Artificial intelligence

In a fast developing world like ours, new easy ways are presented on how to deal with certain life challenges. With time easier ways are invented. It started from striking two stones together to making a matchbox which is less heavier and easy to use. Then it moved over time to the production of lighters. Now in a smart house with the touch of a button from the central remoter the light in the fireplace is lit. Artificial intelligence, was developed to assist man. It is called artificial cause it is man made. Man creates this intelligence. The intelligence attached to its name means that it is further developed to the point that it does not needs man’s constant support and attention to function. This items invented and structure with this artificial intelligence, are programmed in a way that they respond to certain impulses with a follow up action that responds and counteract with each other thereby giving it the ability to handle situations without the interference of a human being. It is for this capability that it is called intelligence. The fireplace which evolve from striking two stones has reached the level that it has been adjusted with the room temperature and it has been programmed to automatically light up is the temperature of the environment goes below a particular level. That is how it works with most of the other aspects of life which Artificial intelligence has been introduced to. Artificial intelligence basically makes use of automated response. This will be explained further. Right now attention will be drawn to this artificial intelligence and its place in security maintenance and management. Before we go into that, it is important to understand a few types of Artificial intelligence machines. This will assist us in understanding how they work and apply in the field of security.

First we have the reactive machines. Like the fireplace we mentioned above this type of Artificial intelligence and the modality of the technology working the automated fireplace we used in our illustration. Reactive machines only function as a response to the already programmed activity from the environment. In the place of the fireplace, it has been programmed to turn on when the temperature in the room is below a certain number. The automation process is not given the leverage to act the way it wants. It can only react to what it was given nothing more. The second type of Artificial intelligence is, Limited memory. A good example of this type of automated machines are the Smart self driven cars. They may not know everything however within the area they are programmed to operate, they look into and possess some very limited knowledge on how to deal with those events but the special thing about them is that the memories are not just reactive. They have the ability to choose from a number preinstalled responses, how to respond to every given situation that it may face. The third type is the automated machines with heightened self awareness. This part is still far from our creation however in the are of robotics something close to that has been created. We see robots functioning as guards and some functioning as waiters in a diner. This is only but the start of this level of Artificial intelligence development. Before long at this Rate of development, before, long we will see this different type of artificial intelligence machines walk among us.

Security Management

Artificial intelligent represents a situation where machines are positioned to do the smart and calculated work without human guidance or intervention. In security therefore Artificial intelligence represents a situation where the machine are and there intelligence are used to identify and stop Cyber threats with less human intervention. Human beings will be involved no doubt but less man power will be needed as the human being handling in will only be there on a maintenance and supervisory position. This is because the machines have been fully programmed on how to detect this Cyber attacks and kill it before they go any further. Normally the humans has to be on ground, eyes on the computer to know when or how the attacks will happen. A human can only do so much. He cannot be everywhere at the same time. That is our limitation as human beings. Some very hidden back doors can be accessed and before the technician in charge of the security understands what is going on data has been tampered with or lost. What most of this automated Security responses do is to first identify the threats. Being an artificial intelligence they have the capability to be able to cover a wide range of places that normally the human cannot. Now it could either alert the human being of the impending danger, or react with a couple of defensive measures already preinstalled to stop the Cyber attack without completely disrupting all the computer activities. Now where the attack is so complicated that there is no preinstalled program to combat with it the security system may shut down completely. A form of artificial security system that we all know the pin code requirement in our smart phones. We are asked to putt in the code with three or four attempts after which the phone shuts down completely. Another very popular Artificial security service is when opening google mail from a new devices. The security systems in check will ask from your log in details and still go further to send a notice to the already opened account to inform you of an attempt to open your account. Think for instance that somehow a person had his log in details move into the wrong hands. However when they tried to open the account from miles away the person gets the notification and there is a place where the person could click for the attempt to be stopped completely and his account to be restored. On Facebook the two step verification is also in place. Opening your account from a different devices will first require confirmation of a security number sent to either your mail or the mobile number used to activate the account. This are very common places artificial intelligence plays an great rule to help preserve security. In the house we have smart houses with motion sensors cameras. Mostly what they do is get the owner of the house aware of the situation of this in his apartment. Now there is the burglary alert where the owner of the house opens the door and has some seconds to type in a security number or a burglary signal is sent to the police and a follow up patrol team arrives the area for proper investigation. This signals are automatic. Being preinstalled they only require time to time maintenance and nothing more.

Privacy.

This has been identified as one of the very negative fallout of automated security. An individual will have his data in so many cloud storage devices where it could be used by hackers for something even more sinister should it be acquire. Some of these security measures may claim to be completely personalized but we have even seen some social media outlets taking down people’s social media account. Most times we cannot really say that they made really awkward and unforgivable mistakes, but this is the idea of lack of security. We could see that even some of these computer browsers are not secure. From the sites you have visited certain adds we be popping up on the screen. It will be a reflection of complete lack of conscience to call it just a coincidence. A very concerning area of this complete violation of privacy is in the place of facial recognition for our mobile phones and the requirement of finger printing. This makes the a regular person ponder on the safety of this personal effects on the storage device of a phone and how safe it is. Some company Artificial intelligence security measures in running simulations to look out for possible threats look through the personal information of its employees. They are saved in the company’s computer it maybe under their specialized password but the simulation being carried out by the artificial intelligence security system has laid all of this bare and open. Privacy is still a major challenge in the usage of artificial intelligence. A challenge that could soon be handled.

Systems integration and Analysts

Take for instance a smart house. The work of the artificial intelligence is not just to make living easy for for by creating a system where most of the thinking and easy decisions and reaction will be done by an already programmed machine, it also finds a way to integrate all this activities so that they can be easy to operate by the human. In a smart house this is done by putting all of the automated functions of the house in a tablet which only the owner can access to enable him to not have an integrated control of the house but a holistic analytic capability.

Automation.

This simply means automatic. It is the execution of actions by a machine which will also have the power to without human interference beside preinstalled programming, detect, investigate identify incoming Cyber threats, arranging them in order of importance and also in some other cases combating these threats.

By Doug Ruhl, VP of Business Development

Strategic Security Corp.