Artificial Intelligence Cybersecurity For Dummies
Artificial Intelligence Cybersecurity For Dummies
Newer database types have arisen that are allowing for data to
be distributed across the Internet, making data access to mobile
applications much more efficient. These are called NoSQL databases,
one popular example being MongoDB. As you might expect, a query
language is not used to retrieve data from a NoSQL database. There
are different types of NoSQL databases that use various methods
of storing and retrieving data, but they have not proven immune
to injection attacks. Entire books can be written about injection
attacks. Suffice it to say that malicious code can be fed to NoSQL
databases like MongoDB or the superfast in-memory database
NodeJS. There are tools for checking the data sent to these new
databases, but they aren’t perfect.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Forcing users to have longer and more complicated passwords
and changing them regularly has also forced them to write them
down. The alternative to writing down the password is using one
of the new secure password managers. Yet, some of the password
management services have been hacked, and you can never be
really certain that you aren’t using a malicious clone program.
Two-factor authentication has gotten some of this under control.
This works by requesting a code sent to an app on your phone or
to your email before allowing access to untrusted computers. But,
the password is largely dead, and there is now a huge move to
implement better biometrics like facial recognition, voice print-
ing, fingerprinting, skin sensitivity, and heart sounds, or combi-
nations of these.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
else.” This is done by mimicry, making yourself look like some-
thing not as appetizing as you otherwise might be. The other is
completely the opposite. It says, “Come here. Tastiest meal ever.”
Yes, that’s right, the mousetrap.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
containing a honeytoken is stolen, you know where it was stolen
from. The same thing happens when honeytoken email addresses
or accounts are used. Cartographers do this same thing when they
add a fake street to a map just to prove that someone copied their
map. This is a good segue into what to do next, respond.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In addition to threat response, there is a move to make software
application development more secure as well. Integrating cyber-
security into the phases of software development helps manage
the risk involved in releasing software that will immediately be
attacked by hackers looking for mistakes and vulnerabilities. Code
is everywhere. It’s tempting to downplay the software running
on a smart refrigerator, but if it sits on a local area network, it’s
a point of vulnerability and its code is just as important as any
productivity application. Nothing is overlooked by anyone want-
ing to pierce the network. Nothing should be overlooked by those
wishing to protect it. The result of a network intrusion can have a
huge impact on organizations large and small.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Predictive Analytics
Cybersecurity professionals use analytics to detect anomalies
in network patterns, network traffic, and normal user activi-
ties. Exploits are identified by their signatures (known patterns
of attack). These are the identifying methods that the malware or
attacker has used to gain entry into the network. Network analy-
sis software alerts the security team when a signature attack is
recognized. That’s all well and good for real-time monitoring
but it most always means that the deed was done. Cybersecurity
has moved on from a complete reaction to activity to one where
networks are managed based on risk. Each entity involved in the
network’s activity is scored based on the risk. You can think of
this like having a credit score, which is also a form of predictive
analysis.
Predictive analytics gives you a look into the future, albeit fuzzy.
One approach, which you might call an “on the doorstep” sce-
nario is being able to identify an intrusion without having a prior
signature. Machine learning in AI actually learns how to recog-
nize patterns far better than a human. By analyzing all kinds of
previous attacks machines have begun to have a “gut feeling” or
predictive ability about what might be an attack, even if it doesn’t
match a previously known signature.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
goal is to examine this network data and apply everything it has
previously learned to augment a human-led security team.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Both humans and machines can cause false positives. How often
have you rebooted a machine because some program has gone
crazy and started eating up all the memory and CPU cycles in your
machine? Or perhaps a user suddenly decides he needs a local
copy of that multi-gigabyte database and starts a download, trig-
gering a traffic alarm.
Software can also cause false positives. Programs that have not
been tested for security before release can cause a nightmare of
protocol violations that would appear to any good security pro-
gram like an attack but is really just untested software running
on your network.
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
fades from importance. Put a little facial recognition on that
chime and suddenly you’re paying more attention, as information
about each person appears on the screen. Correlate shopping data
from a frequent shopper card, and then you have a powerful tool.
“Hello Mr. Smith, we have a new crop of bananas now available
on the endcap of aisle 6.”
These materials are © 2018 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.