Cyber Security Essay

Decent Essays

The Future of Cybersecurity: Combining AI and Cloud Computing Ever since I was a child, I was always interested and eager to learn more about the professions I was interested in. Although my field of interest may have changed dramatically since then, my curious and inquisitive mindset has still remained the same. Today, my preferred field of interest is cyber security. Because of this, throughout the past couple months, I have been researching thoroughly in hopes to find any recent developments in the field. Through my research, one of the most intriguing advancements in the field of cyber security that I found was cognitive security. Cognitive security combines two cutting edge technologies as of today: artificial intelligence and cloud …show more content…

Cognitive hacking networks are intended to manipulate people’s behavior in a way that serves the attacker’s purpose. In order to limit the effectiveness of these attacks, cognitive security systems are designed to distinguish misleading information and prevent it from spreading. This, in turn, makes individuals less susceptible to manipulation and makes important data harder to obtain. After understanding the potential of cognitive security, it may seem like science fiction to some. However, a practical cognitive solution, called IBM Watson, has already arrived on the market. Initially created back in 2005, IBM Watson was first utilized to compete with human players in the popular game of Jeopardy. Nevertheless, as years progressed, Watson moved on from its Jeopardy days and now has found many useful applications in healthcare services, business analytics, and even cybersecurity. IBM Watson’s use in cyber security was first introduced to the public in 2016. This new application of Watson was revolutionary because it was the first artificial intelligence program designed to power cognitive security operation centers (SOCs). In fact, over the past few months, not only has Watson collected and analyzed over 1 million security based documents, but it has also helped security experts identify trends that had been never discovered before. In the next few years, Watson will be combined

Get Access
Get Access