Professional Documents
Culture Documents
Presentation 1
Presentation 1
Presentation 1
rapidly evolving with no sign of slowing. Cyber-attackers are not only moving faster, they are
adding new and innovative tools within their toolkits. And as the entire world turns online, we
are moving towards a future where cyber-threats increasingly threaten the safety of not just
our data, but of our physical infrastructure too.
• Autonomy, scale and complexity in our defense systems will trigger new cyber-attack strategies,
and autonomous intelligent malware (AIM) will be part of the picture
• First, on the battlefield of the future, “intelligent Things will fight intelligent Things”
• Autonomous Cyber AI is revolutionizing cyber defense and may prove to be our best line of
defense against future AI attacks
Autonomous and automated: Defined
• “autonomous” and “automated.” Despite popular belief, these terms are not synonymous,
but each carry a distinctive, separate meaning worth establishing when looking at security
strategies.
• Automated systems typically run within a well-defined set of parameters and are very
restricted in what tasks they can perform. The decisions made or actions taken by an
automated system are based on predefined heuristics.
• An autonomous system, on the other hand, learns and adapts to dynamic environments,
and evolves as the environment around it changes. The data it learns and adapts to may be
outside what was contemplated when the system was deployed. Such systems will ingest
and learn from increasing data sets faster, and eventually more reliably, than what would be
reasonable for a human.
The evolution in automation levels of cars is summarised in Figure 1. Many companies such
as Waymo and Tesla are now hugely investing in a future lead by Autonomous vehicles (self-
driving cars).
Autonomous Machine Security Risks
• As autonomous systems move past test phases and into both the
public and private sectors, cyber security is once again moving to the
front burner. Liability suits are bound to pop up when errors result in
casualties. Self-driving cars, drones and robotics need to be as safe as
possible as they become commercially available.
• MachineDesign.com’s digital marketing specialist Rilind Elezaj highlights several of these risks in
“Autonomous Cars: Safety Opportunity or Cybersecurity Threat?”:
• Self-driving cars could be hacked with ransomware, not allowing owners to enter, start or exit
the vehicle until a ransom is paid.
• Terrorist hackers could disable networks, range sensors and cameras, resulting in multiple
collisions.
• An autonomous vehicle’s operating system could be hacked, exposing personal information on
other connected devices.
• Hacked vehicles could potentially be rerouted to an area where a robbery or assault is planned.
• Connected cars can control IoT devices at home, giving hackers access to people’s home
computer networks.
• Drones, especially military drones, carry with them several other risks
that require effective cyber security solutions. Tractica.com’s Sanders
points out that GPS jamming, overriding “return to home” fail-safes,
and intercepting video/image/data feeds from drones could all result
in catastrophic damage, theft and exposure of sensitive or classified
information.
• Military drones might be targeted because of the ammunition and
explosive ordnance they carry. But even privately owned drones, such
as those that may soon be used for delivery of goods purchased
online, would also present attractive targets to hackers.
Autonomous Systems Cyber Security Strategies