Jump to content

Search the Community

Showing results for tags 'cyber security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 8 results

  1. Pakistan’s Upper House this week began debating a new bill seeking to establish a National Cyber Security Council, an agency the nation feels is needed in the wake of Edward Snowden's myriad revelations about NSA surveillance. The Cyber Security Council Bill 2014 was presented by Senator Mushahid Hussain Sayed on Monday with the aim of creating a body to draft policy, guidelines and strategy on cyber security issues according to international best practices, in line with Pakistan Today. As well as working to counter emerging online threats, it will also try to facilitate better communication and information-sharing between government and private sectors. To help achieve this, members of the proposed council would apparently be drawn from both sectors.There’s very little information on the proposals on the Senate web site, but Pakistan Today has the following from Sayed: Given the clear and present danger of threat to Pakistan’s national security related to cyber warfare, as demonstrated by revelations of intrusion into privacy and spying by overseas intelligence networks, and given the context that cyber warfare is currently being weighed actively in the region where Pakistan is located, it is imperative that Pakistan take institutional steps to combat this threat. Pakistan’s security concerns, of course, are not limited to possible NSA spying. Hacktivists purportedly from the Islamic republic frequently trade online attacks with those from arch rival India, and occasionally further afield. While lawmakers in Islamabad talk about “major non-traditional, non-military threats the country is facing” from the likes of the US, they should also probably focus more scrutiny on their own government. The latest Enemies of the Internet report from Reporters Without Borders called out the Pakistan Telecommunication Authority (PTA) for its increasingly prolific attempts to blacklist URLs and filter web content. YouTube is still blocked over 18 months after being taken offline in the republic after controversial video The Innocence of Muslims appeared on the site. Source
  2. The year 2018 certainly brought with it a number of cybersecurity issues. From the beginning of the year until the end, we witnessed a trail of data breaches, hacks, as well as a lot of security vulnerabilities. Now that we have entered the year 2019, the trend, unfortunately, seems to be set to continue this year as well with more threats to our online security. According to Sophos 2019 report, ransomware, IoT malware, and several other security threats will remain active in 2019 as well. So, does that mean that you will remain vulnerable to hacks throughout the year? Well, nobody can ever assure a 100% security protection, particularly when it comes to online security. However, you can certainly minimize the risks by keep employing some basic security measures. So, here we give a quick brief about how to ensure online security in 2019. To-Do List For Adequate Online Security In 2019 1. Stay Wary Of Tech Support Scams Tech support scams have been troubling the internet users for quite a while. Precisely, one can relate their emergence to the exponential rise in online customer support centers and cold-calling. While the actual support systems aims to benefit the customers, the malefactors are using this method for their own devices. Therefore, one should be very careful while communicating with any online tech support to avoid falling a prey to hackers. The more you avoid approaching remote or online tech support which is not the official provider for the product/system needed, the better. 2. Think Before You Click Another common trick that the hackers use to victimize innocent internet users is phishing. One click on a wrong click could create chaos for you. This may range from malware attacks to password hacks, and even financial losses. Therefore, make sure you think well before clicking on a link. Stay away from all such websites and emails that ask your personal details, email address with passwords, or bank account details. 3. Take Care Of Your Passwords Credential stuffing and password hacking are just another sort of routine cyber attacks. While people have learnt to make stronger passwords, they still miss an opportunity to keep them unique. That is why the hackers still achieve success in credential stuffing attacks as people use same passwords. To avoid this problem, it is highly advised to create unique passwords for every account, regardless of whether you use it frequently or not. In addition, using a password manager is another method to keep your passwords secure and unique, without the need to memorize them all. 4. Employ Multi-Factor Authentication Multi-factor authentication has been around for quite some time. While not entirely fool-proof, and may sometimes become something of a burden as well, MFA, nonetheless, adds an added security layer to protect your account. Perhaps, you won’t mind doing some extra effort to log into your account to protect it from hackers. 5. Secure Your Cloud Databases Well, to understand this point, let’s recall all those weird data breaches from unsecured S3 buckets. Certainly, you don’t want the hackers to steal your precious data, do you? Then why not keep it protected! 6. Encrypt Storage Drives External storage drives certainly provide a nice storage option for handling bulk data. But, hacking these drives isn’t so difficult either. So, make sure you keep the drives adequately encrypted. 7. Don’t Be Too Social On Social Media Throughout the year 2018, we have heard of several instances where Facebook, Instagram, Twitter, and almost all major social networking platforms have ditched their users (either accidentally or intentionally). After so many troubles, it seems a better idea to restrict your social media activities. Even if you’re an avid user, you can at least try not to share your personal information on these networks. 8. Install A Robust Anti-Malware This is simply a reiteration of the commonly known security tip that we miss the most. Having an average antivirus software won’t sufficiently protect your device from malware attacks. Make sure you install a robust and reputed anti-malware tool that adequately fights back all known malware. 9. Keep Your Devices Updated Adding to the list of security malpractices is the habit of ignoring software updates. That’s where the hackers win. They spot the vulnerable devices and hack them by exploiting the software weaknesses. Many times, the vendors have already released security fixes, but the users missed to update their systems. Consequently, they become a victim of cyber attacks. Therefore, make sure to keep your all apps and software programs in your device updated. 10. Don’t Use An App? Delete Right Away Keeping unwanted or excessive apps not only occupy your device memory but also access your data. So, get rid of all additional apps in your device in the first place. Simple as that! Although many of you would already know these points, at times ignoring the basic online security tips can make us fall prey to cyber attacks – thus, we have made up this list as a quick reference for you. If you already employ these tips, thumbs up. If not, then make sure you secure yourself at your earliest convenience. source
  3. Report: CEOs the Weakest Link with Security Measures A new report from The Bunker has highlighted that senior executives are still often the weakest link in the corporate cybersecurity chain and that cybercriminals target this vulnerability to commit serious data breaches. The white paper, Are You the Weakest Link? How Senior Executives Can Avoid Breaking the Cybersecurity Chain, says that many senior executives ignore the threat from hackers and cybercriminals and often feel that security policies in their respective organizations do not apply to their unique position. However, in reality, their often privileged access to company information make their personal accounts extremely valuable to exploit and heightens the need for extra care. In addition to highlighting the common mistakes made by senior executives, the white paper lists the top security areas that should be prioritized to ensure cybersecurity resilience. Phil Bindley, Managing Director, The Bunker says, “In tackling and mitigating the security threat, a critical issue is a failure to securely back up email data. Many businesses assume that a cloud-hosted service, such as Office 365, comes with automatic back-up and security provisions. Unfortunately, it does not. Unless stated and agreed, vendors do not guarantee complete system security or data backup as standard, so organizations need to be careful and have a full understanding of the SLAs in place. We advise people to replace the word ‘cloud’ with ‘someone else’s computer’, to get a better perspective of the risks that need to be mitigated when deploying a cloud-based service”. The report notes that all employees, especially those at the top of the corporate ladder, need to realize that cybercriminals use social engineering, email phishing and malware to access personal accounts, and C-level staff especially need to avoid becoming the weakest link in the cybersecurity chain by adhering to regularly updated, company-wide security policies regarding data sharing and backup. Bindley adds, “Cloud offers a highly secure and cost-effective platform to defend against threats and malicious attacks. However, data stored in a public cloud typically resides outside the protection of an organization’s internal systems and many vendors do not automatically back-up data or implement security and privacy controls as standard, making it a perfect entry-point for cybercriminals to exploit. Reviewing corporate policies, with a focus on people, premises, processes, systems and suppliers will provide valuable insights into which areas to improve, and by championing a ‘security first’ corporate culture, organizations and their senior executives will be well positioned to avoid the high financial costs, reputational damage and unexpected downtime that could result from a cyberattack or data breach." Source
  4. UK to become world leader in cyber security The UK is set to become a world leader in the race to eradicate some of the most damaging cyber security threats facing businesses and better protect consumers Businesses and consumers will benefit from increased security and protections built into digital devices and online services we use every day. This is with the help of up to £70 million in government investment through the Industrial Strategy Challenge Fund and backed by further investment from industry. This investment will support research into the design and development of hardware so that they will be more secure and resilient from the outset. This aims to ‘design out’ many forms of cyber threats by ‘designing in’ security and protection technology/solutions into hardware and chip designs, ultimately helping to eradicate a significant proportion of the current cyber risks for businesses and services in future connected smart products. With cyber threats constantly evolving, the best defence in the future is seen as developing innovative solutions that can work independently and protect against threats even during attacks. The government wants to ensure that every UK organisation is as cyber secure and resilient as possible. A further £30 million of government investment will aim to ensure smart systems are safe and secure. Smart internet-connected devices can include anything from operating a central heating thermostat via a smartphone, to pressing a button to unlock the front door. There are expected to be more than 420 million such devices in use across the UK within the next 3 years. Business Secretary Greg Clark said: “This could be a real step-change in computer and online security, better protecting businesses, services and consumers from cyber-attacks resulting in benefits for consumers and the economy. With businesses having to invest more and more in tackling ever more complex cyber attacks, ‘designing in’ security measures into the hardware’s fabric will not only protect our businesses and consumers but ultimately cut the growing cybersecurity costs to businesses. “This is our modern Industrial Strategy in action. Building on the UK’s heritage and strengths in computing and cyber security alongside the government and industry investing together to ensure the UK capitalises on its position to become a leader in the growing markets and technologies of tomorrow.” Nearly all UK businesses are reliant on digital technology and online services, yet more than 40% have experienced a cyber-security breach or attack in the last 12 months. Hackable home Wi-Fi routers can be used by attackers in botnets to attack major services and businesses. Moreover, consumers are often the worst affected by mass information leaks than the organisation that held their data. Businesses are having to spend increasing amounts on cyber security, up to 20-40% of their IT spend in some cases. And as more and more systems are connected, whether, in the home or businesses, there is a need for security that is secure by design. Digital Minister Margot James said: “We want the UK to be a safer place to live and work online.We’re moving the burden away from consumers to manufacturers, so strong cyber security is built into the design of products. This funding will help us work with industry to do just that, improving the strength and resilience of hardware to better protect consumers from cyber-attacks.” Dr Ian Levy, National Cyber Security Centre’s Technical Director, said: “The National Cyber Security Centre is committed to improving security from the ground up, and we have been working closely with government to promote adoption of technology and practices to protect the UK. “We hope this additional investment will drive fundamental changes to products we use every day. This is vital work because improving hardware can eradicate a wide range of vulnerabilities that cause significant harm.” Source
  5. Why it’s important for organisations to train staff in cybersecurity Breaches are an ongoing issue that organisations face on a day to day basis. For as long as risk carries a level of uncertainty, preventing it is hard to do. But there is a difference between accepting this fact and doing nothing about it and accepting this fact and using all reasonable efforts to mitigate breaches from taking place. One of the measures observed in practice that organisations are failing to take is in training staff on cybersecurity. Here are just some of the reasons why the efforts of training staff requires more attention. Social Engineering Cybersecurity is beyond the IT team as staff play a significant part too. As the drivers of an organisation, hackers commonly use them as vectors. This is especially evident when we look at the cyber kill chain’s first stage. It requires gathering information about the target. Here are where they exploit weak spots to obtain relevant information to carry out intended attacks. Hackers use social engineering as just one of the tactics but it is the most common as they can deploy it easily. They know about the lack of training that exists amongst staff in general and it sometimes just takes targeting one person. It is important for staff to be aware of social engineering because together they make up more than the Board and IT team. Examples of areas organisations should elude staff to include social media content and being manipulated into allowing unauthorised visitors onto the work site. In addition, phishing emails are still on the rise, advancing each time and show no signs of slowing down anytime soon. Staff need training on avoiding being targets of this. Human error leading to breaches Recent articles have referred to significant flaws within organisations. As Kaspersky Lab’s recent article reveals, it still stands as one of the highest causes of breaches yet is dealt with so poorly. Organisations are not learning from other organisations’ failures reported publicly. One being with Gloucestershire Police whose employee accidentally emailed personal data belonging to victims of child abuse to unintended recipients. This is the most crucial reason as to why training is so important. Not only can errors occur from sending emails to the wrong recipients, but also by using compromised removable media, losing mobile devices containing business data and poor security management around these devices. Other Benefits Staff training should be part of an organisation’s cyber hygiene to help maintain security. Benefits of implementing training will allow the following: Staff will know what is vital information to share and with whom The more knowledge staff have the more they understand and enables staff to adopt it into their everyday operations. Cybersecurity requires a team effort as well as staff individually taking responsibility for their actions when dealing with data. An example is with software and applications. Departments tend to download and use tools that will aid with daily tasks that IT are not aware of. This is known as shadow IT. If the IT team do not know the software exists, it is hard for the team to maintain security within the organisation. If staff are made aware of the need for security and dangers around potential extensions and applications, they will know when to liaise with the IT team and other relevant employees. 3 Important factors to consider when implementing training programmes Have training for staff from the Induction stage and maintain it throughout their employment life cycle. Have an online communal area, that allows staff to continue to engage in the topic. They can also share knowledge and best practice. It is crucial to have someone lead this to keep the momentum of discussion going. An organisation can additionally carry out workshops where necessary, if possible and where there are resources to do so IT or the in-house person responsible for IT, must receive adequate training themselves to lead in maintaining security and be the point of contact for staff queries. IT staff should also be aware of the common threats and its developments to provide the organisation with appropriate technical and network security. Source
  6. How Blockchain Can Improve Cyber Security The advent of the internet and related technologies has impacted many people’s ways of life and the way organizations are run. It has led to easy access to information, necessary for running the day to day undertakings and in diverse platforms. However, all these positive impacts of the internet have also come at a cost. It has not been easy to use and depend on the internet and related technologies. With many people and organizations relying on the internet and connected systems these days, it has not been easy to secure data and computerized devices. Cyber threats have been a major issue that has been costly to solve or eradicate for good. Access to effective database backup solutions has also not been a hassle-free journey. Cybersecurity problems have been a major issue affecting millions of people and organizations on a daily basis. Solutions for solving internet threats have been limited and this incapability has affected the lives of many internet users and daunted many organizations. Cybersecurity affects the whole world. It does not just affect governments or businesses, but you can also wake up and find it hard to even use your smartphone or laptop. Anyone using the internet and computerized systems needs to understand the role of cybersecurity and figure out what incredible ways can help improve cyber threats. Cyber threats can be in the form of malware, ransomware, phishing or social engineering. These cyber-attacks have been a major challenge because many people lack knowledge and awareness about why cybersecurity is crucial. Some don’t care or pay any attention to cybersecurity whereas others lack time and money to secure their data and systems. How to Embrace Blockchain and Improve Cyber Security If you embrace cybersecurity, you will find it easy to avert cyber-attacks, identity theft, data breaches as well as be able to handle any management risk. But, is it possible? Many organizations, governments, and individuals have relied on different strategies to improve cybersecurity. They include the use of anti-virus, firewall, anti-spyware, anti-spam, backing up data as well as Windows update. All these strategies have helped in one way or another secure data and computerized systems. But, did you know blockchain is the way to go and good news to internet users? Probably you have not. Blockchain has the potential to improve cyber-attacks in many incredible ways that you should not hesitate to know. If you are among many internet and computerized devices users who don’t know what blockchain is all about, don’t get demoralized at all. It is simply a system of computers whereby information is easily stored and shared between all participants of the network. This simple definition should expose you to the incredible capabilities of blockchain that can effectively aid improve cybersecurity. Have a look; Through decentralization The decentralized nature of blockchain has played great roles in helping internet users secure their information. Through a peer-to-peer network, blockchain users have been able to maintain their activities in their network. It has become easy to ensure the chain does not breakdown or fail. If an intruder is trying to certain unauthorized data, the entire system will verify every detail and locate what diverges from what in the network. It will then exclude the block and recognize it as fraudulent. This means that everyone in the blockchain network has to verify his or her data ensuring the existing data is not easily tampered with and cannot be controlled by a single source. By tracking and tracing Many companies have over the years been facing the challenge of tracking their products as well as keeping their transactions secure. Thanks to the advent of blockchain technology, every transaction an individual or an organization makes to a block is timestamped and signed up digitally. This makes it easy for users to easily track and trace the history of transactions. It is also easy to track account and use the data whenever the need arises. Those who embrace blockchain in their transaction will be able to maintain valid data without any shortcomings. Through its sustainability Thanks to the multiple copies of the blockchain ledger, in case of a DDoS attack or related threat, an individual or organization is able to overcome these challenges and secure its data. Blockchain technology does not allow any failure that can be a threat to any confidential information By ensuring the authenticity of data Through blockchain, it has become easy to authenticate computerized systems and users without the need of providing a password. Human factor or impact of the man in the middle of cyber-attacks has been reduced via blockchain technology. All you need is to publish your public key on the blockchain. The data in your system will then be distributed across millions of nodes and connected to blocks stored on the ledger. Hence, it will be hard for intruders or hackers to publish fake public keys and your data will be secure. By guaranteeing a secure network access In many institutions, employees will need to access to a blockchain from different systems and they may end up losing their passwords or private keys. Fortunately, with REMME’s blockchain, such employees will have unique Secure Socket Layer certification and they will not require any passwords to undertake their duties. Hence, it will be hard for hackers to get unauthorized access to the network. To Sum Up If you are looking for the best and most transparent means to store your vital data, blockchain is the way to go. You will not only have a data backup solution but also an opportunity to form a block of secure data. As cyber attacks surge, you need to make a bold decision and trust blockchain technology. It’s a reliable and decentralized platform you will love. Source
  7. Senate investigation finds multiple federal agencies left sensitive data vulnerable to cyberattacks for past decade Getty Images Several federal agencies failed to update system vulnerabilities over the course of the last two administrations and left Americans' personal information open and vulnerable to theft, a report released Tuesday by the Senate Permanent Subcommittee on Investigations found. The report, spearheaded by subcommittee Chairman Rob Portman (R-Ohio) and Ranking Member Tom Carper (D-Del.) and put together after a 10-month investigation, reviewed data compiled over the last decade by the Inspector General (IG) on federal information security standards for eight agencies. These agencies were the Departments of State, Homeland Security (DHS), Health and Human Services (HHS), Transportation (DOT), Education, Agriculture (USDA), Housing and Urban Development (HUD), and the Social Security Administration (SSA). Of these agencies, the report found that seven had failed to provide adequate protection for personal information in their systems, and that six of the agencies had not installed system patches in a timely way to protect against cyber vulnerabilities. All eight agencies were found to use “legacy systems,” or those not supported by the original manufacturer anymore, resulting in further cyber vulnerabilities. Specific agency findings included that DHS, DOT, USDA, and HHS failed to address some cybersecurity weaknesses identified by the IG over a decade ago, while the SSA was found to have severe cybersecurity vulnerabilities that risked the exposure of the personal information of over 60 million Americans who receive Social Security benefits. Another major security flaw found by the investigation was that the Department of Education has been consistently unable to prevent unauthorized devices from connecting to its network since 2011. While the agency has limited this access to under 90 seconds, the IG reported that this was enough time for a malicious actor to launch an attack. “Hackers with malicious intent can and do attack federal government cyber infrastructure consistently. In 2017 alone, federal agencies reported 35,277 cyber incidents,” Portman said in a statement. “Yet our federal agencies have failed at implementing basic cybersecurity practices, leaving classified, personal, and sensitive information unsafe and vulnerable to theft. The federal government can, and must, do a better job of shoring up our defenses against the rising cybersecurity threats. Carper added in a statement that “we know that the threats posed by cyber-attacks continue to evolve and grow every day, so it is crucial that agencies across our government prioritize efforts to better protect their networks from hackers." A congressional source told The Hill that while the subcommittee, which falls under the Senate Homeland Security and Governmental Affairs Committee, does not plan to hold any hearings around the results of this investigation, Portman will consider recommendations in the report in considering any “legislative solutions.” These recommendations centered around specific actions the Office of Management and Budget (OMB) should take to ensure these agencies reach a higher level of information security. Steps include OMB ensuring the agency chief information officers have the authority to make agency-wide cybersecurity decisions, along with ensuring CIOs are regularly reporting on agency heads on information security programs. Further, the report recommended that all agencies should include progress reports on “cybersecurity audit remediation” in annual budget justifications to Congress. The report was released during a week that the information security of federal agencies will be in the spotlight, with the House Oversight and Reform subcommittee on government operations set to hold a hearing later this week to examine the results of the biannual Federal IT Acquisition Reform Act (FITARA) scorecard. This scorecard scores aspects of federal agencies’ information technology work, including cybersecurity, transparency and risk management, and the level of technological modernization. The last FITARA scorecard, published in December, awarded the USDA, the Treasury Department, and the Department of Defense overall scores of a D on these issues, while agencies including the SSA and the Department of Energy received Bs, with no agency awarded an A. Source: Senate investigation finds multiple federal agencies left sensitive data vulnerable to cyberattacks for past decade (The Hill)
  8. Artificial Intelligence in Cyber Security – Cyber Attacks and Defence Approach Artificial Intelligence in Cyber Security is always evolving, say from the old school days when AV was thought to be an effective defender to the present days where AV, SIEM, IPS, endpoint securityand protection play a crucial part in building up defenses. But with development in technologies, the existing cybersecurity controls won’t be sufficient to defend against the unforeseen and limitless cyber threats. Cyber professionals need an upper hand towards cybersecurity, and this can be offered by artificial intelligence(AI) we also call it Artificial Intelligence in Cyber Security. The implementation of Artificial Intelligence in Cyber Security has just begun, and we have a long way to go to understand and exploit its full potential. In this article, we will discuss AI, its types, examples, and applications in detail. What is Artifiicial Intelligence? A simulation of human intelligence by computers is called as Artifical Intelligence. But the simulation includes, learning, understanding, logical reasoning, and improvisation. AI can be either strong or weak based on the purpose it was created. Any AI that was created to perform only specific set of tasks is called as Artifical Narrow Intelligence. AI that is capable of self-correcting and making decisions exactly like a human is called Artificial General Intelligence (which is still a myth). Real-time examples of artificial narrow intelligence include SIRI, Okay Google, Alexa, IBM Watson, and Microsoft Cognitive Services. Different types of Artificial Intelligence in Cyber Security Reactive and limited purpose devices IBM’s Deep Blue is a chess program that was created to defeat its opponent by formulating the pieces and move combinations using permutation and combinations to deliver the best move for a given position. Same goes for Google’s AlphaGo as well. Thoery of Mind This type of AI observes user behavior based on their culture, belief, desires and more. This type of AI has not yet been developed. Memory limitations This AI won’t be able to remember everything that did occur in the past after a limited time. Self-driving cars are based on this type of AI. Self awareness AI This AI will be able to think exactly like men by analysing the situations and deciding things just like humans. This type of AI is yet to be developed. Examples of AI The common examples of AI include Automation, Machine Learning, Robotics, Self-driving cars, and Virtual AI. Robotics have incorporated AI to deliver the goods or services as promised without the blunders humans can do when the load is high and large output is in demand. Automation is again something similar to robotics, but with very less influence of AI. Self-driving cars with AI can ease things of the road, with better passenger safety if and only the AI is tested for accuracy and quality multiple times. Machine learning along with deep learning brings in the fully functional and operational artificial narrow/general intelligence. Deep learning is more like neurons of the human body, bringing the actual reflexes and emotions up for the AI. Apart from the above, Virtual Ai assistant is mostly used by businesses to bring in an extra layer of security and operational excellence to the businesses. AI Across Verticals The influence of AI is now spreading across verticals starting from healthcare, manufacturing, education, finance, law, astronomy and more. In healthcare AI assistance is preferred for fetching data on patients, their medical history etc. The ability to convert natural language into a programmable language helps healthcare to take care of outpatients and their daily routines. As we already spoke about manufacturing, AI helps in automation and other robotic operations. In the case of education, AI facilitates grading systems, and also bring doorstep education through AI-powered education platforms accessible via smartphones, tabs or laptops. Similarly it helps with law, by fetching the details of taxonomy and ontology related to it. Will AI be a boon or bane for mankind? Bane AI can cause a lot of troubles to man kind, if properly executed Artificial General Intelligence can overtake humans and can be out of control, taking non-rational decisions of its own. AI can also reduce jobs for humans, based on its speed, quality, and reliability leading to unemployment. Boon Artificial Intelligence in Cyber Security will make things simple and easy for humans, by requesting only very little efforts compared to the former times. Artificial Intelligence in Cyber Security will improve over time and will deliver improvised outputs through continuous learning procedures. Artificial Intelligence in Cyber Security will understand the malware and cyberattack over time, hence developing improved intelligence and increased defenses against cyber attacks. Narrow AI, General AI and Super AI Artificial Narrow Intelligence is little less compared to humans, with their expertise in only a narrow field of operation, for example: AlphaGo, AlphaGo Zero, SIRI, Deep Blue etc. Artifical General Intelligence will be an equivalent of human intelligence, with simple and easy ways of completing the task by analyzing and making decisions upon it. While Aritificial Super Intelligence will surpass human intelligence with increased reliability, credibility, knowledge, problems solving skills and wisdom. This is where researchers believes human mankind could go extinct. How will AI improvise cybersecurity? With AI in place researchers will be able to identify and solve problems little earlier, and bring more proactive controls based on the nature of the threat. AI can modify the security protocols based on the development of malware and the information available for it, so it would be able to self detect or prevent foreseen threats with variations. Artificial Intelligence in Cyber Security can also be used to alert the security professional for any anonymous behaviors in the network, thus giving an upper hand for cybersecurity pros and act in time to avoid becoming victim to any ransomware or remote code executions. AI can also be used to define privileges to users automatically based on their role inside the organization thus avoiding the privileged escalation flaws. It can also automate updates, decline poor patches, deploy software, and monitor system health based on the application and OS updated. Cognitive computing along with Artificial Intelligence in Cyber Security can bring in enhanced security protocols and services against hacking methodologies. Artificial Intelligence can also go in favor of hackers to break into organizations, they can communicate with command and control server more wisely to break into networks and computers within very less time. Any technological development comes with its own set of cons, but it’s the nature of humans to evolve and artificial intelligence will play a crucial part in overall and cybersecurity will also get benefited because of it. Source
×
×
  • Create New...