{"title":"Potential Development on Cyberattack and Prospect Analysis for Cybersecurity","authors":"Lippter Li, Kutub Thakur, M. Ali","doi":"10.1109/IEMTRONICS51293.2020.9216374","DOIUrl":null,"url":null,"abstract":"Technology and methods on cyberattack and strategy on cybersecurity always develop simultaneously. Once a knotty method of cyberattack has been created, information security specialists always react immediately and come up with a new security system that can prevent and eliminate the attack. Then, the hacker will try to find bugs from the system and perform alternative attacks. The war on security just never ends. The article tries to conclude our current information security environment and frontier battleground. The article is focused on some specific techniques such as machine learning and neural networks along with their applications on both the cyberattack side and cybersecurity side. The future predictions are made on how A.I. technology may change the current situation on information security. How attackers may use these technologies to steal user privacy and how a current security system should adapt to the evolution of cyberattack. Google has announced the realization of quantum supremacy on a quantum computer. As known, a quantum computer can solve problems required years with a current computer in seconds. This can be catastrophic to modern cryptology. The article discusses the problem and introduces potential reconstruction solutions on encryption. The ultimate goal of the article is to discuss the potentials with modern technology on information security and alarm people to be aware of these risks, also making predictions on how the future of information security will be like.","PeriodicalId":269697,"journal":{"name":"2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMTRONICS51293.2020.9216374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Technology and methods on cyberattack and strategy on cybersecurity always develop simultaneously. Once a knotty method of cyberattack has been created, information security specialists always react immediately and come up with a new security system that can prevent and eliminate the attack. Then, the hacker will try to find bugs from the system and perform alternative attacks. The war on security just never ends. The article tries to conclude our current information security environment and frontier battleground. The article is focused on some specific techniques such as machine learning and neural networks along with their applications on both the cyberattack side and cybersecurity side. The future predictions are made on how A.I. technology may change the current situation on information security. How attackers may use these technologies to steal user privacy and how a current security system should adapt to the evolution of cyberattack. Google has announced the realization of quantum supremacy on a quantum computer. As known, a quantum computer can solve problems required years with a current computer in seconds. This can be catastrophic to modern cryptology. The article discusses the problem and introduces potential reconstruction solutions on encryption. The ultimate goal of the article is to discuss the potentials with modern technology on information security and alarm people to be aware of these risks, also making predictions on how the future of information security will be like.