fbpx
Home Blog Page 343

How Would You Describe Your Style?

0

Check out 47 outfits from students across the United States. Then tell us about your look and what it says about you.

People Pleasing

0

Do you tend to prioritize others’ needs ahead of your own? When have you been able to stand up for yourself, even if it was hard?

Word of the Day: holistic

0

This word has appeared in 176 articles on NYTimes.com in the past year. Can you use it in a sentence?

How AI is changing cybercrime and cybersecurity

0
How AI is changing cybercrime and cybersecurity

In our last issue, we talked about the value of building your practical AI skills. These are the skills that you can apply broadly to enhance productivity regardless of your job role. This week, we’ll explore how AI skills show up in cybersecurity.

Cybersecurity professionals protect data and computer networks from cyber attacks. This line of defense is important to anyone who uses any type of computer or mobile device—and if you’re here with us now, that includes you. What’s more: because of our active participation in cyber technologies, the way AI is impacting cybersecurity actually impacts all of us. Allow us to explain.

How AI is changing cyber safety

As you’ve developed your computer literacy, you’ve likely accumulated a decent amount of basic cyber safety knowledge. For example, you may have turned on your email spam filters, developed a secure password system, or set up two-factor authentication on your private accounts. These are all excellent ways to protect yourself from common cyber attacks.

However, just as AI can unlock new efficiencies and productivity for good causes, it can also do the same for bad actors—meaning cybercrime stands to get even more sophisticated. Here are some ways AI is enabling cybercrime:

  • AI-powered password-guessing software can guess common seven-digit passwords in mere minutes.
  • Adaptive attack patterns can change its code to adapt to the system through which it spreads.
  • Generative malware can enable people with little to no programming knowledge to create malicious software and tools.
  • AI-powered deepfakes can engage victims with synthetic video and audio that mimics real people.

These new risks make it more important than ever to remain vigilant with your digital safety and stay up-to-date on common cybersecurity threats. But don’t worry—you’re not alone in keeping yourself safe from cybercrime. Cybersecurity professionals work behind the scenes to protect and encrypt your digital data, and they’re also harnessing the power of AI.

How cybersecurity professionals use AI

Cybersecurity professionals are already using AI technology to combat emerging and growing threats. Here’s how:

  • AI-powered malware detection can analyze various types of data for irregular file characteristics and code patterns to better identify malicious software, scripts, and behavior.
  • AI-powered security analysis tools can parse security records and uncover trends faster than human-powered analysis can.
  • AI-powered monitoring tools can continuously monitor complex systems and react quickly in the event of a breach or security risk.

Some AI tools that cybersecurity professionals use are IBM Security Verify, Amazon GuardDuty, and CylanceENDPOINT. Learn more about these tools and how they’re used in our guide, AI in Cybersecurity: How Businesses are Adapting.

Keep learning about AI and cybersecurity

If the idea of fighting cybercrime energizes you, expand your knowledge with University of Maryland’s free course, Cybersecurity for Everyone. This is a low-risk way to get a better sense of what a cybersecurity career can look like for you.

For a more robust credential, consider the Google Cybersecurity Professional Certificate. It’s designed around the skills commonly needed to secure an entry-level role in cybersecurity. Plus, if you enroll before August 5, you’ll get access to Google AI Essentials at no cost.

If your goal is to secure a professional certification, you may want to consider the Microsoft Cybersecurity Analyst Professional Certificate. This coursework is also designed for job-readiness, and prepares you for the industry-recognized Microsoft SC-900 Certification exam.

To advance your cybersecurity career, try the IBM Generative AI for Cybersecurity Professionals Specialization. These intermediate-level courses will invigorate your existing skill set with new AI knowledge and tools.

That’s all for this week.

Should We Be More Concerned About the Growing Use of Marijuana?

0

Cannabis is now legal in much of the United States. As its use increases, so do its harms. Is that a problem?

Word of the Day: exodus

0

This word has appeared in 281 articles on NYTimes.com in the past year. Can you use it in a sentence?

What Do You Splurge On?

0

Whether it’s a pair of sneakers, new makeup, a concert or something else, when you have some extra cash, how do you spend it?

100 Raccoons

0

The Times reported on a woman who called 911 when a horde of raccoons showed up in her yard. Make up a story that explains how and why they got there.

Word of the Day: arpeggio

0

This word has appeared in four articles on NYTimes.com in the past year. Can you use it in a sentence?

Spacing and Retrieval Practice in Health Professions

0
Spacing and Retrieval Practice in Health Professions

The summary of the articles they found paints a picture of who is implementing and studying these learning strategies. Not surprisingly, introductory psychology courses were the most common setting to find studies (there were 16 studies like this) on the use of retrieval practice and spacing. After that, the most common setting to find these studies was in either anatomy (6 studies), physiology (8 studies), or anatomy and physiology (4 studies) courses. I think this is interesting because it speaks to the need to better understand how these learning strategies are applied within specific disciplines. While we have a good idea of how these strategies been implemented in psychology and anatomy & physiology course work – the success and the limitation; we know somewhat less about the potential success or limitations of implementing these strategies in, say, a cardiology course in medical school.

The authors also note that the most common type of retrieval practice was recognition or cued recall, with free recall being less frequent. In other words, retrieval was often assessed via multiple-choice assessments. They noted that when forms of retrieval practice were compared that free recall was more effective than recognition or cued recall. For more on differences in types of retrieval practice, check out one of our early podcasts (Episode 3 – Bite-Size Research on Retrieval Practice Formats). In terms of spaced practice they note that only 5 studies compared the different possible type of distributed practice (expanding, equal, and contracting; for more on schedules of spaced practice see this review by Carolina). Of those, 3 of the 5 found an expanding schedule to be better.

One of the major critiques that the authors had of the literature is that very few studies reported time on task or reported on stakes of assessments. The premise of their critique, I believe, is that time is a valuable resource for students. All things being equal, if the outcome of two learning strategies was the same, but one took less time, then that strategy would be superior. Certainly if a learning strategy produced less learning and took more time it would be considered much less effective than one that produced more learning and took less time. While this is true, I think this critique is much more applicable to post-graduate education.

For example, a typical Introductory Psychology course takes place over about 15 weeks. Further, introductory psychology courses are commonly used as electives and requirements for students who are not psychology majors. Therefore, students in these classes are typically first-year students with no interest in pursuing clinical psychology. As such, the educational goals and outcomes of these courses are often to give people a broad introduction and interest in the field. Compare that to the 6 week course on Neuroscience and Behavior that students get at my medical school. The educational goals and outcomes of this course are vastly different from the Introductory Psychology course. Here, the goal is to not only cover the basics, but to prepare students for clinical rotations in psychiatry where they will be expected to diagnose and develop treatment plans based on the DSM-5. Time on task is a much more pressing concern for these students at this level of education, as are the stakes. Clearly there are differences in what effectiveness or efficiency might mean across these two settings even though there is an overlap in content and learning strategy.

Overall, the authors conclude that both distributed practice and retrieval practice are effective at improving academic grades in health professions education (yay!). For me, this review highlighted the need to conduct more research on the implementation of these strategies in post-graduate settings in health professions education to better understand what successful implementation looks like in these settings.

References

  1. Trumble, E., Lodge, J., Mandrusiak, A., Forbes, R. (2024). Systematic review of distributed practice and retrieval practice in health professions education. Advances in Health Sciences Education, 29, 689-714. https://doi.org/10.1007/s10459-023-10274-3