Tag Archives: #cybersecurity

AI in cybersecurity

Reading Time: 3 minutes

Artificial intelligence is quickly becoming an integral part of cybersecurity. It is used to improve the effectiveness of traditional security methods, such as intrusion detection and threat analysis, and to develop new security methods that were not previously possible.

What specific tasks does artificial intelligence solve in cybersecurity?

Analysis of user and system behavior

By analyzing user and system behavior, AI is used to identify anomalies that could indicate an attack. For example, AI can be used to track the following parameters:

  • Number of login attempts from one IP address
  • Changes in network usage
  • Requests for access to resources that the user does not normally have access to

AI can use a variety of techniques to analyze user and system behavior, including:

  • Statistical analysis. AI can use statistical methods to identify anomalies that fall outside expected values.
  • Machine learning. AI can use machine learning to train models that can detect anomalies based on their knowledge of previous data.

Malware detection

In malware detection, AI is used to analyze the behavior or code of the malware. For example, AI can be used to identify the following signs of malware:

  • Attempts to hide your presence
  • Using new or unknown methods
  • Targeting specific systems or data

AI can use a variety of methods to detect malware, including:

  • Signature analysis. AI can use signature analysis to find known malware by comparing its behavior or code to known examples.
  • Behavioral analysis. AI can use behavioral analysis to identify anomalous program behavior that may indicate malicious activity.
  • Code analysis. AI can use code analysis to identify malicious functions or code snippets in programs.

Threat Forecasting

Threat forecasting uses AI to analyze data from previous attacks to identify patterns that may indicate new trends or techniques. For example, AI can be used to identify the following patterns:

  • Types of systems or data that are most likely to be attacked
  • Times of day or days of the week when attacks most often occur
  • Methods that are most often used to carry out attacks

AI can use a variety of techniques to predict threats, including:

  • Statistical analysis. AI can use statistical methods to identify patterns in data from previous attacks.
  • Machine learning. AI can use machine learning to train models that can predict future threats based on their knowledge of previous data.

Incident Response

In incident response, AI can be used to automate the processes of attack investigation and system recovery. For example, AI can be used to:

  • Automatic collection of data from systems and applications that may be useful for investigation
  • Automatically detect data anomalies that may indicate an ongoing attack
  • Automatic recovery of systems and data that were damaged by attack

AI can use a variety of techniques to automate incident response processes, including:

  • Automation of tasks. AI can be used to automate tasks that are typically done manually, such as data collection, data analysis, and systems recovery.
  • Making decisions. AI can be used to make decisions about how to respond to an incident, such as what data to collect or what actions to take.

Examples of AI solutions in cybersecurity

There are many AI cybersecurity solutions on the market that use different methods and technologies. Here are some examples of such solutions:

  • SIEM systems. SIEM (Security Event and Information Management) systems use AI to analyze large volumes of security event data to identify suspicious activity.
  • Intrusion detection systems. Intrusion detection systems (IDS) use AI to detect attacks on networks and systems.
  • Intrusion prevention systems. Intrusion prevention systems (IPS) use AI to prevent attacks on networks and systems.
  • User behavior analysis systems. User behavior analytics (UEBA) systems use AI to analyze user behavior to identify suspicious activity.
  • Malware detection systems. Malware detection systems (IDS) use AI to detect malware.
  • Threat forecasting systems. Threat prediction systems use AI to predict future threats.

Conclusion

AI is a powerful tool that can be used to improve the efficiency and accuracy of cybersecurity threat detection and prevention. As AI continues to evolve, it will play an increasingly important role in protecting our systems and data.

Sources

https://chat.openai.com

Tagged ,

Google stores over 50 milion Americans’ medical records – Project Nightingale

Reading Time: 2 minutes

We all know, that leakage of personal data isn’t anything new nowadays. There are many reasons for collecting your data by big companies. Many of them focus on earning money, by targeting ads based on data concerning your behavior and interests. In Project Nigtigale’s case, however, Google aims at something much bigger.

Project Nightingale owes the name after Florence Nightingale who was an English social reformer and the founder of modern nursing in the 19th century. Project Nightingale is a data storage and processing project made by Google Cloud and Ascencion, which set on foot in early 2019. Their main goal is to design new software using artificial intelligence to predict or more quickly identify medical conditions and suggest changes to patients care. Additionally, the company aims to create a search tool that collects patients’ data into a central location. Google is said to be using medical records of more than 50 million American people from 2600 hospitals in 21 states. The shared data includes patient names and their dates of birth, along with doctor diagnoses, lab records, and hospitalization results. Health data was stored on an Ascension-owned virtual private space.

Despite its great purpose, patients and physicians across 21 states haven’t been informed about their data sharing. Because of this, there were many speculations about whether is this project morally equitable. David Feinberg – the head of Google Health – responded to all criticism.  Due to his position – a physician – he said, that he understands that health information should be private and as he refers – Google is not permitted to use that for marketing or research purposes. However, we can’t be sure that the personal pieces of information were strictly sheltered. People are afraid of the potential break-in by hackers.

The Office of Civil Rights of HHS is demanding more details about Project Nightingale to ensure HIPPA (Health Insurance Portability and Accountability Act) protections have been implemented.

.

.

.

.

.

Would you give up your personal data for the development of medical care in the future?

Share with us your opinion!

 

 

Author: Maciej Dziurdzia

Sources:

https://geek.justjoin.it/projekt-nightingale-google-dane-medyczne/

https://www.beckershospitalreview.com/cybersecurity/10-things-to-know-about-project-nightingale.html

https://www.theguardian.com/technology/2019/nov/14/google-healthcare-data-ascension

https://www.nytimes.com/2019/11/11/business/google-ascension-health-data.html

 

 

 

 

Tagged , , ,