Skip to main content

Impact of Security on Intelligent Systems

  • Chapter
  • First Online:
The 4th Industrial Revolution

Abstract

Many years ago we developed fingerprint recognition in the late 1970s that by the early 1990s had evolved into an integrated automated fingerprint identification system which later became part of the field of biometrics combining many types of identification. At the time machine driven finger print recognition was wonderful, but nobody was interested even if you “do not need keys anymore” but they could not see it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes and References

  1. Address Resolution Protocol (arp). http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.

  2. Chapter: Configuring SPAN and RSPAN, Cisco Catalyst 4500 Series Switch Software Configuration Guide, 12.2(53)SG. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/53SG/configuration/config/span.html.

  3. DARPA Grand Challenge. http://archive.darpa.mil/cybergrandchallenge/.

  4. Cyber Reasoning System CRS. http://www.raytheoncyber.com/capabilities/reasoning/ http://www.raytheoncyber.com/rtnwcm/groups/public/documents/content/cyber-reasoning-info-pdf.pdf.

  5. Cyber Reasoning systems CRS. https://www.helpnetsecurity.com/2016/08/22/cyber-reasoning-system/.

  6. Cyber reasoning systems automating cyber warfare. https://medium.com/@joey_rideout/cyber-reasoning-systems-automating-cyber-warfare-3329f339edeb#.xv7hryf19.

  7. Mayhem wins Darpa. https://forallsecure.com/blog/2016/08/06/mayhem-wins-darpa-cgc/ https://forallsecure.com/.

  8. ‘Mayhem’ program wins grand hacking challenge, 5 Aug 2016. http://www.bbc.co.uk/news/technology-36980307.

  9. Defcon 24. https://www.defcon.org/html/defcon-24/dc-24-cgc.html.

  10. Intrusion detection system IDS. https://en.wikipedia.org/wiki/Intrusion_detection_system.

  11. Gartner report: Market Guide for User and Entity Behavior Analytics. September 2015.

    Google Scholar 

  12. Michael E. Whitman; Herbert J. Mattord. (2009). Principles of Information Security. Cengage Learning EMEA. ISBN 978-1-4239-0177-8.

    Google Scholar 

  13. OODA Loop. https://en.wikipedia.org/wiki/OODA_loop.

  14. PDSA Cycle Deming Institute. https://deming.org/management-system/pdsacycle.

  15. Inside the OODA loop. http://www.artofmanliness.com/2014/09/15/ooda-loop/.

  16. DDoS attack that disrupted internet was largest of its kind in history, experts say 26 Oct 2016 The Guardian. https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet.

  17. Hackers steal up to $1 billion from banks, DW.COM 16 Feb 2015. http://www.dw.com/en/hackers-steal-up-to-1-billion-from-banks/a-18260327.

  18. Ransomeware threat on the rise as 40 businesses attacked 3 Aug 2016. https://www.theguardian.com/technology/2016/aug/03/ransomware-threat-on-the-rise-as-40-of-businesses-attacked.

  19. Biggest NHS trust hit by ransomware attack 16 Jan 2017. http://www.server-link.co.uk/home/2017/01/16/biggest-nhs-trust-hit-by-ransomware-attack/.

  20. Mongodb ransack 33000 databases hacked Jan 2017. http://www.darknet.org.uk/2017/01/mongodb-ransack-33000-databases-hacked/.

  21. US Authorities arrest internet span king June 1 2007. https://www.scmagazineuk.com/us-authorities-arrest-internet-spam-king/article/562484/.

  22. E. Chan-Tin, V.Heorhiadi, N.Hopper, Y.Kim, The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Transactions on Information and System Security (TISSEC) Volume 14 Issue 3, November 2011 Article No. 27. http://dl.acm.org/citation.cfm?id=2043627.

  23. J&J warns diabetic patients: Insulin pump vulnerable to hacking Oct 2016. http://uk.reuters.com/article/us-johnson-johnson-cyber-insulin-pumps-e-idUKKCN12411L.

  24. Making secure chips for IoT devices, January 2917, http://openmobilealliance.org/making-secure-chips-for-iot-devices/.

  25. AI public services: biases, accountability and transparency (III), 8 March 2017 Eleonora Reform. http://www.reform.uk/reformer/ai-public-services-biases-accountability-and-transparency-iii/.

  26. Stealing an AI algorithm and its underlying data is a “high-school level exercise”, Sept 26 2016. https://qz.com/786219/stealing-an-ai-algorithm-and-its-underlying-data-is-a-high-school-level-exercise/.

  27. Skyjack hacker drones could steal your amazon parcels right out of the air, 4 December 2013. http://www.pocket-lint.com/news/125598-skyjack-hacker-drones-could-steal-your-amazon-parcels-right-out-of-the-air.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Skilton .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Skilton, M., Hovsepian, F. (2018). Impact of Security on Intelligent Systems. In: The 4th Industrial Revolution. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-62479-2_8

Download citation

Publish with us

Policies and ethics