The Future of Cybersecurity: Combining AI and Cloud Computing Ever since I was a child, I was always interested and eager to learn more about the professions I was interested in. Although my field of interest may have changed dramatically since then, my curious and inquisitive mindset has still remained the same. Today, my preferred field of interest is cyber security. Because of this, throughout the past couple months, I have been researching thoroughly in hopes to find any recent developments in the field. Through my research, one of the most intriguing advancements in the field of cyber security that I found was cognitive security. Cognitive security combines two cutting edge technologies as of today: artificial intelligence and cloud …show more content…
Cognitive hacking networks are intended to manipulate people’s behavior in a way that serves the attacker’s purpose. In order to limit the effectiveness of these attacks, cognitive security systems are designed to distinguish misleading information and prevent it from spreading. This, in turn, makes individuals less susceptible to manipulation and makes important data harder to obtain. After understanding the potential of cognitive security, it may seem like science fiction to some. However, a practical cognitive solution, called IBM Watson, has already arrived on the market. Initially created back in 2005, IBM Watson was first utilized to compete with human players in the popular game of Jeopardy. Nevertheless, as years progressed, Watson moved on from its Jeopardy days and now has found many useful applications in healthcare services, business analytics, and even cybersecurity. IBM Watson’s use in cyber security was first introduced to the public in 2016. This new application of Watson was revolutionary because it was the first artificial intelligence program designed to power cognitive security operation centers (SOCs). In fact, over the past few months, not only has Watson collected and analyzed over 1 million security based documents, but it has also helped security experts identify trends that had been never discovered before. In the next few years, Watson will be combined
Click here to unlock this and over one million essaysGet Access
The US has discussed AI issues with Japan, Korea, Germany, Poland, UK, and Italy. The issue of AI is also being discussed in the UN the G-7 and the Organization for Economic Cooperation and Development. (Source 7). During these meeting it was recommended that the US government should develop a government-wide strategy on international engagement related to AI and should have strategies to account for the influence of AI on cybersecurity. Artificial intelligence in weaponry also raises the concern of “meaningful human control” in life or death situations. This could take the humanity out of fighting, if soldiers no longer have to face the people they may have to kill, who is to say they won’t shoot anyone they suspect of doing something unsavory. This is just a concern that should be addressed when deploying artificially intelligent machines to act in place of an army. On a different note, the use of AI may be able to predict attacks prior to them even occurring. An AI monitoring tool called iAWACS, or internet airborne warning and control system, is able to comb through tweet and images and predict the general mood of digital conversation (Fung). This can be helpful in preventing attacks or riots in an area. However, there is always the concern of cybersecurity and chances of hacking that would provide false information to lead the monitors off the trail of the
With the Age of technology advancing, the more cyber-attacks are occurring. Many of our information are on computer networks and we like to think that our information is well protect. But how protected is our information? Cybersecurity bills are introduced in Congress almost every year. These bills regularly imply to permit organizations and the government to divulge dangerous information for a “cybersecurity” reason to secure and safeguard against attacks against networks and computer systems.
The Internet, as we all know, has rapidly spread around since its commercialization in the 1990s. It is evident that cybersecurity attacks are not going anywhere, and that government will continue to remain a target. In addition, the Internet of Things (IoT) growth will lead to more devices being connected to the networks. Therefore, with technology moving forward and hackers being more motivated as ever, the government finds itself struggling to keep up with effective cybersecurity measures and with filling up the designated positions in the Cybersecurity department.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51-61.
The concept of artificial intelligence was first labeled by a man named Alan Turing in 1950, he believed that the future would hold the possibility for man to communicate with computers and sustain a conversation (Atkinson, Solar 1). Although, we have reached the point where it is possible to hold a simple preprogrammed conversation with a computer and give them the ability to learn, there is still a long way to go in making computers fully artificially intelligent. Atkinson and Solar continue to describe some real world applications of artificial intelligence such as, “Data mining technologies, fraud detection, and industrial-strength optimization” (8). In these examples, forms of artificial intelligence like cognitive reasoning abilities are already being used making the demand for them higher.
Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following:
In the previous five years, cybersecurity has turned into the most looked for after calling around the world. More than 90 percent of respondents to an overview directed by the Ponemon Institute (2011) detailed being a casualty to cyberattacks amid the most recent year, costing all things considered more than $2 million for each association. This number keeps on ascending as the two programmers and security devices progress. As indicated by PwC, roughly 33% of all U.S. organizations are as of now utilizing digital protection (Lindros and Tittel, 2016).
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
In today’s world technology has evolved to the point where a large amount of information is stored in cyberspace. It is because of this type of storage people around the world have an easier time at accessing information than ever before. The time before the late 20th century gathering information was long and tedious to get a book that the library did not own would take at least a couple of weeks depending on the time period or it may not have been possible to obtain that book. But now people can access a vast amount of information in a matter of minutes. Example, in modern times if someone wanted to know about a different culture they could simple look up the information on a computer or any device that had access to
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access.
The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy