{"id":32188,"date":"2020-01-24T06:59:09","date_gmt":"2020-01-24T11:59:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=32188"},"modified":"2022-08-05T09:52:03","modified_gmt":"2022-08-05T13:52:03","slug":"machine-learning-ai-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/32188\/","title":{"rendered":"Artificial intelligence is transforming businesses, and it&#8217;s changing cybercrime too"},"content":{"rendered":"<p>Until recent years, artificial intelligence (AI) belonged squarely in the realms of science fiction, even though the principle itself has been around for decades. But recent advances have seen a surge in popularity, particularly in business applications. This is from several factors: there\u2019s far more data available for training AI algorithms than there ever before, more powerful computing hardware has made training deep networks easier, while cloud-based AI solutions have made the technology more accessible and affordable to businesses of all sizes. This has brought AI to the mainstream, and it\u2019s transforming business and customer experience.<\/p>\n<h2>What\u2019s AI, and why is it good for businesses?<\/h2>\n<p>The simplest definition of AI is a computer system that can derive new insight and actions from data, greater than it\u2019s programming. AI typically involves some form of pattern-recognition to predict outcomes and identify trends. Business leaders can draw upon these insights to make smarter decisions. AI, with the right algorithm, can help to derive insights from today\u2019s growing data sets.<\/p>\n<p>If you\u2019ve ever tried combing through a terabyte of data (that\u2019s equivalent to about three million printed books), you\u2019ll know that manual processes just don\u2019t cut it. AI helps make sense out of all those trillions of ones and zeros, which can have a profound impact on many business processes, ranging from marketing automation to <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-management-defense-solution\" target=\"_blank\" rel=\"noopener nofollow\">threat management<\/a> in information security.<\/p>\n<h2>AI is grouped into several categories:<\/h2>\n<h3>Machine learning<\/h3>\n<p>Machine learning is one of the most common, and it\u2019s a leading disruptor in business. It underpins many AI-powered applications by letting people teach computers how to recognize patterns in large data sets. This technology enables smarter business decision-making, as well as helping organizations protect themselves from cyberattacks with sophisticated measures like <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence\" target=\"_blank\" rel=\"noopener nofollow\">threat modeling and intelligence<\/a>.<\/p>\n<h3>Deep learning<\/h3>\n<p>Deep learning is a subset of machine learning. It\u2019s computationally intensive, using advanced artificial neural networks that allow computers to learn from their own mistakes and continually improve their functions, like the way the human brain works. This has profound implications for business automation, reducing human error in critical areas like cybersecurity.<\/p>\n<h3>Narrow, general and super AI<\/h3>\n<p>Alternatively, AI is also defined by the system\u2019s level of intelligence rather than its purpose or how it\u2019s deployed. Using this definition, we have three types of AI: narrow (ANI), general (AGI), and super (ASI).<\/p>\n<p>We already interact with ANI daily both in our professional and personal lives \u2013 common examples include personal assistants like Google Assistant, Amazon Alexa or Apple Siri. Some ANIs use <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/natural-language-processing\/31641\/\" target=\"_blank\" rel=\"noopener nofollow\">natural language processing<\/a> (NLP) to understand speech and interact with people in more meaningful and natural ways.<\/p>\n<p>Next up the hierarchy is AGIs, these are AIs that are <a href=\"https:\/\/www.ediweekly.com\/the-three-different-types-of-artificial-intelligence-ani-agi-and-asi\/\" target=\"_blank\" rel=\"noopener nofollow\">approximately as capable as humans<\/a> and able to solve tasks beyond what they\u2019re originally programmed to do, but it\u2019s still an emerging field.<\/p>\n<p>At the final level, we have ASIs, more intelligent than humans \u2013 think Terminator or The Matrix. That\u2019s still quite a long way off.<\/p>\n<h2>Protect your business from AI-powered attacks<\/h2>\n<p>The law of unintended consequences holds that the intervention of any complex system tends to create unanticipated and sometimes undesirable outcomes. Digital technologies have, in many ways, made our lives easier. Still, they\u2019ve also opened up a raft of new opportunities for criminals, not to mention challenges regarding personal privacy with big tech firms. With much of the power in the hands of organizations, business leaders must think carefully about ethical and legal implications when adopting AI.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-32190\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/01\/24065608\/cybersecurity_and_AI_inline-1024x576.png\" alt=\"cybersecurity and AI\" width=\"1024\" height=\"576\"><\/p>\n<p>While businesses use AI to improve customer experiences and automate a multitude of routine tasks, cybercriminals can use these technologies. We can certainly count on AI not being used exclusively for good.<\/p>\n<p>There\u2019s no denying that AI will transform every industry, including cybercrime. For a start, AI tools are already widely available, and many are open-source, meaning they\u2019re available for free for anyone to use and reprogram for their purposes. The malicious applications of AI are already starting to emerge as cybercriminals use the technology in ways that mimic the practices of legitimate organizations.<\/p>\n<p>Just as marketing departments are tapping into AI for precision targeting at scale, so are social engineering scammers. Other areas of misuse include creating and targeting misinformation campaigns and <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/deepfakes-2019\/28954\/\" target=\"_blank\" rel=\"noopener nofollow\">impersonating individuals through the use of deepfakes<\/a>. AI-driven insights may also help to develop dangerous malware or show insights into vulnerable systems.<\/p>\n<p>Another immediate challenge with the spread of AI comes down to people. On top of concerns that AI will displace many low-paid, unskilled jobs is the fact that people are still holding all the cards. While maintaining control might help prevent AI from going rogue, it also means that systems inherit our less fortunate human traits, as <a href=\"https:\/\/www.theverge.com\/2016\/3\/24\/11297050\/tay-microsoft-chatbot-racist\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft found out<\/a> with the embarrassing launch of its AI-powered Twitter bot Tay in 2016.<\/p>\n<p>People are still teaching computers, and, because of that, there\u2019s an innate bias reflecting society\u2019s perceptions. Or, in the case of Tay, the bad influence of social media trolls. Indeed, earlier this years, a new study found that <a href=\"https:\/\/www.vox.com\/future-perfect\/2019\/3\/5\/18251924\/self-driving-car-racial-bias-study-autonomous-vehicle-dark-skin\" target=\"_blank\" rel=\"noopener nofollow\">algorithmic bias in self-driving cars<\/a> increased their chances of failing to detect dark-skinned pedestrians.<\/p>\n<h2>Using AI for good<\/h2>\n<p>AI is here to stay. It\u2019s the next step in advancing digital technology, and a growing number of core business processes soon won\u2019t be able to function without it.<\/p>\n<p>For those who believe in using data ethically, AI is a source of hope, but, like any other technology, some will try to misuse it. To keep up with the new wave of threats as hackers exploit AI, businesses need to respond using AI-enabled tools to augment human intelligence and, consequently, strengthen their cyber defenses.<\/p>\n<p>AI offers great potential for applications as diverse as <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/healthcare-artificial-intelligence\/28464\/\" target=\"_blank\" rel=\"noopener nofollow\">medical diagnoses<\/a>, legal case resolutions and even climate modeling. But it\u2019s ultimately up to us as business leaders to determine how we can put the technology to good use.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is emerging as the first line of defense against cyber-threats, but how can it withstand the exploitation of hackers?<\/p>\n","protected":false},"author":2703,"featured_media":32189,"template":"","coauthors":[4311],"class_list":{"0":"post-32188","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-artificial-intelligence","7":"emagazine-category-cybersecurity","8":"emagazine-tag-ai"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/32188\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/21779\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/20106\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/32188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/32189"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=32188"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}