Introduction to Artificial Intelligence

AI is revolutionizing our world by mimicking human behavior and thinking, raising critical questions about its potential to replace jobs and transform society.

Hey, Siri! Please call Martin. After that, a bell will ring to get Martin’s attention, or you can ask Alexa to play “Grow as We Go” from Spotify. The following sound will be the song playing, or you can inquire with ChatGPT about “codes for framing an email in JavaScript.” Hola! The codes will be displayed on the screen.

In our lives, not just in technical aspects, but in various ways, we are influenced by the new world technology known as ‘Artificial Intelligence.’ So, what exactly is artificial intelligence? Is it a machine that mimics the human brain’s functioning, or is it a machine that imitates human behavior? Could it be that human intelligence has been integrated into a machine to enable it to function like a human? Furthermore, how does this artificial intelligence impact human work? Is it replacing humans, leading to the eventual elimination of human job opportunities? Or is it simply a revolution similar to others that have occurred in the past?

AI has been defined in various ways by businessmen, technical experts, computer intelligence enthusiasts, and scientists. Keynes (1930) referred to it as “technological unemployment,” where the use of labor-saving techniques surpasses the rate of finding new uses for labor, leading to unemployment. Leontief (1983) expressed concerns about machines replacing humans, akin to how internal combustion engines rendered horses obsolete due to the dramatic improvements in computer chip processing power. Elon Musk holds a strong belief that “AI is a fundamental risk to the existence of human civilization.” On the other hand, Luger and Stubblefield (1993) define AI as “the discipline of computer science that is concerned with the automation of intelligent behavior.” The different perspectives on AI highlight its potential impact on the workforce, human civilization, and the development of intelligent systems in computer science.

AI is simply artificial means man-made and intelligence is thinking power, thus, artificial intelligence is man-made thinking power. AI can be described simply as imbuing machines with human-like abilities such as reasoning, learning, planning, and creativity to perform various tasks. These capabilities can manifest in both hardware (embedded AI) and software (virtual assistants). While AI can think and act like a human brain, it still requires human intelligence to be integrated into the machine for it to function as desired. Currently, human intervention remains necessary to support AI’s functioning. Although AI has the potential to operate independently in the future, we cannot claim that it has completely replaced humans at this moment. Perhaps, in time, we may witness a shift where AI becomes self-sufficient, but that is not the case for now. Indeed, AI is pervasive worldwide, and its presence has become a part of our daily lives, whether directly or indirectly. The market showcases cutting-edge AI-related technologies such as Virtual Assistants like Apple’s Siri, Amazon’s Alexa, Cortana, and many others.

AI offers numerous benefits, including automation, which streamlines processes and reduces human error. It eliminates repetitive tasks, ensuring increased efficiency. With AI’s infinite availability, tasks can be performed consistently without downtime. AI’s speed and accuracy are remarkable, enabling swift and precise operations. Additionally, AI accelerates research and development, driving innovation across various fields. AI finds applications in diverse areas, such as voice recognition, image recognition, predictive modeling, translation, data analytics, and cybersecurity. These applications demonstrate AI’s versatility and its potential to enhance various aspects of our lives.

In broad categories, Artificial Intelligence can be classified into two types: Hardware-based AI, which involves robots, embedded AI, drones, etc., and Software-based AI, which includes virtual assistants, speech and facial recognition technologies.

On the basis of functionalities, AI can be further divided into two main types: Type 1 includes Artificial Narrow Intelligence (ANI), Artificial General Intelligence (AGI), and Artificial Superintelligence (ASI). Type 2 comprises Reactive Machines, Limited Memory, Theory of Mind, and Self Awareness.

Type – 1:

Artificial Narrow Intelligence: Narrow functioning, also known as Weak AI, involves AI systems that excel in specific areas or tasks, such as Machine Learning. Apple’s Siri is an example of Weak AI, as it operates effectively within a particular domain or zone.

Artificial General Intelligence: This advanced form of AI surpasses ANI (Artificial Narrow Intelligence) by incorporating intelligence and Machine Learning together. It is referred to as Strong AI due to its cognitive capabilities, similar to the human brain.

Artificial Super Intelligence: This AI goes beyond the capabilities of the human brain, making it a strong and currently highly speculative concept in the realm of AI. The practical implementation of such advanced AI in real-world scenarios would undoubtedly present formidable challenges.

Type – 2:

Reactive Machines: Reactive machines operate based on pre-programmed theories and do not store or learn any data. Consequently, each query is treated as a new one every time it occurs. IBM’s Deep Blue system serves as an example of reactive machines.

Limited Memory: This type of AI possesses a memory system to learn and retain information, but its memory is limited to a specific period. It can memorize things, but only for a constrained duration or limited time period. Self-driving cars are a notable example of this kind of AI.

Theory of Mind: This is still a concept that lies in the future. It involves comprehending human emotions and the underlying reasons for corresponding reactions. This form of intelligence pertains to understanding human emotions and predicting behavior accordingly.

Self-Awareness: Similar to the theory of mind, this AI also remains non-existent at present. It represents an advanced iteration of the theory of mind, where we envision a machine possessing human-like cognitive abilities, emotions, reactions, and functions. Essentially, it would be a self-aware machine, functioning at a superhuman level, akin to a sentient being.

It’s not ‘Fishing’, it’s “Phishing”!

In today’s digital world, the trending threat isn’t “fishing”—it’s “phishing,” where fraudsters bait victims with deceptive emails to steal sensitive data.

There was a time when fishing was in trend but it’s the new digital world of new India and here the trending hashtag nowadays is not fishing it is phishing. Yes, you see it written, the homophones type these words are too way different. The only similarity between these two is the process of capturing the fish in the former and the customer for fraud in the latter one.

WHAT IS PHISHING?

Phishing is a new type of cyber-attack often called a social engineering attack, commonly used to steal users’ data, like login credentials and credit card numbers. It occurs when an attacker, pretends to be a trusted entity to the customer and dupes a victim by making the individual open things like email, instant message, or text message which looks like valid ones but in reality, it would be consists of fraud data. Once the recipient gets tricked into clicking a malicious link, then the installation of malware starts, or the freezing of the system as part of a ransomware attack or the revealing of sensitive information, etc.

TECHNIQUES OF PHISHING

1) Spear Phishing:-

In this, the fraud individual targets a specific person or enterprise or some high authority level individual or company, as opposed to random application users. It’s a more in-depth version of phishing as it requires special knowledge about that particular organization, including its power, structure, and also confidential matters.

An attack might play out as follows:

A.      The fraud dealer does research and finds names of employees within an organization’s marketing department and gains access to the latest project invoices to look genuine.

B.      Acting as the marketing director, the attacker emails a departmental project manager using a genuine subject line. The text, style, and included logo duplicate the organization’s standard email template and the email seems like the same one with the same pattern that you won’t be able to recognize in one go.

C.      The link in the fraud email redirects you to a password-protected internal document, which is in actuality a spoofed version of a stolen invoice to misguide you.

D.     The Person is then requested to log in to view the document. The attacker steals his credentials, gains full access to sensitive areas within the organization’s network, and does the spear phishing with you.

2) E-mail Phising

This phishing is based on a number of game things. An attacker sends out thousands of fraud messages to get the net significant information and sums of money, even if only a small percentage of the person falls for the scam.

Just like spear phishing here they again try to create the same spoofed email or texts to fraud you. In addition, attackers will usually try to push users into action by creating a sense of urgency and taking the victim into confidence of genuine.

The poor part is the links inside the messages resemble the legitimate counterparts, but also have a typically misspelled domain name or extra subdomains. Like https://www.bajajfinservmarkets.in/ and http://www.bajajfinservemarket.in/.

Similarities between these two addresses offer the impression of a secure link, making the recipient less aware that an attack is taking place and the next click it happens

HOW TO PROTECT YOURSELF FROM THIS SOCIAL ENGINEERING ATTACK!.

Phishing attack protection requires steps to be taken by both users and enterprises to stay away from this attack.

For users, vigilance and awareness is the key. A spoofed message often contains mistakes that expose its true identity and these are easily catchable. All you need is to see it in patience and with awareness. These can include spelling mistakes or changes to domain names, as seen in the earlier URL example of email phishing. For enterprises, a number of steps can be taken to mitigate both phishing and spear phishing attacks:

· Two-factor authentication (2FA) is the most effective method for protecting from phishing attacks, as it adds an extra verification layer when logging in to sensitive applications. 2FA relies on users having two things: something they know, such as a password and user name, and something they have, such as their smartphones with their confidential information.

  • In addition to using 2FA, organizations or individuals should enforce strict password management policies. For example, employees should be required to frequently change their passwords and not be allowed to reuse a password for multiple applications or use different and not easy passwords to log in.
  • Educational campaigns and awareness campaigns can also help diminish the threat of phishing attacks by enforcing secure practices, such as not clicking on external email links and getting authenticated information from the genuine service provider, etc.

ICANN78: A Fellow Journey!

My journey as an ICANN fellow began just a few months back when I received that all-important email from our fellowship program manager, letting me know that I had been selected. But, here’s the twist – I didn’t actually check that email until the following day. I guess I was caught up in the busyness of life and didn’t realize what a significant moment it was.

Yes, before proceeding further, for those who don’t know what ICANN is?  Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit, American-based organization that operates as a multi-stakeholder group. It is tasked with overseeing the management and protocols governing various databases associated with the naming and numbering systems on the Internet. Its primary mission is to guarantee the stable and secure functioning of the global network.

Returning to my account of this journey, once I had confirmed my participation, our fellowship manager quickly became my primary point of contact. This was particularly valuable for newcomers like me. They played a vital role in helping us navigate the intricacies of the ICANN Fellowship program, serving as a friendly and knowledgeable guide to steer us through this thrilling opportunity.

But that wasn’t the end of the adventure. Getting a Schengen visa, which allows you to travel within certain European countries, turned out to be a journey in itself. It involved a whirlwind of activities – gathering documents, going through verifications, handling passports, and taking care of all those visa-related requirements. 

And let me tell you, it was no walk in the park. My first attempt at getting the visa didn’t go as planned. It was rejected, and the reason they gave was a bit perplexing – they said the “source of sustenance” was missing. I couldn’t help but wonder why the German government had turned down my application. After all, I was just going to be in their country for the duration of the fellowship, and I had everything I needed to support myself during that time.

So, my journey as an ICANN fellow has had its fair share of unexpected twists and turns. It’s been a lesson in patience, perseverance, and the importance of having a supportive fellowship manager to guide the way. And as I embark on this incredible opportunity, I can’t help but look forward to the adventures and discoveries that lie ahead. Who knows what other surprises were in store??

As a strong believer in God, I experienced a week filled with ups and downs. It was a week of rejection and acceptance and a pivotal moment that led me to discover an incredible opportunity. I had just been rejected, but in the same week, I was introduced to my mentor for a prestigious fellowship. Our very first Zoom meeting took place on that same day, and I decided to share my concerns with my mentor. To my amazement, he not only provided me with a solution but also offered guidance on how to ensure a successful second attempt. Miraculously, my visa application was approved.

Our mentor had a profound message for us: “ICANN is an ocean of opportunities. Your journey may not be easy, but the challenges you face will ultimately lead you to fruitful destinations.” This resonated deeply with me. Alongside seven fellow mentees, I embarked on a journey into the world of ICANN (Internet Corporation for Assigned Names and Numbers) and found myself in the At-Large Advisory Committee (ALAC). Our mentor continued to guide us throughout this incredible journey.

During our mentorship, we had the privilege of e-meeting individuals who had dedicated a significant portion of their lives to ICANN, with 10 or even 20+ years of experience. It was an inspiring experience that emphasized the depth and vastness of the ICANN community. As October arrived, we entered into the month of our fellowship. The first week was dedicated to “Prep-week,” where we were introduced to various community stakeholders in face-to-face e-meetings. These meetings provided us with a comprehensive overview of the different communities and their functions within ICANN. Living in India, I faced the challenge of dealing with a significant time difference. After long days at the office, I would rush back home, grab a quick meal, and then dive into the prep-week activities. It required not only physical presence but also a sharp and focused mind. This was an opportunity that I could not afford to take for granted.

The last day of our prep-week was a remarkable one, as all the fellows, accompanied by our fellowship manager, had the opportunity to connect with a multitude of individuals representing diverse corners of the globe. It was a truly enlightening experience that greatly broadened our comprehension of the global ICANN community.

Then came the long-awaited D-day, October 21, 2023, at Hamburg’s CCH. We were all dressed up and heading to the venue for our very first day of the event. The initial two days were nothing short of overwhelming. We found ourselves amidst a sea of acronyms, and quite honestly, even now, it can be a bit bewildering, to make choices about which sessions to attend. Sometimes it feels like trying to remember all those acronyms would put our neurons under too much stress.

However, the turning point arrived on day three. It was a day of warm welcome by the Government of Germany. The experience was simply enchanting as we walked into a hall filled with vibrant colors and the smiles of attendees, both new and seasoned, with eyes filled with the sparkle of dreams. It was a momentous experience that will be cherished for a lifetime. Over the next two days, we engaged in sessions, interactive parties, DNS Woman gatherings, and much more. One of the most exceptional aspects of ICANN is the incredible networking opportunities it offers. No matter how introverted a person may be, spending time here for these six days will likely turn them into an extrovert. It’s not so much about you stepping out of your introverted shell; it’s the supportive and inclusive environment at ICANN that makes you feel so comfortable that engaging with people becomes a delightful experience, rather than something to be hesitant about.

You build friendships, find constant companionship, and gain knowledge. ICANN embraces the ethos of working diligently and celebrating heartily. I encountered a multitude of individuals during my time there, too numerous to mention here in one blog post. However, one principle remains paramount: trust the process of networking, immerse yourself in social interactions, and embrace the learning opportunities. As my journey within ICANN unfolds, I am brimming with excitement to discover where this path will ultimately take me. The trials and prospects on the horizon serve as a testament to the adage that what initially appears to be a challenging journey often leads to the most gratifying destinations.

For those individuals who are considering becoming a part of ICANN, you can explore the following URL: https://www.icann.org/fellowshipprogram. This website provides a concise and informative overview of the fellowship. As for others, you are welcome to reach out to me through this LinkedIn link: https://www.linkedin.com/in/barkha-manral/

Never think that you are done with fellowship now it is the end, No instead it is the beginning because ‘ONCE A FELLOW,  ALWAYS A FELLOW’.