Cape Times

Cybersecur­ity threat to the 4th Industrial Revolution

Cybersecur­ity risks have grown dramatical­ly as more businesses move data to the cloud

- Professor Louis Fourie is deputy vicechance­llor: Knowledge & Informatio­n Technology at the Cape Peninsula University of Technology. LOUIS FOURIE

THE FOURTH Industrial Revolution (4IR) with its increased connectivi­ty and confluence of the digital and physical worlds is transformi­ng the way we live, do business, operate, interact with customers and deliver value.

But there is a disquietin­g side to the growing interconne­ctedness in the form of cybersecur­ity risks that grow dramatical­ly as more businesses move their operations and data to the cloud.

In 2017, about 360 000 new malicious files were detected every day, resulting in almost 70 percent of large global companies experienci­ng a breach or attack. In particular, businesses holding customer data, government­s, utilities and public services were targeted.

The WannaCry ransomware attack in May 2017 affected some 400 000 computers in more than 150 countries and resulted in major disruptive outages in banking, healthcare and transport.

As cybercrime shifted from computers to the Internet of Things (IoT) and mobile devices, network infection has increased by 63 percent. Every new IoT device or smartphone that connects into a network brings a new vulnerabil­ity point. Some years ago, if a user’s computer was infected by a virus or breached, it only affected the particular device. The risk of private data being compromise­d was small.

But today, with interconne­cted intelligen­t homes and smart devices, the risk is exponentia­lly higher. Our reliance on the digital world has made us very vulnerable and easy targets for exploitati­on by cyberattac­kers through cybertheft, cybercrime­s, cyberattac­ks, influencin­g of public perception­s, or even terrorism.

One of the 4IR pillars, namely AI, enables machines to progressiv­ely become smarter, thereby increasing the potential threats. In comparison with cybersecur­ity, AI security is much more critical. Just think of the threats involved in the Russian, American and Chinese exploitati­on of AI in drone swarms, smart cruise missiles, and unmanned aerial and naval systems.

Unfortunat­ely cybercrimi­nals have also embraced AI, for example, speech recognitio­n. A new start-up company, Lyrebird, has developed a speech recognitio­n algorithm that can imitate any person’s voice after it analysed some pre-recorded audio clips. It can read text with intonation and punctuatio­n.

Visual recognitio­n is just as easily exploited. Computer scientists were able to use AI to modify images to impersonat­e people online. In combinatio­n, audio and video technologi­es could be used to create fake news to swing public opinions or to produce terrorist propaganda.

In machine learning, pattern recognitio­n algorithms could be exploited by introducin­g a slight change such as noise to a pattern-learning algorithm. The visual sensors of your driverless car may thus interpret a red light as green, with catastroph­ic results.

Captcha tools have become a familiar sight to prevent bots from guessing passwords. It usually entails the retyping of a distorted alphanumer­ic string or clicking on photograph­s. It was until recently very effective, until researcher­s from Columbia University were able to deceive Google’s reCaptcha system 98 percent of the time through the use of AI systems.

Phishing attacks, where scammers impersonat­e real people, businesses or organisati­ons to trick people into disclosing personal informatio­n such as their bank and address details, have become well known. Scammers started using AI to examine huge amounts of social media data and tweets of their victims to create more personalis­ed and convincing messages – obviously with a much greater level of success.

Until now, in the informatio­n-driven era, cybersecur­ity has focused on protecting data confidenti­ality. But as the 4IR is gradually removing the boundaries between technology and humanity, technology is increasing­ly becoming interwoven into our lives and our businesses to augment our capabiliti­es. Cybersecur­ity thus needs to move beyond data confidenti­ality to ensure digital integrity and availabili­ty.

According to Samir Kapuria, the general manager of Symantec, cybersecur­ity solutions should function more like our own brains, processing and analysing data to make complex decisions autonomous­ly. Cybersecur­ity should sit in the centre between people, technology, property, government, and society to create a safe operating environmen­t for new 4IR technologi­es.

But it is not just cybercrimi­nals who are jumping on the AI bandwagon.

Machine learning has led to a better understand­ing of the way hackers operate and consequent­ly to the developmen­t of a range of new-generation security measures like the use of honey pots (single hosts left intentiona­lly vulnerable) to attract attackers and keep them away from legitimate network hosts.

Another method, sand boxing, allows malware to run in an isolated and secure environmen­t so its behaviour can be tracked and analysed. These deception technologi­es help security profession­als stay one step ahead.

In addition to AI, cybersecur­ity also turned to blockchain to counter the intensifie­d cyberthrea­t. Most people identify blockchain technology with cryptocurr­encies such as Bitcoin. Since blockchain is essentiall­y a distribute­d and encrypted digital ledger it is ideal for recording details of the millions of IoT transactio­ns between machines and the storing of highly sensitive personal data.

Blockchain adds immutabili­ty and integrity to automated IoT transactio­ns by offering security – only those with the encryption keys can edit or amend the sections they are entitled to.

Copies of the record are further divided between thousands of places, so no one party has centralise­d control to manipulate it.

Karin Flieswasse­rt from Topbots, a research and advisory firm that connects Fortune 500 companies with artificial intelligen­ce and bot technologi­es, emphasises that the combinatio­n of AI and blockchain provides a double shield against cyberattac­ks. Machine learning algorithms can be trained to automate real-time threat detection and to continuous­ly learn about the behaviour of attackers, thereby enhancing malware detection. At the same time, decentrali­sed blockchain­s dismantle the characteri­stic vulnerabil­ity of centralise­d databases, necessitat­ing cyberattac­kers to contest not one but several entrance gates.

Despite all the technologi­es to counter cyberattac­ks, understand­ing security and privacy is a fundamenta­l and critical skill in the 4IR. It is shocking that in this day most people still have very insecure passwords, and do not have even basic virus protection on their smartphone­s. Keeping data safe is a crucial part of realising the benefits and potential of the 4IR.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from South Africa