Mentor's Musings on Security Standardization Challenges and Imperatives for Artificial Intelligence of Things (original) (raw)
Related papers
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Modern network and computing scenarios are characterized by a complex continuum spread across a variety of technological and administrative domains. For instance, cloud infrastructures are used to offload personal devices, IEEE 802.11 and 4G/5G connectivity allow ubiquitous mobility, and low-power communications and edge/fog computing enable to integrate cyber-physical systems in the daily routine. Moreover, software platforms are not characterized anymore by clear and precise technological and functional boundaries. In fact, modern smart services often span over multiple actors, e.g., product vendors, telcos, proprietary Software-as-a-Service deployments, as well as several nations (possibly with incompatible laws). As a consequence, the Internet is a mixed collection of IoT devices, traditional hosts, wearable and mobile devices as well as individuals. Needles to say, its increasing human-centric nature accounts for a huge load of sensitive data, which can be considered one of the...
March 2015 Proceedings Mag - Cyber Security - R2 (1) (1) (1)
Traditional "network-centric" cyber defenses intend to prevent a thief from reaching data, while new "data-centric" cyber defenses assume the thief will reach it. The new defenses make information hard to find and impossible to read. The difference between the old and new approaches is profound. By changing the balance of power between predator and prey, it introduces a new priceperformance curve for cyber security.
Emerging Threats and Innovative Solutions in Cybersecurity: A Comprehensive Review
International Journal of Advances in Computer Science and Technology , 2024
Cybersecurity norms give a structured approach to manage and assess cybersecurity pitfalls. In moment's fleetly evolving technological geography and advanced software development, the rise in cyber security attacks has come a pressing concern. This comprehensive review paper delves into the dynamic realm of arising pitfalls and presents a collection of innovative results. Navigating through the rearmost challenges faced by digital ecosystems, the paper not only identifies implicit vulnerabilities but also explores sliceedge strategies to fortify our defences. In this work, we conduct a relative study to identify AI-driven trouble discovery to blockchain-grounded security fabrics, this review encapsulates the van of cybersecurity, offering a witching trip through the evolving battleground of digital protection. Our ideal is to help associations elect the most suitable security controls for their specific requirements and to simplify and clarify the compliance process.
Exploring Recent Challenges in Cyber Security and Their Solutions
2021
The running era can be termed as an era of the internet, as the use of the internet is increasing day by day. Every coin has two sides, so is the coin of the internet. One side shows the ease of communication, sharing information, marketing, and businesses, etc with the use of the internet. On the other hand, it brings a crucial concern on the security part. Cybersecurity is the field that promises to safeguard the network, data, electronic devices, servers, computers from malicious attacks. By cybersecurity, we mean staying ahead of hackers and preventing exploitation of the system. Hackers are getting smarter day by day, thereby bringing new challenges to cybersecurity experts. News about threats like ransomware, phishing, vulnerability exploits, IoT-based attacks, etc, run around us most of the time nowadays. The current study describes well-known common challenges and discloses some new challenges in cybersecurity and suggested possible solutions to overcome them.
The Current Trends, Techniques, and Challenges of Cybersecurity
European Journal of Information Technologies and Computer Science
Recently, the world witnessing rapidly growing in using computer systems based on networks, and no doubt that most of the systems are running over the internet which become a normal regular issue for governments, companies, organizations, institutions, and individuals. and the majority of these systems rely on using various cloud computing services that consequently at the same time have many advantages and disadvantages, and one of the disadvantages is that some security issues are arising, and these systems sometimes are increasingly affected by the number of security threats, and by default, the threats become troubles that gained the concerns of companies and governments. where researchers work hard to find solutions to those threats. Now the demand for finding tools techniques and skills for cybersecurity professionals has become an essential issue. This paper highlights the important aspects of cybersecurity such as Cybersecurity Institutions of cybersecurity, Attacks and Atta...
Redefining Cybersecurity with AI and Machine Learning
2019
In the age of digital transformation with adoption of Cloud and mobile computing and ever-increasing Internet of Things(IoT) devices, the cybersecurity risks and threat levels are increasing at a rapid pace. The data is spread across systems, devices and cloud leading to growing attack surface and increased frequency of the security attacks. IoT is extended to drones, driver-less cars, industrial equipment, smart buildings, consumer goods, home appliances leaving us with more vulnerable attack points. Organizations needs to have effective information security management system (ISMS) in place to proactively detect, react to security threats with reduced time to discover any potential breach. This paper highlights how Artificial Intelligence(AI) and Machine Learning(ML) can redefine cybersecurity to detect, prevent organizations from security threats and data breaches.
Emerging Cybersecurity Architectures and Methodologies for Modern Threat Landscapes
International Journal of Computer Science and Information Technology Research (IJCSITR) , 2024
The rapid advancement of digital ecosystems, fueled by globalization, cloud migration, and expanding connectivity, demands cybersecurity frameworks capable of countering sophisticated and ever-evolving threats. Traditional perimeter-based security models are increasingly inadequate against the complexity of modern cyberattacks. This paper explores cutting-edge cybersecurity paradigms, including Zero Trust Architecture (ZTA), serverless computing for dynamic network profiling, enterprise-scale threat modeling, and resilient strategies designed for next-generation connectivity. Through this examination, we propose a cohesive approach to creating adaptive, scalable, and resilient cybersecurity systems, offering actionable insights to address the intricate challenges posed by evolving threat landscapes and technological innovations
Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).
Cybersecurity in the Era of Artificial Intelligence: Risks and Solutions
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), 2024
Researchers from Darktrace, a global leader in cybersecurity AI, saw a 135% spike in unique social engineering attacks from January to February 2023, coinciding with the broad usage of ChatGPT, which was made public in October 2022. With the advancement in electronic attack methods, different facilities are looking for ways to protect their data and technology systems. To do this, they must adopt more proactive methods to overcome these threats. Thus, Artificial intelligence (AI) proved its capabilities to face such threats. The current study aimed to identify the applications of AI and the importance of the role it plays in information security applications and the era of cybersecurity. This paper relies on quantitative data published by international organizations and research centers. Through adopting the descriptive approach, the results of this investigation show that the important step for progress is in the level of Information Technology (IT) infrastructure protection. For IT, it is necessary to use AI. Taking all these things into consideration, the results suggest that AI will strengthen the barrier between your systems and cyber threats.