Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views4 pages

Cyber Security

The document discusses two main cybersecurity trends - the rise of artificial intelligence and 5G development/adoption of IoT devices. For AI, it can both help combat cyberattacks by proactively identifying threats, but also be abused to enable new cybercrimes if not properly regulated. 5G and more connected IoT devices increase vulnerabilities like software exploits and lack of hardware security controls. Stronger standards are needed from manufacturers and network operators to ensure user data and network integrity are protected against evolving cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Cyber Security

The document discusses two main cybersecurity trends - the rise of artificial intelligence and 5G development/adoption of IoT devices. For AI, it can both help combat cyberattacks by proactively identifying threats, but also be abused to enable new cybercrimes if not properly regulated. 5G and more connected IoT devices increase vulnerabilities like software exploits and lack of hardware security controls. Stronger standards are needed from manufacturers and network operators to ensure user data and network integrity are protected against evolving cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Nowadays, technological advancements are very useful and play an important role in

the daily lives of people all over the world. It makes our interaction and communication
more diverse and effective even in the remote part of the world. However, as digital
transformation continues to improve and innovate from more advanced methods, it
poses a threat when it comes to our personal data since there is a chance of data
leakage and making it more vulnerable who have access to the internet or IoT.
According to (Dor, 2020), the main cybersecurity trends that are likely to occur starting
from 2020 are the “cyber cold war” continues to intensify, the rise of artificial intelligence
(AI), means of communication will become more weaponized, 5G development and
adoption of IoT devices which increase vulnerability, and the enterprises will rethink
their cloud approach. This research paper will focus only on the rise of artificial
intelligence (AI) and 5G development and adoption of IoT devices.
The Rise of Artificial Intelligence (AI)
Artificial Intelligence is considered one of the drivers and a game changer when it
comes to the world of technology. It utilizes various purposes that address and
simplifies problems in a faster and more efficient way. It can be cited that AI plays an
important role during the peak of the COVID-19 virus, it helps the expert and
researchers to develop treatments and vaccines at a faster rate. Some of the
applications of AI are in healthcare systems, combating and preventing natural
disasters, social media, and in business and manufacturing industries. However,
utilizing artificial intelligence (AI) has been abused by various people and organizations
for the sake of their personal interests. It can also be used to proxy crimes which makes
it more dangerous since AI is fast-paced technology which means cybercrimes and
cybercrime rates can go skyrocket if not prevented immediately.
Proper use of AI can also provide a system that will combat the related problems when
it comes to AI cybersecurity. The use of the traditional and old systems in combating
cybersecurity incidents are proven ineffective due to its slow process since it only
recognizes a threat and waits only for the notification of the users before they can come
up with a solution to counteract, which makes the organizations or individual susceptible
to cyber-attacks.
It can be cited that the only way to combat the continuously evolving range of emerging
threats in the cyber world is to establish a protection system that proactively detects and
identifies the attacks once it appears and adapts in a certain system. AI can analyze
and interpret millions of data sets and analyze their behavior and manner of threats in
just a short period of time.
There are established systems in AI that can be used by organizations for their
cybersecurity measures.
1. Intrusion Detection Systems
The main objective of the intrusion detection systems is to compare and contrast an AI-
derived model of network behavior to locate and identify irregularity that indicates
malicious activity or policy violations that result from a breach within the system
parameter. Those malicious activities are instantly reported to the central security
information and event management system of a certain industry.
2. AI can be built into endpoint security solutions at the hardware level
Integrating AI into the endpoint security solutions at the hardware stage will provide
protection for the devices against possible emerging threats. It will prevent the methods
of gaining unauthorized access to a network before it is embedded into the security
software of an establishment or system.
3. Artificial Intelligence for IT operations (AIOps)
AIOps are comparable to intelligence officers, the main difference between them is that
an AI is implemented to collect a huge range of malicious data based on previous
experience or from multiple sources. However, not all malicious activities can be
detected easily since some of the cases have unique individual behavior which makes
them undetectable.
4. Create advanced Malware Analysis Tools
Machine Learning can be maximized to develop malware analysis tools that can use as
preventive measures in cybersecurity attacks. Also, to keep pace with the series of
complex hacks and scams that many industries or individuals experienced. It will
prevent cyber criminals from constantly developing malware since there is a malware
analysis tools that can easily provoke and invalidate their malware or malicious
software.

5g Development and Adoption of IoT devices increase vulnerability


In the Philippines, the 5G network is still in the developing stage. The availability of 5G
partially improving since many telecommunications operators is investing in the said
technology. Some industries, establishments, and individual users have already utilized
the 5G networks so that they can experience and maximize a faster internet connection.
According to (Shein, 2020), 5G networks pose a greater security risk since it is more
vulnerable to cyberattacks compared to other types of available networks. There 5 ways
in which 5G development and adoption of IoT devices increase its vulnerability to
cyberattacks.
1. The First point is that the 5G has changed from a centralized, hardware-based
switching to distributed, software-defined routing. It has no “hardware choke
points” in which cybersecurity measures can be implemented so that cyber
attacks can be controlled and addressed quickly.
2. In 5G networks, the higher-level network functions are now digitalized in which it
is performed using virtualized software which makes it prone to cyber-attacks.
3. The software vulnerabilities of the 5G networks are in a locked-down state and it
is governed and monitored using their implemented software. However, cyber
hackers can easily target the software that they use and instantly gains control
and manage the network itself.
4. Since 5G aims to have a faster internet connection worldwide, it needs additional
bandwidth to have a faster data transfer rate which creates an additional
possibility of cyber-attacks.
5. Smart devices are the most crucial part of 5G networks when it comes to
cybersecurity. The smarter devices use a 5G network and attach to an IoT
network, the vulnerability of a network to cyberattacks will also increase.
Preventive Measures for 5G Network Operators and those who Manage IoT
Devices
The 5G network security is heavily dependent on IoT devices. The manufacturers and
developers of IoT devices must be trustworthy when it comes to the hardware, software,
and configuration of the entire device. By means of that, 5G network operators can
operate smoothly and implement their technology without the risk of getting a cyber-
attack.
 Identities and Data
 Security and Privacy
 Developers and Manufacturers’ compliance with agreed security and policies,
end-to-end
Cybersecurity in IoT devices can be enhanced by making sure that patches are
implemented in the form of software updates only. They also conduct a quality
assurance test before became available in the market. They must ensure that there are
no open ports or possible entry points for cybercriminals.
5G network operators should enhance their regulations and policies regarding their
technology since it is the main reason why the year 2019 is considered the worst year
for cybercrime. Establishing a powerful and advanced technology like 5G networks
requires also a strong and complex cybersecurity foundation.
Synopsis
For me, I selected the rise of artificial intelligence and 5G development and adoption of
IoT devices as the main trends for cybersecurity because the majority of the users use
this technological advancement, and it is the most common among the other trends.
Artificial Intelligence is the most advanced technology when it comes to cybersecurity, it
is proven that it can combat and prevent any cyber-attacks using AI. However, the
biggest threat is that cyber criminals also utilize AI to perform and embed malicious
activities on a certain system. It will become a cybersecurity trend in the future since
technologies keep improving and gearing towards the autonomous stage in which AI
and robots are very evident and diverse. Regulations, Standards, and Laws must also
improve and revised so that cybercrime-related incidents in Artificial Intelligence will be
solved and not abused by cybercriminals.
For them, 5G networks and the adoption of IoT devices, my take is that the operator of
telecommunication companies must coordinate with the manufacturers and developers
of IoT devices. There must be standards and regulations that might follow so that the
data of their users are not accessible to anyone and cannot easily breach by any
unwanted or unauthorized person. It will become the main trend in cybersecurity for the
next succeeding years because the 5G network is one of the latest technologies and not
all countries are already using this type of network. Many people or users that have an
IoT device are still relying on the old networks, and they are not familiar with or aware of
the 5G network which makes them vulnerable to cyber-attacks. Lastly, IoT devices must
be regulated and must be properly checked if they undergo quality assurance so that
they can be guaranteed that it is not susceptible to any data breach or data leakages.

References
Dor, D. (2020). These will be the main cybersecurity trends in 2020 . Check Point
Software Technologies, 1-4.
Shein, E. (2020, March 2). 5G and IoT security: Why cybersecurity experts are
sounding an alarm. Retrieved from TechRepublic:
https://www.techrepublic.com/article/5g-and-iot-security-why-cybersecurity-
experts-are-sounding-an-alarm/

You might also like