Abstract
Many years ago we developed fingerprint recognition in the late 1970s that by the early 1990s had evolved into an integrated automated fingerprint identification system which later became part of the field of biometrics combining many types of identification. At the time machine driven finger print recognition was wonderful, but nobody was interested even if you “do not need keys anymore” but they could not see it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes and References
Address Resolution Protocol (arp). http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.
Chapter: Configuring SPAN and RSPAN, Cisco Catalyst 4500 Series Switch Software Configuration Guide, 12.2(53)SG. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/53SG/configuration/config/span.html.
DARPA Grand Challenge. http://archive.darpa.mil/cybergrandchallenge/.
Cyber Reasoning System CRS. http://www.raytheoncyber.com/capabilities/reasoning/ http://www.raytheoncyber.com/rtnwcm/groups/public/documents/content/cyber-reasoning-info-pdf.pdf.
Cyber Reasoning systems CRS. https://www.helpnetsecurity.com/2016/08/22/cyber-reasoning-system/.
Cyber reasoning systems automating cyber warfare. https://medium.com/@joey_rideout/cyber-reasoning-systems-automating-cyber-warfare-3329f339edeb#.xv7hryf19.
Mayhem wins Darpa. https://forallsecure.com/blog/2016/08/06/mayhem-wins-darpa-cgc/ https://forallsecure.com/.
‘Mayhem’ program wins grand hacking challenge, 5 Aug 2016. http://www.bbc.co.uk/news/technology-36980307.
Defcon 24. https://www.defcon.org/html/defcon-24/dc-24-cgc.html.
Intrusion detection system IDS. https://en.wikipedia.org/wiki/Intrusion_detection_system.
Gartner report: Market Guide for User and Entity Behavior Analytics. September 2015.
Michael E. Whitman; Herbert J. Mattord. (2009). Principles of Information Security. Cengage Learning EMEA. ISBN 978-1-4239-0177-8.
OODA Loop. https://en.wikipedia.org/wiki/OODA_loop.
PDSA Cycle Deming Institute. https://deming.org/management-system/pdsacycle.
Inside the OODA loop. http://www.artofmanliness.com/2014/09/15/ooda-loop/.
DDoS attack that disrupted internet was largest of its kind in history, experts say 26 Oct 2016 The Guardian. https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet.
Hackers steal up to $1 billion from banks, DW.COM 16 Feb 2015. http://www.dw.com/en/hackers-steal-up-to-1-billion-from-banks/a-18260327.
Ransomeware threat on the rise as 40 businesses attacked 3 Aug 2016. https://www.theguardian.com/technology/2016/aug/03/ransomware-threat-on-the-rise-as-40-of-businesses-attacked.
Biggest NHS trust hit by ransomware attack 16 Jan 2017. http://www.server-link.co.uk/home/2017/01/16/biggest-nhs-trust-hit-by-ransomware-attack/.
Mongodb ransack 33000 databases hacked Jan 2017. http://www.darknet.org.uk/2017/01/mongodb-ransack-33000-databases-hacked/.
US Authorities arrest internet span king June 1 2007. https://www.scmagazineuk.com/us-authorities-arrest-internet-spam-king/article/562484/.
E. Chan-Tin, V.Heorhiadi, N.Hopper, Y.Kim, The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Transactions on Information and System Security (TISSEC) Volume 14 Issue 3, November 2011 Article No. 27. http://dl.acm.org/citation.cfm?id=2043627.
J&J warns diabetic patients: Insulin pump vulnerable to hacking Oct 2016. http://uk.reuters.com/article/us-johnson-johnson-cyber-insulin-pumps-e-idUKKCN12411L.
Making secure chips for IoT devices, January 2917, http://openmobilealliance.org/making-secure-chips-for-iot-devices/.
AI public services: biases, accountability and transparency (III), 8 March 2017 Eleonora Reform. http://www.reform.uk/reformer/ai-public-services-biases-accountability-and-transparency-iii/.
Stealing an AI algorithm and its underlying data is a “high-school level exercise”, Sept 26 2016. https://qz.com/786219/stealing-an-ai-algorithm-and-its-underlying-data-is-a-high-school-level-exercise/.
Skyjack hacker drones could steal your amazon parcels right out of the air, 4 December 2013. http://www.pocket-lint.com/news/125598-skyjack-hacker-drones-could-steal-your-amazon-parcels-right-out-of-the-air.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Skilton, M., Hovsepian, F. (2018). Impact of Security on Intelligent Systems. In: The 4th Industrial Revolution. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-62479-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-62479-2_8
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-62478-5
Online ISBN: 978-3-319-62479-2
eBook Packages: Business and ManagementBusiness and Management (R0)