A battle between the spear and the shield,requires securing government-led technology.

A battle between the spear and the shieldrequires securing government led technology

“Cybersecurity is a battle between a spear and a shield. There is no way to 100% prevent cyber attacks using any technology. Therefore, experts are researching ways to gradually reduce the amount of damage even if a cyber attack occurs.”

Professor Dae-seon Choi of the Department of Software at Soongsil University said this at the ‘2024 Cybersecurity Policy Forum’ debate held at the President Hotel in Jung-gu, Seoul on the 27th. This discussion session was designed to help cybersecurity experts explore ways to ensure that all areas can lead a safe digital daily life from the rapid development of new digital technologies and the resulting threats.

Generative Artificial Intelligence (AI):

“Today’s generative artificial intelligence (AI) generates human-like text, images, audio, and video based on patterns in large-scale datasets using advanced models,” said Ji Feng Kai, a professor at Georgia State University. “There are many benefits of AI as well.” “Nevertheless, generative AI raises challenges regarding its ethical use,” he said. He added, “In the case of the Internet of Things (IoT), personal information issues such as data privacy are arising due to the nature of interconnection between devices.”

Recently, various suggestions have been presented regarding the increasing number of AI-related cyber attacks. Professor Choi said, “As a way to respond to malicious use of AI, the harmfulness of input prompts (commands) can be evaluated and detected in advance, or the harmfulness of the generated content can be subsequently censored for post-evaluation,” adding, “Harmful and risk information. “ChatGPT can change harmful content creation queries that were blocked by using a jailbreak that bypasses creation prevention techniques to produce results,” he said.

Professor Choi said, “Recently, the loss of control over cyber attacks caused by AI that learns and evolves autonomously has also emerged as a problem,” and added, “In order to respond to this, an emergency stop function must be built into all high-risk AI systems, or the AI ​​must be prevented from acting irrationally. “Safety can be ensured by removing high-risk learning content,” he said.

AI and the Cybersecurity:

Experts commonly selected AI as the cybersecurity hot topic this year. Jeong Hyeon-cheol, PM of the Information and Communications Planning and Evaluation Institute, said, “Cyber threats caused by AI are becoming popular, and cybersecurity before and after the emergence of generative AI such as ChatGPT is clearly different.” He added, “The emergence of generative AI led to the popularization of hacking. “Voice phishing, which cost a lot of money in the past, can now be easily accessed through ChatGPT,” he pointed out.

Lee Ki-ju, Chairman of the CISO Council, said, “As so many terms related to AI have appeared this year, both the general public and those in charge of work in the field tend to be confused about which concept is higher.” He added, “This may result in instability in AI. “It is desirable to list the risks and announce how to respond to them and what preparations government agencies are making,” he said.

Cybersecurity agenda:

It was suggested that securing technology is a key cybersecurity agenda for the government next year. PM Jeong said, “Support for securing technology needs to be strengthened, and it is difficult for the cybersecurity industry to grow without technology.” He added, “Recently, many new technologies have emerged and the paradigm is changing, and technology must be secured accordingly for the industry to grow and to attract good human resources.” “You can also enter the cybersecurity field,” he said.

Cho Young-cheol, Chairman of the Korea Information Security Industry Association, said, “In order to increase the domestic pie in cybersecurity and increase investment by CEOs, we must increase the level of awareness of related technologies.” He added, “Personal Information Security Management System Certification (ISMS-P). “There is a need to revitalize the system, and the current disclosure system can be used to ensure that zero trust network security strategies are established in companies.

By 24webs.com

Leave a comment