{"id":1264,"date":"2024-11-08T22:55:20","date_gmt":"2024-11-09T05:55:20","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1264"},"modified":"2024-11-08T22:55:23","modified_gmt":"2024-11-09T05:55:23","slug":"ai-cyberattacks","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/08\/ai-cyberattacks\/","title":{"rendered":"AI &amp; Cyberattacks"},"content":{"rendered":"\n<p>According to the International Telecommunication Union (ITU), there are 5 billion internet users in the world. This amounts to 66% of the population on planet earth. Cisco reports that they are forecasting that by 2030, there will be 29 billion networked devices driven by IoT. With such a rapid increase in technology users and devices, security concerns and risks are top of mind. Such risks are even higher with advancements in technology and new tools becoming available to threat actors.<\/p>\n\n\n\n<p>Cybercrime Magazine estimates that by 2025, the cost cybercrimes will be $10.5 trillion annually. This is a huge number. With AI powering more and more threat actors, it is important to highlight some way AI enabled attacks can be dangerous. <\/p>\n\n\n\n<p>Here are some of the possible AI powered cybersecurity concerns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI Enabled Phishing<\/strong>: AI and Language Learning Models (LLM) can be extremely useful in curating targeted phishing attacks. They can craft very convincing and believable phishing attempts that can be very successful. A study done at the University of California found that AI enabled phishing emails founded a higher success rate in cyberattacks as the LLM was able to personalize the emails and make them sound more believable.<\/li>\n\n\n\n<li><strong>Deepfake and Social Engineering<\/strong>: With new artificial intelligence tools that can create deepfakes, authenticity of information has also become dubious. They can create fake pictures, audio and videos. Threat actors can use this capability to gain access to sensitive information or systems by pretending to be the authorized individual (Jones, 2023).<\/li>\n\n\n\n<li><strong>Vulnerability Detection<\/strong>: AI is faster and better at vulnerability detection. It can help cybersecurity experts to detect vulnerable systems and patch them. Ironically, it can also be a useful tool for threat actors to quickly identify vulnerabilities in a system and exploit them (Santos et. al, 2024).<\/li>\n<\/ul>\n\n\n\n<p>These are some of the reasons we need to pay even more attention to security in the technology world. AI has enabled a plethora of great things but have also brought additional job security for cybersecurity professionals.<\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline\">References<br><\/span><\/strong>Cisco. (n.d.). Forecast for connected devices by 2030. Retrieved from https:\/\/www.speedguide.net<\/p>\n\n\n\n<p>Cybersecurity Ventures. (n.d.). Cybercrime to cost the world $10.5 trillion annually by 2025. Retrieved from https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/<\/p>\n\n\n\n<p>International Telecommunication Union. (2023). Internet users by the end of 2023. Retrieved from https:\/\/ipinfo.io<\/p>\n\n\n\n<p>Jones, N. (2023). How to stop AI deepfakes from sinking society \u2014 and science. Nature, 621(7980), 676\u2013679. https:\/\/doi.org\/10.1038\/d41586-023-02990-y<\/p>\n\n\n\n<p>Lin, J. (2023). Testing Effectiveness of AI-Enabled Phishing Attacks based on Public Information. eScholarship, University of California.<\/p>\n\n\n\n<p>Santos, O., Salam, S., &amp; Dahir, H. (2024). The AI revolution in networking, cybersecurity, and emerging technologies ([First edition].). Addison-Wesley Professional.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the International Telecommunication Union (ITU), there are 5 billion internet users in the world. This amounts to 66% of the population on planet earth. Cisco reports that they are forecasting that by 2030, there will be 29 billion networked devices driven by IoT. With such a rapid increase in technology users and devices, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/08\/ai-cyberattacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;AI &amp; Cyberattacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":689,"featured_media":1284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[33],"class_list":["post-1264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-isec603","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/Capture-600x400.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/Capture-600x600.png","author_info":{"display_name":"SHAH ZAIB","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/shah-zaib\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/689"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1264"}],"version-history":[{"count":9,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1264\/revisions"}],"predecessor-version":[{"id":1282,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1264\/revisions\/1282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/1284"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}