Search This Blog

Friday, September 8

Let's Discuss: IBM Watson AI

 Cybersecurity is a practice used to protect inter-connected software, hardware, and data systems from cyber threats. It can be done from an individual level to enterprises to protect these systems against unauthorized and malicious access to data volumes. This paper discusses IBM’s Watson use in handling cybersecurity, citing its advantages over other cybersecurity methods.



                                                            Figure 1. IBM AI

 

IBM developed a computer system endowed with the ability to respond to inquiries framed in natural language. This remarkable achievement is made possible by the incorporation of advanced technologies, encompassing information processing, data retrieval, as well as automated reasoning and learning (Jain, 2021). This innovative system represents a fusion of human and artificial intelligence, thereby constituting what is known as cognitive security software. This powerful software possesses the capability to parse through vast troves of documents and extract profound insights that might elude human perception. Subsequently, it communicates these insights to a central security operations center. Its capability adds another line of defense to the security of interconnected computer systems because it spots any security breaches and unauthorized access attempts that may go unnoticed and make the best suggestion on the best response.

With artificial intelligence software, Watson is structured to power the Cognitive Security Operations Centers (SOCs) by training it on cyber security language (Thiyagarajan, 2020).



Figure 2. IBM Supercomputer

 

It has been ingested with over a million security documents making its database large enough to analyze and generate large volumes of natural language reports. This system has saved security analysts time to sift through thousands of security events that lead to time wastage. Watson’s suitability is furthered by its ability to identify and understand advanced threats by tapping into unstructured data like blogs and research papers which it then compares with local security breach databases and gives automated insights (Vähäkainu & Lehto, 2019).

In the end, IBM's Watson offers advanced cyber intelligence by leveraging different forms of artificial intelligence using complex machine learning algorithms. Like any machine or software, Watson learns as it operates on customer feedback, improving its language and response. Watson improves the defenses of computer hardware and software by detecting fraud and hacking attempts and incident forecasting, making it more reliable than human securities.

  



References

Jain, J. (2021). Artificial Intelligence in the Cyber Security Environment. Artificial Intelligence and Data Mining Approaches in Security Frameworks, 101-117.


Thiyagarajan, P. (2020). A review on cyber security mechanisms using machine and deep learning algorithms. In Handbook of research on machine and deep learning applications for cyber security (pp. 23-41). IGI Global.


Vähäkainu, P., & Lehto, M. (2019, February). Artificial intelligence in the cyber security environment. In ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS 2019 (p. 431). Academic Conferences and publishing limited.


 


No comments:

Post a Comment

Let's Discuss: NIST 800 -53

Q1. How flexible is NIST Special Publication (SP) 800-53?   NIST SP 800-53, a regulatory body of standards, establishes security control gui...