Automation and universality, interconnection technology to…


A project aimed at studying potential cybersecurity threats for a decade can see that hackers and marketers send spam directly into our field of vision, and the attacker’s automated system is more adaptable than defensive.

RSA Conference 2021-Business processes managed by machines. National digital legal tender. Universally connected devices are used as implants in clothing fabrics. Augmented reality is displayed directly on people’s contact lenses.

According to the 2030 plan, this is a technological prospect that the country, citizens and businesses must deal with and protect within ten years. This is a forward-looking work aimed at predicting the future prospects of cyber security proposed at the RSA Conference this week. . Researchers from software security company Trend Micro and Oxford University.

The project uses a fictitious country, New San Joban, as the background, and believes that the types of cyber threats we know today (for example, unauthorized access, data manipulation, denial of service) will not change, but will make a significant difference to cyber threats Impact. A more general, more connected landscape. People will find themselves locked at home by hackers, citizens will fight to protect their data and digital selves, companies will use blockchain technology to detect abnormalities in automated processes, and ubiquitous marketing and influence operations will float. Out of the water. .

Predicting the future is difficult. The purpose of the report is not to accurately describe the next decade, but to highlight the three main trends in the future (automation, connectivity, and universal integration), and how people, companies, and the country should think about the guest at Oxford University Researcher Victoria Baines (Victoria Baines) said to ensure technical safety.

She said: “By mapping the information we already know about criminals and other hostile actors with the reasonable development of emerging technologies, we can foresee the development of cybercrime.” “Even if we all agree that the future is uncertain, uncertain. Sex is no longer a sufficient reason for failing to prepare for future cyber threats.”

The vice presidents of Trend Micro Research, Baines (Baines) and Rik Ferguson (Rik Ferguson) took the lead in leading the “Project 2030” report and a series of future blog posts. The research is based on a similar project launched in 2012 to predict the future cybersecurity situation in 2020. A review of previous reports found that of the 19 technology predictions, 9 will become mainstream in 2020 and have become a reality to some extent.

In 2030, major cybersecurity threats include passing false information to more popular devices through more targeted algorithms (SEO on steroids), and tampering with the supply chain may become the next ransomware epidemic. As technology becomes entrenched in people’s lives, social engineering, active marketing and information operations will have a greater impact. Finally, the report predicts that the use of automation and machine learning will become widespread among cybercriminals and bad actors.

A survey helps predict the results, and 63% of respondents agree with the following statement: “By 2030, “network security will be mainly composed of AI offense and defense”, and “every day will be zero days”.

“[I]It is reasonable to assume that highly automated reconnaissance, target selection, penetration testing and delivery will be attractive to cybercriminals, and they will seek to maximize the effectiveness and efficiency of their work by using tools that enable unsupervised learning. “Points out. “Based on our understanding of the Crime as a Service (CaaS) crime market, we might expect to see the illegal retail of artificial intelligence-based tools that provide individuals with few technical expertise to operate cybercrime businesses. Opportunity. . “

Quantum computing and the ability to decrypt data encrypted using current algorithms also pose a threat, but this will highlight the difference between countries with deep technical roots and countries without deep technical roots.

Baines said: “It is unrealistic to assume that the progress described in the narrative will be evenly distributed around the world.” “Just take quantum computing as an example. The world’s largest technology company and the most resource-rich research institution are the ones Pioneers in the field… Therefore, the balance of quantum capabilities will be maintained in a few geographic locations.”

Privacy is a seemingly optimistic future. Project 2030 estimates that within ten years, technologies such as the Solid specification developed by Tim Berners-Lee and the Massachusetts Institute of Technology will become the rule, not the exception. These technologies will protect personal data and allow only temporary company access. T

Baines said: “There is no reason to expect that the world’s population will be insensitive to these issues in the next ten years.”

How high can the report’s forecast reach? The author cites outdated axioms (usually attributed to Roy Amara of the Stanford Institute) that the impact of the technology is overestimated in the short term and underestimated in the long term, but even so, the narrative cited in the report The scene also covers science fiction.

Based on nerve implants, this nerve implant has programmable sensations and sensations. In the narrative, the teenager begged his mother to allow him to play games. While Elon Musk’s Neuralink is advancing brain-computer interface technology, this idea has been slowly developed over the past few decades, especially because the procedure is currently invasive.The late author Michael Crichton was worried about using similar technology as the key technical drawing device in his book Terminal person, Published almost 50 years ago.

The ubiquitous augmented reality in contact lenses is likely to happen, but it is unlikely to become a reality within ten years.

But even then, the threat (if not resolved by the stakeholders) is real. The 2030 Plan warns that some science fiction novels may go a long way for companies and businesses.

A senior technical reporter for more than 20 years. Former research engineer. Wrote for more than twenty publications, including CNET, “Dark Reading”, “MIT Technology Review”, “Popular Science” and “Cable News”.Won five awards in journalism, including the best deadline…View full bio

Recommended reading:

More insights

Related Articles

Back to top button