Cyber ​​security

Many shopping centers have their own SBS-cars, who will take out a misbehaving customer or a dangerous person if necessary. Not only physical spaces need protection, but also internet ones (various clouds or sites). We call this protection cyber security. NFQES also offers services in this area, in the field of security.

Article content

Positive impacts of artificial intelligence on cyber security

Biometric logins are currently one of the most used logins. It is about logging into the device using a fingerprint, palm or retina. We can use them as a separate service or use several of them at once. Most new smartphones already use these functions. Large companies cannot avoid hacker attacks, where email addresses, personal information or passwords are often compromised. Cyber ​​security experts often point out that passwords consisting of numbers and letters are very vulnerable. Precisely because of this fact, biometric logins are a positive impact of artificial intelligence on cyber security. Cyber ​​attacks are often pre-planned. It is for these types of attacks that artificial intelligence should be effective. Some companies are trying to teach artificial intelligence the ability to predict exactly given attacks through complex algorithms, thanks to which artificial intelligence will be able to recognize even the smallest signs of incoming attacks (ransomware, malware) and isolate them from the system.

Disadvantages and limits of artificial intelligence for cyber security

The potential of artificial intelligence, which we mentioned in passing above, is only a fraction of what cyber security could achieve. Despite its potential, there are limits that prevent it from becoming a major tool for use in this area. In order for a company to be able to train artificial intelligence, it has to provide it with a lot of data, which is resource-intensive, and the training time can take longer than expected. Some companies simply cannot afford these options. Another weakness presents the possibility for the other party, hackers, to train “their” AI to be immune to AI-based cybersecurity. In Slovakia, there was a new National Unit for the resolution of incidents, the so-called national CERT/CSIRT (Computer Security Incident Response Team Slovakia). Today, the National CSIRT is an organizational unit of the Office of the Deputy Prime Minister for Investments and Informatization. There is a graph on their website that shows the various incidents recorded in Slovakia.

Resources

The author of the article is

Miroslav Rechtorík