Context-Aware: An autonomic application/system should be aware of its execution environment


and be able to react to changes in the environment.

 Open: An autonomic application/system must function in a heterogeneous world and should be


portable across multiple hardware and software architectures. Consequently, it must be built on
standard and open protocols and interfaces.

 Anticipatory: An autonomic application/system should be able to anticipate to the extent possible,


its needs and behaviors and those of its context, and be able to manage itself proactively.

G. Computer Vision
13
 The origins of computer vision go back to an MIT undergraduate summer project in 1966. It was
believed at the time that computer vision could be solved in one summer, but we now have a
50year old scientific field that is still far from being solved.
 Early experiments in computer vision took place in the 1950s, using some of the first neural
networks to detect the edges of an object and to sort simple objects into categories like circles and
squares. In the 1970s, the first commercial use of computer vision interpreted typed or handwritten
text using optical character recognition. This advancement was used to interpret written text for
the blind.

H. Embedded Systems

 It is a controller with a dedicated function within a larger mechanical or electrical system, often
with real-time computing constraints. It is embedded as part of a complete device often including
hardware and mechanical parts. Embedded systems control many devices in common use today.
Ninety-eight percent of all microprocessors manufactured are used in embedded systems.

 Modern embedded systems are often based on microcontrollers (i.e. microprocessors with
integrated memory and peripheral interfaces), but ordinary microprocessors (using external chips
for memory and peripheral interface circuits) are also common, especially in more complex
systems. In either case, the processor(s) used may be types ranging from general-purpose to those
specialized in a certain class of computations or even custom designed for the application at hand.

A common standard class of dedicated processors is the digital signal processor (DSP).

Advantages and disadvantages of embedded system 

Advantages of Embedded

• Easily Customizable
• Low power consumption
• Low cost
• Enhanced performance
 Disadvantages of Embedded systems

 High development effort

14
 Larger time to market

Basic Structure of an Embedded System

 Sensor − It measures the physical quantity and converts it to an electrical signal which can be read
by an observer or by any electronic instrument like an A2D converter. A sensor stores the
measured quantity to the memory.

 A-D Converter − an analog-to-digital converter converts the analog signal sent by the sensor into
a digital signal.

 Processor & ASICs − Processors process the data to measure the output and store it to the
memory.

 D-A Converter − A digital-to-analog converter converts the digital data fed by the processor to analog
data.

 Actuator − An actuator compares the output given by the D-A Converter to the actual (expected)
output stored in it and stores the approved output.

I. Cybersecurity

Definition
 It is the protection of computer systems from the theft of or damage to their hardware, software, or
electronic data, as well as from the disruption or misdirection of the services they provide.

 The field is becoming more important due to increased reliance on computer systems, the Internet
and wireless network standards such as Bluetooth and Wi-Fi. Cyber security measures

 The following are some security measures to be taken to prevent cybercrimes:


• Staff awareness training: - Human error is the leading cause of data breaches, so you need to
equip staff with the knowledge to deal with the threats they face. Training courses will show
15
staff how security threats affect them and help them apply best-practice advice to real-world
situations.

• Application security: - Web application vulnerabilities are a common point of intrusion for
cybercriminals. As applications play an increasingly critical role in business, it is vital to focus
on web application security.

• Network security: - Network security is the process of protecting the usability and integrity
of your network and data. This is achieved by conducting a network penetration test, which
scans your network for vulnerabilities and security issues.
• Leadership commitment: - Leadership commitment is the key to cyber resilience. Without it,
it is very difficult to establish or enforce effective processes. Top management must be
prepared to invest in appropriate cybersecurity resources, such as awareness training.

• Password management: - Almost half of the UK population uses ‗password‘, ‗123456‘ or


‗qwerty‘ as their password. You should implement a password management policy that
provides guidance to ensure staff create strong passwords and keep them secure.

Types of cyber security threats

 Ransomware: - It is a type of malicious software. It is designed to extort money by blocking


access to files or the computer system until the ransom is paid. Paying the ransom does not
guarantee that the files will be recovered or the system restored.

 Malware:- it is a type of software designed to gain unauthorized access or to cause damage to a


computer[64].

 Social engineering: - it is a tactic that adversaries use to trick you into revealing sensitive
information. They can solicit a monetary payment or gain access to your confidential data. Social
engineering can be combined with any of the threats listed above to make you more likely to click
on links, download malware, or trust a malicious source.

 Phishing: - it is the practice of sending fraudulent emails that resemble emails from reputable
sources. The aim is to steal sensitive data like credit card numbers and login information. It‘s the
most common type of cyber-attack. You can help protect yourself through education or a
technology solution that filters malicious emails. Benefits of Cyber Security

 Benefits of utilizing cyber security include:


• Business protection against malware, ransomware, phishing, and social engineering.
• Protection for data and networks.

16
• Prevention of unauthorized users.
• Improves recovery time after a breach.
• Protection for end-users.
• Improved confidence in the product for both developers and customers.

Cyber Security Vendors

 Vendors in cybersecurity fields will typically use endpoint, network and advanced threat
protection security as well as data loss prevention. Three commonly known cybersecurity vendors
include Cisco, McAfee, and Trend Micro.

J. Additive manufacturing (3D Printing)

 Are ―3D printing‖ and ―additive manufacturing‖ (AM) the same thing? In general, we know that
terms stretch over time to include more than just their default meanings. Whatever the name, new
ways of fabricating directly from bytes to stuff are radically changing the what, where, how, and
when of making objects.

 What roles, then, do the two terms ―additive manufacturing‖ and ―3D printing‖ play in
describing new ways of making?

Let‘s start by considering what the experts have to say:


 The American Society for Testing and Materials (ASTM) equates the two terms in their definition:
―Additive manufacturing, also known as 3D printing, uses computer-aided design to build
objects layer by layer.‖

 Wikipedia says, ―Today, the precision, repeatability, and material range has increased to the
point that 3D printing is considered as industrial production technology, with the name of additive
manufacturing.‖

 Author Deve Turbide puts it simply, suggesting that additive manufacturing is ―the industrial
version of 3D printing‖.

Adaptive manufacturing (3D Printing): It's All About the Printer

 When MIT invented binder jet printing in the 1980s, they wrote: ―three-dimensional printing is a
process under development at MIT for the rapid and flexible production of prototype parts, enduse
parts, and tools directly from a CAD model.‖

 Today our concept of ―3D printing‖ is much broader, but the term is often associated with
filament-based plastic printers, which are the pride and joy of many a hobbyist and self-described
17
maker. But there are also binder jet printers, laser metal 3D printers, as well as glass and clay 3D
printersmore about the manufacturing process transformed by 3D printing.

 What is that transformation? AM changes the way we think about inventory and supply chain,
taking parts from the point of manufacture to the point of use?

 AM is flexible in the time it takes to load a file, from anywhere in the world. It enables customized
parts, in volume, and involves stocking raw materials like filament and printing spare parts on
demand.

 Additive Manufacturing: A Bytes-to-Parts Supply Chain

18

You might also like