{"id":9441,"date":"2018-12-26T05:38:33","date_gmt":"2018-12-26T05:38:33","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=9441"},"modified":"2018-12-26T06:21:08","modified_gmt":"2018-12-26T06:21:08","slug":"ai-capable-preventing-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/ai-capable-preventing-cyberattacks\/","title":{"rendered":"Is AI capable of preventing Cyberattacks?"},"content":{"rendered":"<p style=\"text-align: justify;\">Cyber-attacks are threats to governments, businesses, and institutions today. Data Breaches at the Federal Bureau of Investigation (FBI) and Department of Homeland Security exposed around 200 million personal records including high-profile data leaks. At presents its just trying to figure out what other humans are trying to do which is slow and limited.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/ai-capable-preventing-cyberattacks\/#Importance_of_Cyber_Security\" >Importance of Cyber Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/ai-capable-preventing-cyberattacks\/#Role_of_AI_in_Cybersecurity\" >Role of AI in Cybersecurity<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/ACF-2018-03Mar-Cyber_Safety__Security-860x418.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9442 aligncenter\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/ACF-2018-03Mar-Cyber_Safety__Security-860x418.gif\" alt=\"\" width=\"860\" height=\"418\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">When we look at the TOR project, it was originally intended to safeguard user privacy, but recent events have proven otherwise. Around the TOR is being used to carry out illegal activities.<\/p>\n<p style=\"text-align: justify;\">The global market for cybersecurity is estimated to reach 170 billion by 2020 according to a Forbes report. The main reason for the rapid market bump is rising technology trends and the blitz of initiatives that keep security requirements evolving. Trends like the adoption of cloud-based apps, the <a href=\"https:\/\/www.esds.co.in\/iot\"><strong>internet of things (IoT)<\/strong><\/a>; and \u201cbring your own device\u201d (BYOD) all of these factors are extending security requirement beyond anything a traditional data centre can handle.<\/p>\n<p style=\"text-align: justify;\">Cybersecurity is the buzzword right now and lately; it is being used with Artificial Intelligence. AI enabled cybersecurity programs are proving to be better at protecting and safeguarding digital information.<\/p>\n<p style=\"text-align: justify;\">Let\u2019s get a basic understanding of what cybersecurity is and why AI is preferred for cybersecurity over everything else<\/p>\n<p style=\"text-align: justify;\">Cybersecurity in the simplest terms refers to programming and coding techniques used to develop security software that helps in protecting networks, programs and valuable data from being attacked, damaged or illegally accessed.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Importance_of_Cyber_Security\"><\/span>Importance of Cyber Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">The primary function of any form of cybersecurity is protecting sensitive information, networks and systems from threats intended to access, hold ransom or steal altogether. Cyber threats vary in nature depending on the purpose of attack (e.g., malware, ransomware, application attacks, phishing). As seen in recent attacks hackers have evolved with time to launch complex automated and sophisticated attacks. This makes keeping up with advanced threats a daunting challenge, specifically in enterprise networks like the governments. Government databases store the most lucrative of secrets and data that hackers can use to cause the most damage.<\/p>\n<p><strong>Let\u2019s look at some grave cyber-threats causing havoc in the world.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Cyberterrorism<\/strong>: The attacks on WannaCry and NotPetya affected companies and organisations in more than 150 different countries and incurred losses over USD 300 million. This not only caused these companies financial setback but brought reputational damage and developed severe business interruption, and most importantly resulted in the loss of customer data. Such threats will continue to advance as terrorist organisations get their hands on new technologies and opportunities.<\/p>\n<p style=\"text-align: justify;\"><strong>Cyberwarfare<\/strong>: Modern warfare now involves attacking rival nations using information technology to penetrate networks and cause disruption or even permanent damage. Many countries now acknowledged cyberwarfare as the fifth warfare domain after air, sea, land, and space. This type of cyber-attacks carried out by experienced hackers, well-trained in exploiting computer networks, and are supported by their respective nation. A cyber warfare attack is targeted at intruding into networks and compromise data, destabilise communications and disrupt infrastructural services like public or business transportation and medical services.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Role_of_AI_in_Cybersecurity\"><\/span>Role of AI in Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Artificial Intelligence (AI) can play a vital role in helping with such threats. AI is capable of being a valuable ally when it comes to establishing a line of defence against hackers. AI can be trained to detect and learn patterns continually for any deviation in it. Machine learning is a crucial component of AI. It uses collected data to constantly improve its functions and develop preventive strategies to tackle future attacks. Its ability to learn and understand user behaviour and recognise patterns and identify slightest deviations in those patterns makes it perfect for Cybersecurity. Additionally, AI can use this information and develop its own strategies and functions as well.<\/p>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9444 aligncenter\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576.jpeg\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576.jpeg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576-150x84.jpeg 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576-300x169.jpeg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2018\/12\/AdobeStock_171462504-1024x576-660x371.jpeg 660w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">A number of Governments, Private Businesses and Corporations are using AI systems as it goes through structured data and complex, unstructured data like words, phrases, and statistics with tremendous speed saving a lot of time and money. This will help in providing proactive responses to new threats. Essentially, AI could save money as well as national secrets.<\/p>\n<p style=\"text-align: justify;\">Hackers are continually striving to beat the machines, sneaking through loopholes and cracks we don\u2019t realise exist. In the present situation, it takes months before we detect a data breach and we end up losing sensitive data while the hackers are long gone. This may not be a case when AI is in the picture, it collects data continuously and can stay prepared the next time hackers to appear. AI can detect behavioural abnormalities displayed by hackers and stop them in their tracks.<\/p>\n<p style=\"text-align: justify;\">Modern innovations in <a href=\"https:\/\/www.esds.co.in\/artificial-intelligence\"><strong>Artificial Intelligence<\/strong><\/a> and Machine Learning are proving to be the best option in the war against cyber-threats. A proactive approach keeps us safe and prepares us for the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks are threats to governments, businesses, and institutions today. Data Breaches at the Federal Bureau of Investigation (FBI) and Department of Homeland Security exposed around 200 million personal records including high-profile data leaks. At presents its just trying to figure out what other humans are trying to do which is slow and limited. When we&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/ai-capable-preventing-cyberattacks\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":58,"featured_media":9443,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1505],"tags":[1602,745,387,459,1345,1170,179,907,1469,1832,180,169,661,1334,1361,511],"class_list":["post-9441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","tag-artificial-intelligence","tag-big-data-2","tag-blog","tag-cloud","tag-cloud-computing","tag-cloud-hosting-2","tag-cloud-services","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-center","tag-data-security","tag-enlight-cloud","tag-internet-of-things","tag-iot","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=9441"}],"version-history":[{"count":3,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9441\/revisions"}],"predecessor-version":[{"id":9447,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/9441\/revisions\/9447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/9443"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=9441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=9441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=9441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}