21
Cyber and Intelligence “From bits to information”

ch01 cyber and intelligence - Asecuritysite.com

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Cyber and Intelligence

“Frombitstoinformation”

Outline

• Understandingjobrolesincybersecurity.• Understandwhatintelligenceis.• Heuristicsanddecisionmaking.• Typesofintelligence.• Differencesbetweenhumanandmachineintelligence.

Outline

AnalogueworldDigitalworld

DAC(DigitaltoAnalogue)Convertor

ADC(AnaloguetoDigital)Convertor

1010101..0010

Sensors

Actuators(Motor)

Light,heat,movement

Outline

Industry1.0Mechanization(1760-1820)

Industry2.0Electrification(1870-1914)

Industry3.0Automation(20thCentury)

Industry4.0Digitization

(21stCentury)

Steam-powerorwater-poweredengines

Railways,factories,telegram

Electronics,Electricalgenerator,CPU,Internet,Web

Virtualization,AI,Cyberphysical,IoT

Outline

• RFC791.DefinestheformatofIPpackets(IPv4)• RFC793.DefinesTCP(TransportControlProtocol),whichprovidesthefoundationofthevirtuallyallofthetrafficthatexistsontheInternet.

Industry 4.0

“Frombitstoinformation”

6vs and 6Cs

Industry4.0brings:• 6Cs:Connection(sensorandnetworks);Cloud(computinganddataondemand);Cyber(modelandmemory);Content/context(meaningandcorrelation);Community(sharingandcollaboration);andCustomization(personalizationandvalue).

• 6Vs:Volume;Velocity;Variety;Variability;Veracity;andValue.

Cybersecurity

“Frombitstoinformation”

Cybersecurity

NISTdefineCybersecurityas:• Preventionofdamageto,protectionof,andrestorationofcomputers,electroniccommunicationssystems,electroniccommunicationsservices,wirecommunication,andelectroniccommunication,includinginformationcontainedtherein,toensureitsavailability,integrity,authentication,confidentiality,andnon-repudiation.

andinformationsecurityas:• theprotectionofinformationandinformationsystemsfromunauthorizedaccess…toprovideconfidentiality,integrity,andavailability.

Cybersecurity

NISTdefineNICEframework.Withinthis,theyoutlinedsevencorecategories;33specialtyareas;and52workroles,andthenmappedtheseto1,007tasks,374skills,630knowledgeareas,and176abilities.Thecategorieswere:• SecurelyProvision(SP);• OperateandMaintain(OM);• OverseeandGovern(OV);• ProtectandDefend(PR);• Analyze(AN);• CollectandOperate(CO);and• Investigate(IN).

Intelligence

“Frombitstoinformation”

Intelligence

Industry4.0brings:physicalsystems,IoT,CloudComputingandCognitivecomputing.

Neisserdefines:• Individualsdifferfromoneanotherintheirabilitytounderstandcomplexideas,toadapteffectivelytotheenvironment,tolearnfromexperience,toengageinvariousformsofreasoning,andtoovercomeobstaclesbytakingthought.

• Intelligenceisaverygeneralmentalcapabilitythat,amongotherthings,involvestheabilitytoreason,plan,solveproblems,thinkabstractly,comprehendcomplexideas,learnquicklyandlearnfromexperience.

Types of intelligence

• NaturalistIntelligence(naturesmart).Thisinvolvestheabilitytodiscriminatebetweenlivingthingsandtheirinteractionwiththenaturalworld.

• MusicalIntelligence(soundsmart).Thisinvolvestheabilitytounderstandpitch,rhythm,andtone,especiallyfocusedontheabilitytocreate,analyseandreproducemusic,suchasinstimulatingemotionsaroundmusic.

• Logical-MathematicalIntelligence(number/reasoningsmart).Thisinvolvestheabilitytocalculate,hypothesize,andquantifyusingmathematicaloperations.Keyskillsareto:abstract;definereasonedapproaches;andtoapplyinductiveanddeductivethinkingmethods.

• ExistentialIntelligence(lifesmart).Thisinvolvestheabilitytosearchfordeepmeaningstolife,suchaswhyweexist,andwhywemustdie.

• Inter-personalIntelligence(peoplesmart).Thisinvolvestheabilitytounderstandotherpeopleusingbothverbalandnon-verbalcommunications.Thosewiththebestabilitiesforthisaretypicallystrongcommunicatorsandcanunderstandthefeelingsandmotivationsofothers.

Types of intelligence

• Intra-personalIntelligence(selfsmart).Thisinvolvestheabilitytounderstandyourself,andhowyourelatetoothers.

• Bodily-KinestheticIntelligence(bodysmart).Thisinvolvestheabilitytomove,manipulationorinfluencephysicalobjectives,normallywiththeuseofphysicalbodymovements.Athletestypicallyhavegoodlevelsofthistypeofintelligence,butitmightalsoinvolvethosewhoareexpertincomputergames.

• LinguisticIntelligence(wordsmart).Thisinvolvestheabilitytocreateandmanipulatelanguageinordertoexpressanddefinemeaning.Greatwritersandpublicspeakersoftenhavethisability.

• SpatialIntelligence(picturesmart).Thisinvolvestheabilitytoabstractintothreedimensions.Architectsnormallyhavegoodabilitiesinthisarea,suchaswheretheyareabletoabstract2Ddrawingsintoa3Dspace.

Humans v Computers

• Learning.Humansadapttochangingsituations,andgenerallyquicklylearntasks.Unfortunately,oncethesetaskshavebeenlearnt,thiscanoftenleadtoboredomiftheyarerepeatedrepetitively.

• Strategy.Humansareexcellentattakingcomplextasksandsplittingthemintosmaller,lesscomplex,tasks.Then,knowingtheoutcome,theycanimplementtheseintherequiredway,butcanmakechangesdependingonconditions.

• Enterprise.Computers,astheyareprogrammedatthepresent,areanexcellentbusinesstool.Theygenerallyallowforbetterdecisionmaking,but,atpresent,theycannotinitiatenewevents.

• Creativity.Aswithenterprise,humansaregenerallymorecreativethancomputers.Thisislikelytochangeoverthecomingyearsastheycouldprogrammedwiththeaidofpsychologists,musicians,andartists,andwillcouldincludeelementswhicharepleasingtothehumansenses.

Humans v Computers

Humans v Computers

• Spatial.Thisistheabilitytodifferentiatebetweentwo-andthree-dimensionalobjects.Computers,evenrunningpowerfulimageprocessingsoftware,oftenhavedifficultyindifferentiatingbetweentwo-dimensionalobjectsandthree-dimensionalones.Humans,though,findthiseasy,butcanbetrickedbyopticalillusions,whereatwo-dimensionalobjectisactuallyathree-dimensionalobject.Theobjectsinleft-handsideoffigureareamixtureofatwo-dimensionalandthree-dimensionalobject.Humanscanquicklydetermineobjectswhicharedefinedin2Dandwhichin3D.

• Perception.Thisistheskillofidentifyingsimpleshapesfromcomplexones.Forexample,humanscanquicklylookatapictureanddeterminetherepeatedsequences,shapes,andsoon.Forexample,lookatthepictureontheright-handsideoffigureanddeterminehowmanytrianglesitcontains?Itisrelativelyeasyforahumantodeterminethis,astheyhavegoodperceptionskills.Thisisbecausethehumanbraincaneasilyfindsimpleshapesfromcomplexones.But,imaginewritingacomputerprogramwhichwoulddetermineallofthetrianglesinanobject,thenmodifyingitsoitfindsothershapes,suchassquares,hexagons,andsoon?

• Memory.Thisistheskillofmemorizingandrecallingobjectswhichdonothaveanylogicalconnection.Humanshaveanamazingcapacityforrecallingobjects,typicallybylinkingobjects,andfromonetothenext.Computerscanimplementthiswithalinked-listapproach,butitbecomesalmostimpossibletomanagewhenthenumberofobjectsbecomeslarge.

Humans v Computers

• Numerical.Mosthumanscanmanipulatenumbersinvariousways.Humansarebyno-wayasfastascomputers,buthumanscanoftensimplycomplexcalculations,eitherbyapproximating,orbyeliminatingtermswhichhavelittleeffectonthefinalanswer.Forexample,wemayhaveataskstofindtheapproximateareaforaroomthatis6.9metresand9.1meters?Manyhumansjustapproximatethisto7times9,andfindtheanswerof63meterssquared.

• Verbal.Thisinvolvesthecomprehensionoflanguage,andwhiletherehasbeengreatadvancesinthewaythatmachinesareabletoprocessspeech,theyareoftenstillweakerthanhumansinextractingmeaning.

• Lexical.Thisisamanipulationofvocabulary.Machinescangenerallyanalysethelexicalstructureofwrittenwork,buttheyoftenstillstruggletocreatetheirownlexicalstructures,andwhichlackinterestorevenmeaning.Theyarethusgenerallygoodatspottingspellingmistakesandatgrammarchecking.

• Reasoning.Thisisinductionanddeduction.Humanscanoftendeducethingswhentheyarenotgivenacompletesetofinformation.

Humans v Computers

Cybercrime Motivations

• Entertainment.Thisisbasicallythethrillofperforminganattack.• Hacktivists.Thisrelatestothosewhoaremotivatedbypolitical,religious,andsocialcauses.

• Financialgain.Thisrelatestothoseattackerswhoaremotivatedbyfinancialgain.• Spying.Thisrelatestothestealingofinformationfromothers,typicallyintheformofIntellectualProperty(IP).

• Revenge.Thisrelatestothosewhohavemotivationsaroundrevenge,suchasadisgruntledemployee/customer,orwhomightbesomeonewhohasbeenhumiliatedinthepast.

Cyber and Intelligence

“Frombitstoinformation”