Artificial Intelligence Needs Regulation

Science fiction authors have long speculated about the possible impact of the future technology and as Artificial Intelligence becomes more widely  available, driving forward  a wide range of industrial applications, there are also some big  concerns for cybersecurity.

AI has become a most Important Technology

The global superpowers are already on a race and one noteworthy example is China’s plans to dominate artificial intelligence development.

The upcoming technology will not only replace real humans and their jobs by automating tasks, but also take decisions based on algorithms that can actively make a difference on a global scale. The real concern is how the AI will be able to defend itself from threats.

While some of the basic types of intelligent agents are already used in factories across the world, the AI of the future will be immeasurably superior.

Even though the big corporations that implement such technology in their facilities spend large sums of money for security purposes, we witness critical hacker intrusions almost every week.

World leaders are now putting cybersecurity defense as one of the most important topics of their agenda. Having this in mind, the development and adoption of secure standards for AI security is of utmost importance.
 
By considering the facts that a hacker intrusion or enemy sabotage of an artificial intelligence system can lead to modifications of the AI “core”, we must take into account that human lives can be at stake. As the technology matures it will become standard to replace human controllers and operators with automated workers for the simpler tasks.

It would not take long before AI actions will have a large impact globally. This is the reason why a thorough and in-depth revision of all current and future cybersecurity issues must be taken in account well before any AI systems are deployed in production use.

AI Cybersecurity must be both Preventative and Proactive

A rampant or hacked artificial intelligence can take over systems and networks and even interact with other similar agents to perform malicious actions. Depending on their ability to interact with the surrounding world, they can cause problems on a global scale. By design the intelligent agents are autonomous and if they "break away" from the prescribed "rules", it can be hard to predict the exact outcome of their actions.

Security infiltrations, hacker attacks and vulnerability testing against artificial intelligence beings can happen and if the criminals start their assault using large resources, then a successful attack can become reality.

Now is the time to act! Strict security standards have to be drafted and implemented even in the simplest forms of AI. This is the starting point from where future improvements to the documents will have to be made.

AI like all other "digital man-made" technologies has the potential to inflict a lot of damage if security breaches to any of its modules are caused. The implications of such malicious actions can have dire consequences upon the world, and depending on the case they may be beyond the control of the human operators.

To prevent a global catastrophe, experts from different fields must focus on hacking prevention. A proactive approach relies on the ability to respond effectively against hacker attacks.

The AI systems must be equipped with the means of knowing for themselves what a malicious action is.  To implement such a “feature”, the engineers must create detailed specifications to govern how the agents will behave when an intrusion is attempted. Such publications can be created similar to the Request for Comments (RFC), the memorandum documents that regulate the Internet.

Discussions on this topic should continue further with specific suggestions and even draft proposals. A reasonable way of going forward in this direction is by identifying common concerns among government institutions, academia and the leading industry vendors.

Every year hundreds of specialist security conferences, reports and meetings are planned. It would not be difficult to take the most popular issues that can make up the initial agenda of a proposed draft submission.
 
The world's largest technical professional organization for the advancement of technology IEEE has already started working on a global initiative regarding AI planning by creating several documents on the topic. It is important to note that the first versions emphasise on "human well-being" and safety prescriptions when working with artificial super-intelligence.

Hopefully such actions would commence soon, as the AI development industry is rapidly expanding. In our real-world case any delays can have fatal consequences.

Infosecurity Magazine:

You Might Also Read:

Artificial Intelligence: A Warning:

AI Meets Music’s Evolution:

The AI Apocalypse:

 

 

 

 

« Cyber Risk Insurance: A View From The Prudential Regulation Authority
All WiFi Networks Are Vulnerable to Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.