Last year, an incident of a frantic mother who had received an ominous call from “kidnappers” who had ‘kidnapped’ her daughter, raised an alarm in the U.S. Senate about the detrimental impact of artificial intelligence. The news took the nation by a storm as the said “kidnappers” and the daughter’s voice were nothing but hackers utilising generative AI to extort money. With such instances on the rise, the human perception of what is real and what is merely generative AI is slowly eroding.
Weak AI/Narrow AI:
Strong AI:
Reactive AI:
Limited Memory AI:
Theory-of-Mind AI:
Self-aware AI:
Goal Difference:
Healthcare:
Business:
Education:
Judiciary:
Cybersecurity/Security:
Internet Usage in India:
Growth Projection:
Digital Economy Expansion:
Cybersecurity Challenges:
Threat Landscape:
Critical Infrastructure Vulnerability:
Financial Sector Threats:
Data Breaches and Privacy Concerns:
Cyber Espionage:
Advanced Persistent Threats (APTs):
Supply Chain Vulnerabilities:
National Cyber Security Policy:
Cyber Surakshit Bharat Initiative:
Indian Cyber Crime Coordination Centre (I4C):
Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre):
Computer Emergency Response Team - India (CERT-In):
Critical Information Infrastructure (CII) Protection:
Defence Cyber Agency (DCyA):
39 videos|4279 docs|902 tests
|
39 videos|4279 docs|902 tests
|
|
Explore Courses for UPSC exam
|