Cyber Security and Artificial Intelligence

Cyber security is the practice of protecting Systems, Networks and Programs from Digital attacks. These cyber attacks are usually aimed at accessing, changing or destroying sensitive information, extorting money from users or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. One well respected framework can guide to explain how to identify attacks, protect systems, detect and respond to threats and recover from successful attacks.
Types of Cyber Security Threats
1) RANSOMWARE - A type of malicious software. Designed to extract money by blocking access to files or the computer system until ransom is paid. Paying ransom does not guarantee that files will be recovered or the system restored.
2) MALWARE - A type of software designed to gain unauthorized access or to cause damage to a computer.
3) SOCIAL ENGINEERING - A tactic adversaries use to trick you revealing sensitive information. They can solicit monetary payment or gain access to your confidential Data. It can be linked to with any of the threats listed above to make you more likely to click on links,download malware or trust a malicious source. 
4) PHISHING - A practice of sending fraudulent E mails that resembles Emails from reputable sources. Aim is to steal sensitive data like Credit Card numbers and Login information. It is most common type of cyber attack.
Below are five tools that employ Artificial intelligence for cyber security -
1) TAA TOOLS (Symantec's Targeted Attack Analytics) - Used to uncover hidden and targeted attacks. It applies A.I. and Machine learning to the processes, knowledge and capabilities of Symantec security experts. TAA tools analyzes incidents in the network against incidents found on their Symantec Threat Data leak.
2) X SOPHOS INTERCEPT TOOL - The tool uses Deep learning Neural networks that work similar to Human Brain. Before file is executed, the tool can extract millions of features from the file, conduct in-depth analysis and determine whether file is benign or dangerous in 20 milliseconds. This results in a high level of accuracy for existing Malware and Zero-day malware.
3) DARKTRACE ANTIGENA - It extends core capabilities to detect & replicate Digital antibody functions that identifies & Neutralize threats and viruses.       
4) IBM Q RADAR ADVISOR - Use cognitive reasoning to provide critical insight & further accelerate the response cycle.
5) HIGH PRIORITY RISK IDENTIFICATION - With this tool, one can get critical insights about
an incident, such as Malware has been executed or not with evidence to focus on time threat of higher risks to make a quick decision of best response method for your business.

                                            - - - - - - - - - - -  -


Comments

Popular posts from this blog

Qualities Of A Good Prime Minister

IMF suggestions for India Growth Rate

Working Of Nuclear Plant and Generation Of Energy

Artificial Intelligence on Business Forecasting

FDI - Foreign Direct Investment- Types And Essentials

Satellite Prediction Of Floods In India

Tools To Measure Economic Progress Of A Country

US Dollar - Effects in the modern economy

Economy of UAE

Devaluation and causes for Foreign Exchange rates variation