寻求利用 AI 能力的威胁行为者。类型及其目标

Petru-Dan Kovaci
{"title":"寻求利用 AI 能力的威胁行为者。类型及其目标","authors":"Petru-Dan Kovaci","doi":"10.53477/1842-9904-23-21","DOIUrl":null,"url":null,"abstract":"Artificial Intelligence’s advancement has led to ethical and privacy concerns due to the ability of algorithms to mine personal data and conduct surveillance on a large scale. The influence of Artificial Intelligence (AI) in cybersecurity extends beyond private entities and individuals. In this scenario, it is important to highlight the threatening actors and their objectives in order to counter AI-based cyber threats. We are dealing with different entities, each having its own interests: cybercriminals are interested in making profit, terrorist groups cause ideological violence and nation-states target geopolitical influence. Moreover, they are increasingly interested in developing AI-driven cyber warfare capabilities for either attacking their enemies or enhancing their defence measures against such attacks. This trend will most likely aggravate the global cyber arms race as countries compete to surpass each other in the development and deployment of AI-driven cyber capabilities. Consequently, it has become crucial for organizations and individuals to understand how AI affects cybersecurity and, thus, adapt their strategies accordingly. Traditional defences must be supplemented with AI-powered tools and techniques to stay ahead of the curve, while security experts must continually update their skills and expertise to cope with the changing threat landscape.","PeriodicalId":251956,"journal":{"name":"Strategic Impact","volume":"154 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THREAT ACTORS SEEKING TO EXPLOIT AI CAPABILITIES. TYPES AND THEIR GOALS\",\"authors\":\"Petru-Dan Kovaci\",\"doi\":\"10.53477/1842-9904-23-21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Artificial Intelligence’s advancement has led to ethical and privacy concerns due to the ability of algorithms to mine personal data and conduct surveillance on a large scale. The influence of Artificial Intelligence (AI) in cybersecurity extends beyond private entities and individuals. In this scenario, it is important to highlight the threatening actors and their objectives in order to counter AI-based cyber threats. We are dealing with different entities, each having its own interests: cybercriminals are interested in making profit, terrorist groups cause ideological violence and nation-states target geopolitical influence. Moreover, they are increasingly interested in developing AI-driven cyber warfare capabilities for either attacking their enemies or enhancing their defence measures against such attacks. This trend will most likely aggravate the global cyber arms race as countries compete to surpass each other in the development and deployment of AI-driven cyber capabilities. Consequently, it has become crucial for organizations and individuals to understand how AI affects cybersecurity and, thus, adapt their strategies accordingly. Traditional defences must be supplemented with AI-powered tools and techniques to stay ahead of the curve, while security experts must continually update their skills and expertise to cope with the changing threat landscape.\",\"PeriodicalId\":251956,\"journal\":{\"name\":\"Strategic Impact\",\"volume\":\"154 \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Strategic Impact\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53477/1842-9904-23-21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Strategic Impact","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53477/1842-9904-23-21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于算法能够挖掘个人数据并进行大规模监控,人工智能的进步引发了对道德和隐私的担忧。人工智能(AI)对网络安全的影响超出了私人实体和个人。在这种情况下,必须强调威胁行为体及其目标,以应对基于人工智能的网络威胁。我们面对的是不同的实体,每个实体都有自己的利益:网络犯罪分子的利益是盈利,恐怖组织的利益是意识形态暴力,民族国家的利益是地缘政治影响。此外,他们对开发人工智能驱动的网络战能力越来越感兴趣,以便攻击他们的敌人或加强对此类攻击的防御措施。随着各国竞相开发和部署人工智能驱动的网络能力,这一趋势很可能会加剧全球网络军备竞赛。因此,对于组织和个人来说,了解人工智能对网络安全的影响并据此调整战略已变得至关重要。传统的防御措施必须辅以人工智能驱动的工具和技术,才能保持领先,而安全专家必须不断更新技能和专业知识,以应对不断变化的威胁环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
THREAT ACTORS SEEKING TO EXPLOIT AI CAPABILITIES. TYPES AND THEIR GOALS
Artificial Intelligence’s advancement has led to ethical and privacy concerns due to the ability of algorithms to mine personal data and conduct surveillance on a large scale. The influence of Artificial Intelligence (AI) in cybersecurity extends beyond private entities and individuals. In this scenario, it is important to highlight the threatening actors and their objectives in order to counter AI-based cyber threats. We are dealing with different entities, each having its own interests: cybercriminals are interested in making profit, terrorist groups cause ideological violence and nation-states target geopolitical influence. Moreover, they are increasingly interested in developing AI-driven cyber warfare capabilities for either attacking their enemies or enhancing their defence measures against such attacks. This trend will most likely aggravate the global cyber arms race as countries compete to surpass each other in the development and deployment of AI-driven cyber capabilities. Consequently, it has become crucial for organizations and individuals to understand how AI affects cybersecurity and, thus, adapt their strategies accordingly. Traditional defences must be supplemented with AI-powered tools and techniques to stay ahead of the curve, while security experts must continually update their skills and expertise to cope with the changing threat landscape.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信