男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
Global EditionASIA 中文雙語Fran?ais
Business
Home / Business / Technology

Experts warn of potential risks from AI

By He Wei in Shanghai | China Daily | Updated: 2019-11-29 07:44
Share
Share - WeChat
A visitor touches an automated hand at an exhibition during the second CIIE in Shanghai on Nov 6, 2019. [Photo by Zhu Xingxin/chinadaily.com.cn]

Organizations urged to focus more on data protection and security controls

You turn on your Taobao app and a list of shopping items comes up.

A lipstick of your preferred color. A dress that matches your newly-purchased top. The next book to read based on your browsing history.

While people enjoy the perks of smart recommendations powered by artificial intelligence, those mind-reading algorithms, if not properly handled, could be manipulated with malware and create new cybersecurity threats.

Diana Kelley, the cybersecurity field chief technology officer at Microsoft Corp, said hackers will increasingly use AI to make malware more destructive. This will emerge as among the top five trends for the global cybersecurity landscape in 2020.

"The rise of AI capabilities provides new opportunities for attackers to create malware that hides from detection while hunting down targets," she said. "It's already in use but often goes un-detected."

According to the 2019 Poneman Institute report, the global average cost of a data breach is $3.92 million. Unfortunately, it normally takes organizations an average of 206 days to identify a data breach, and another 73 days to contain it.

Technology advancement has always been a double-edged sword. AI and cloud computing are revolutionizing the customer experience but they pose new threats to cybersecurity.

Around 55 percent of millennial consumers aged 23 to 38 surveyed by consultancy IDC said they like some websites and mobile apps to be personalized to fit their interests.

As a result, 40 percent of the data collected by companies throughout the customer journey will be used to create a better product and a bespoke experience.

As the internet of things and cloud greatly expand the number of devices and the amount of data they gather, the area of attack by hackers widens just as sharply as well.

"It gives us more signals we could also take in and consume for security purposes too," Kelley said. "And because of the cloud, we can see attacks around the globe, and respond around the globe very quickly."

She said an overarching approach for companies creating customization while protecting customer privacy is to collect only what is needed and be transparent.

"Companies should be clear and transparent with your customers about what you are collecting, how you are using and protecting that data, and ensure that you got consent from them so they have the knowledge that their data are being collected," she explained.

Cathy Huang, associate research director of Services and Security at IDC, agreed. She said: "If your company doesn't have a strong policy, that's going to be a potential problem."

Organizations must build a program that incorporates defense in depth and implements fundamental security controls, Kelley said.

"We must consider how operations will continue after a catastrophic cyberattack and build systems that can both withstand the attack and be instantaneously resilient," she stated.

Microsoft invests over $1 billion annually on cybersecurity research and development. Kelley called for nurturing cybersecurity talents to include people in different trades like law and communications.

Top
BACK TO THE TOP
English
Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
CLOSE
 
主站蜘蛛池模板: 亳州市| 宜兰市| 阜阳市| 鹤庆县| 昆明市| 治县。| 古田县| 铁岭县| 壤塘县| 武山县| 邯郸县| 梅州市| 西吉县| 印江| 宝丰县| 团风县| 云安县| 塘沽区| 东兰县| 曲周县| 边坝县| 余庆县| 阿拉善左旗| 余庆县| 淮南市| 长春市| 玛曲县| 靖江市| 苗栗县| 昆山市| 镇坪县| 阿拉尔市| 朝阳市| 天台县| 仁化县| 仁寿县| 自贡市| 德格县| 拜泉县| 安阳县| 如皋市| 聂拉木县| 乌恰县| 嘉禾县| 苗栗县| 青州市| 宁河县| 盖州市| 疏勒县| 沧州市| SHOW| 东阳市| 竹山县| 鄂州市| 郴州市| 长泰县| 巴青县| 兴海县| 石柱| 古蔺县| 措美县| 中牟县| 读书| 恩平市| 高清| 偏关县| 阜城县| 虞城县| 长宁县| 卢龙县| 桦南县| 松溪县| 池州市| 泗阳县| 桐城市| 通化县| 房产| 永川市| 融水| 文成县| 嘉峪关市| 长岛县|