Cybersecurity is a practice used to protect inter-connected software, hardware, and data systems from cyber threats. It can be done from an individual level to enterprises to protect these systems against unauthorized and malicious access to data volumes. This paper discusses IBM’s Watson use in handling cybersecurity, citing its advantages over other cybersecurity methods.
Figure 1. IBM AI
IBM developed a computer system
endowed with the ability to respond to inquiries framed in natural
language. This remarkable achievement is made possible by the incorporation of
advanced technologies, encompassing information processing, data retrieval, as
well as automated reasoning and learning (Jain, 2021). This innovative system
represents a fusion of human and artificial intelligence, thereby constituting
what is known as cognitive security software. This powerful software possesses
the capability to parse through vast troves of documents and extract profound
insights that might elude human perception. Subsequently, it communicates these
insights to a central security operations center. Its capability adds another
line of defense to the security of interconnected computer systems because it
spots any security breaches and unauthorized access attempts that may go
unnoticed and make the best suggestion on the best response.
With artificial
intelligence software, Watson is structured to power the Cognitive Security
Operations Centers (SOCs) by training it on cyber security language (Thiyagarajan,
2020).
It has been ingested with
over a million security documents making its database large enough to analyze
and generate large volumes of natural language reports. This system has saved
security analysts time to sift through thousands of security events that lead
to time wastage. Watson’s suitability is furthered by its ability to identify
and understand advanced threats by tapping into unstructured data like blogs
and research papers which it then compares with local security breach databases
and gives automated insights (Vähäkainu & Lehto, 2019).
In the end, IBM's Watson
offers advanced cyber intelligence by leveraging different forms of artificial
intelligence using complex machine learning algorithms. Like any machine or
software, Watson learns as it operates on customer feedback, improving its
language and response. Watson improves the defenses of computer hardware and
software by detecting fraud and hacking attempts and incident forecasting,
making it more reliable than human securities.
References
Jain, J. (2021). Artificial Intelligence in the Cyber
Security Environment. Artificial Intelligence and Data Mining
Approaches in Security Frameworks, 101-117.
Thiyagarajan, P. (2020). A review on cyber security
mechanisms using machine and deep learning algorithms. In Handbook of
research on machine and deep learning applications for cyber security (pp.
23-41). IGI Global.
Vähäkainu, P., & Lehto, M. (2019, February). Artificial
intelligence in the cyber security environment. In ICCWS 2019 14th
International Conference on Cyber Warfare and Security: ICCWS 2019 (p.
431). Academic Conferences and publishing limited.
No comments:
Post a Comment