Tuesday, June 25, 2019

AI & Cyber security


Artificial Intelligence Cyber security
As the new ways & means are available to all bad hackers or Data theft resources we need to life the vial from such threats and build a tools to tackle these known & somewhat unknown threats.  The world of cyber security has improving day by day. Signature-based solutions, whitelisting, application controls, and heuristics fail in the modern threat landscape. As attackers have learned to automate malicious code and vary it to flood an enterprise until a breach occurs. And the reality is many enterprises, from mid-size organizations to multi-national brands, have likely been infiltrated without detection.
Artificial intelligence (AI) is the attempt by humans to make machines smart. Intelligence is such an important part of what makes humans unique that until recently the embodiment of intelligence in a machine was almost always accompanied by a humanoid robot. Today, along with the development of smart devices that assist us, one of the important goals of AI is to provide answers we would never arrive at by finding those answers within our own massive archives of information.
AI may prove to be the largest advancement in human technology since the start of the industrial revolution. Once conceived only in science fiction, AI is finally here and impacting daily life.

For many years, traditional AV vendors operated using the same model: detect and respond. Now a data science company has introduces a new paradigm applying AI to pinpoint bad actors in your network, prevent malware and other threats, and protect against both known and unknown attacks.
We can achieve a level of security and endpoint protection previously unavailable when you employ AI based prevention. Moreover, you can attain a superior compromise assessment, ROI, and efficacy. AI and machine learning have reinvented endpoint protection by providing predictive, preventative security that proactively stops attacks before they impact critical systems. Traditional antivirus requires layers of technology and a first victim, and they can’t prevent never-before-seen or unknown threats. AI and machine learning predict and protect systems pre-execution, before an attack occurs, and without a sacrificial lamb. With fewer security layers, network traffic, and memory use, you can reach greater than 99% effectiveness against attacks, while saving time, money, and resources.
India Training Services provide services to audit such AI & all other security threats in a periodic manner at an economical rate. This helps an enterprise or Multi-national organization to relax and worry about more critical business goals.
Business Case: When you protect through AI based prediction and prevention, you allow cyber security to go from business inhibitor to business enabler. Let’s build some good segregated points on this. The means you elevate threat protection from a tactical objective to a strategic mission by supplying:
  • Streamlined Operations: Eliminate the need for EPP firewalls, device controls, host IPS, data loss prevention, and encryption, while stopping undetected malware and avoiding ransomware using one simple solution
  • Decrease Incidents and Prioritize: Transform your IT from reacting to events to proactively securing your environment. Remove mundane tasks that get in the way of strategic projects like virtualization, cloud security, and IT automation
  • Enhance Business Continuity: Fortify against enterprise attacks meant to breach your network, steal credentials, and exfiltrate data. Keep from making the next news headline, while ensuring service to customers
  • Improve Compliance: Meet government regulations, from healthcare to financial to critical infrastructure industries, as well your internal security policies, with greater protection efficacy

AI not only improves efficacy, but it also changes the deployment model and makes cyber security implementation and operation a seamless, smooth process. Because of the advanced features of machine learning, you no longer employ traditional AV technology and tactics, including:
  • Incremental storage
  • Scanning machines
  • Re-imaging machines

Moreover, you can remove large endpoint agents that create performance friction for enterprise users. You also eliminate the tedium of taking machines offline during periodic scans.
AI and Machine Learning Provide:
  •  A comprehensive assessment using science and big data analytics
  •  Greater ROI that eliminates tens of thousands of help desk tickets
  • Prediction and prevention of threats pre-execution without a cloud connection and time-wasting daily updates
  • A streamlined approach that removes layers of technology and redundant incident response tools


AI and Machine Learning Help You:
  • Use minimal system resources (1-2% CPU usage and 40-50 MB of memory)
  • Prevent attacks with superior speed (in milliseconds)
  • Replace ineffective traditional AV tools (or augment existing security)
  • Achieve efficacy rates of greater than 99% (compared to 50-60% with antiquated signature-based AV)


The benefits
Simple
Organizations can protect endpoints with fewer system resources and reduce network and user impact. When they change their cyber security approach to pre-execution, they begin to remove layers of technology. Thus, costs are significantly lowered and they begin to discover ways to consolidate infrastructure. Its easy to deploy and secure your entire enterprise, whether it is 100 or 100,000 endpoints.
Seamless
You can predict and protect across platforms, operating systems, file types, and devices with AI and machine learning. It easily integrates into existing SIEM platforms and works in OEM and embedded devices. In addition, it provides continuous protection for security from system- and memory-based attacks, malicious documents, zero-day malware, privilege escalations, scripts, and potentially unwanted programs.
Silent
You can reduce alerts, helpdesk tickets, re-imaging requests, and impact to users when you empower your endpoints with AI based security. You also diminish the need for fire drills and incident response because you eliminate the threat before it manifests. Bolster your endpoint security by using an intuitive web console and simple SIEM integration, with no need for inconvenient signature updates or scan schedules.

For some non-IT friends lets understand some techy mumbo-jumbos

Malware & Virus: These are the small programs that once they infect a computer replicate themselves and attempt to send the replicated version to another computer, much in the same way a biological virus infects its host.
Most of the virus programs impact the computers on which they find themselves by destroying or altering data.
The computer worm is a type of malware, which like a virus, does its best to replicate and spread itself. Unlike viruses that need a host program in which to be spread, worms are standalone programs that can spread completely on their own. They do the same kind of damage as a virus.

The Trojan is malware named after a mythical wooden horse used by the Trojans more than 2,700 years ago as a peace offering to Sparta. Once the Spartans brought the Trojan horse within the walls of Sparta, soldiers hidden inside were able to attack and defeat Sparta.

Trojan computer malware is often disguised as legitimate software programs. Any number of social engineering methods are used to get people to download and install the Trojan. Once installed, it usually works to give access to a malicious third-party. 

Unlike viruses, they don’t replicate themselves. They rely on the con game to get people to infect their own computers. 
Intrusion involves security breaches not caused by a program that has breached your defenses. I know it is probably improper to define something based on what it isn’t. But with non-malware intrusion that’s the easiest way to encompass such a broad arena of attack vectors. It generally doesn’t involve a virus, Trojan, or other malware file. Generally, a non-malware attack is an attempt to breach a computer or network using software you trust, like Microsoft Office or the Windows Management Instrumentation (WMI). Even though the first two examples were
Windows-based the software commonly used in these types of attacks can run on many other operating systems, such as Linux (and all its variants).
SSH, the Secure Socket Shell, is a hacker’s dream. It’s the administrator’s “back door.” It provides remote command-level access to whatever operating system is running SSH. Today, that would be all of them.
Database Security : Structured Query Language (SQL) is the query language for many modern databases. Malicious instructions can be embedded into an SQL database, causing it to return the contents of the entire database (commonly referred to as an SQL injection). This can be done by entering the code into a user input field in a web form.  This code then gets embedded as a user field in the SQL sent to the database.
This is an old exploit, and today’s enterprises have updated their database query codes to eliminate this kind of attack. One method is using something known as parameterized SQL statements. This pulls the user input information out of the actual SQL statement itself and places it into parameters that are passed along.
This kind of programming has largely defeated the SQL injection attack. But, there are many unpatched systems out there. It’s a bit of work to go through and recode all those SQL calls in your program.

2 comments:

  1. This is a long pending article I had in mind just posting still lots of work need to be done

    ReplyDelete
  2. Better to predict the risks amd impacts.Good topic

    ReplyDelete