{"id":3158,"date":"2023-11-23T19:16:19","date_gmt":"2023-11-23T19:16:19","guid":{"rendered":"https:\/\/cybrela.com\/?p=3158"},"modified":"2025-04-15T07:47:34","modified_gmt":"2025-04-15T06:47:34","slug":"role-of-ai-in-cyber-security","status":"publish","type":"post","link":"https:\/\/cybrela.com\/en\/role-ai-v-kyberneticke-bezpecnosti\/","title":{"rendered":"The role of AI in cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3158\" class=\"elementor elementor-3158\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0cdb44 e-flex e-con-boxed e-con e-parent\" data-id=\"c0cdb44\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fe9c9 elementor-widget elementor-widget-post-info\" data-id=\"e6fe9c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-35ca655 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tTobi\u00e1\u0161 Trnka\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-ccc7c75 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>23. 11. 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a638903 e-flex e-con-boxed e-con e-parent\" data-id=\"5a638903\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6175210b elementor-widget elementor-widget-text-editor\" data-id=\"6175210b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<h2 class=\"wp-block-heading\">Artificial intelligence (AI) \u2013 the perfect tool or a double-edged sword?\u00a0<\/h2>\n\n\n\n<p>Like any modern field, the field of cyber security must inevitably \"follow the trend\" - and one of the biggest trends in recent months is artificial intelligence, its use and making it available to the public. For example, the popular ChatGPT was tried by more than 1 million users a week after its launch on 11\/30\/2022, and this number grew more than a hundredfold by January 2023. But how does the meteoric rise of artificial intelligence translate into the world of security risks?&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Let's look at the bright side first.<\/strong> Various AI capabilities such as machine learning (creating a model based on sample data and using it to make predictions or decisions) today give us the ability to work with quanta of data that would take humans a disproportionate amount of time to analyze. Artificial intelligence can therefore not only detect unusual patterns of behavior or weaknesses in large networks, but also predict potential threats before an actual attack occurs. AI can also help create secure systems with intelligent security rules that are able to automatically respond to new threats. Such systems can then easily perform security audits and monitor network activity. (more information on how machine learning can be used, for example in<a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/ai-cybersecurity\" data-type=\"link\" data-id=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/ai-cybersecurity\" target=\"_blank\" rel=\"noopener\">this article<\/a>)&nbsp;&nbsp;<\/p>\n\n\n\n<p>Artificial intelligence can be a very good helper even in the \"ordinary\" automation of certain tasks, thus saving time and resources. According to an analysis by IBM Security, in 2021, teams using AI took nearly 14 weeks (99 days) less to detect, respond to and \u201crecover\u201d from a cyber attack than teams that <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/9NGZA7GK\" data-type=\"link\" data-id=\"https:\/\/www.ibm.com\/downloads\/cas\/9NGZA7GK\" target=\"_blank\" rel=\"noopener\">were not using AI<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Unfortunately,  all that glitters is not gold \u2013 and equally, not every aspect of AI is positive, and this is doubly true when it comes to cybersecurity. Unfortunately, there are many ways AI can be misused to attack secure systems.&nbsp;<\/p>\n\n\n\n<p><strong>An easy way artificial intelligence can be misused<\/strong>, is to let it create DeepFake videos to spread disinformation or Phishing. A great \u2013 and chilling example \u2013 is when hackers extorted \u00a3220,000 from the CEO of a British energy company by DeepFake a voicemail from his \"supervisor\" (the full story is described <a href=\"https:\/\/securityintelligence.com\/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware\/\" data-type=\"link\" data-id=\"https:\/\/www.forbes.com\/sites\/jessedamiani\/2019\/09\/03\/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\/?sh=44dee2912241\" target=\"_blank\" rel=\"noopener\">here<\/a>. The use of the aforementioned Chat GPT is also very popular in this field. This tool can be used to create email messages used for Phishing - very efficiently and with minimal effort. Likewise, AI can be used to create fake profiles and accounts that try to obtain sensitive information from users or to defraud them.&nbsp;<\/p>\n\n\n\n<p>Another example is Malware using artificial intelligence. Such Malware is capable of \"learning to think for itself\", i.e. adapting its course of action to the situation and targeting the systems of its selected victims individually, unlike \"regular\" malware which targets a large number of people with the intention of successfully attacking a small percentage of them. Already in 2018, IBM was able to create Malware called \"DeepLocker\" to demonstrate the existence of such a threat. (more about DeepLocker for example <a href=\"https:\/\/securityintelligence.com\/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware\/\" data-type=\"link\" data-id=\"https:\/\/securityintelligence.com\/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware\/\" target=\"_blank\" rel=\"noopener\">here<\/a>)&nbsp;&nbsp;<\/p>\n\n\n\n<p>Last but not least, the ability of \"machine learning\" can easily be turned into a security risk. AI, thanks to its ability to analyze large amounts of data, can detect security flaws in the system. So if used by an attacker, it can be taught how to break security and cause damage.&nbsp;<\/p>\n\n\n\n<p>So most AI features that can make our daily lives easier can just as well be used against us. Overall, AI poses a cybersecurity challenge and must be treated as such \u2013 like a sharp knife that not only cuts easily, but also cuts you easily.&nbsp;&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI): the perfect tool or a double-edged weapon? What are the opportunities and threats of AI in cybersecurity?<\/p>","protected":false},"author":3,"featured_media":8050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[48,46,47],"class_list":["post-3158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-ai","tag-kyberbezpecnost","tag-umela-inteligence"],"_links":{"self":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/3158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/comments?post=3158"}],"version-history":[{"count":8,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/3158\/revisions"}],"predecessor-version":[{"id":8085,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/3158\/revisions\/8085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/media\/8050"}],"wp:attachment":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/media?parent=3158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/categories?post=3158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/tags?post=3158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}