Advertisement

Minds and Machines

, Volume 29, Issue 2, pp 187–191 | Cite as

Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity

  • Mariarosaria TaddeoEmail author
Letter to the Editor

In 2017, the WannCry and NotPeya showed that attacks targeting the cyber component of infrastructures (e.g. attacks on power plants), services (e.g. attacks to banks or hospitals servers), and endpoint devices (e.g. attacks on mobiles and personal computers) have a great disruptive potential and could cause serious damage to our information societies. WannaCry crippled hundreds of IT systems. And NotPetya costed pharmaceutical giant Merck, shipping firm Maersk and logistics company FedEx around US$300 million each. At a global level, cyber crime causes multi-billion dollar losses to businesses, with average losses per organization running from US$3.8 to US$16.8 million in the smallest and largest quartiles respectively (Accenture 2017).

The picture did not improve in 2018. Data show that over the year 2.6 million people encountered newly discovered malware on a daily basis.1Attacks ranged over 1.7 million different forms of malware, and 60% of the attacks lasted less than 1 h. Cyber...

Notes

References

  1. Acalvio Autonomous Deception. (2019). Acalvio. https://www.acalvio.com/.
  2. Accenture. (2017). 2017 Cost of cyber crime study. Accenture. https://www.accenture.com/gb-en/insight-cost-of-cybercrime-2017.
  3. BehavioSec: Continuous Authentication Through Behavioral Biometrics. (2019). BehavioSec. https://www.behaviosec.com/.
  4. DarkLight Offers First of Its Kind Artificial Intelligence to Enhance Cybersecurity Defenses. (2017). 26 July 2017. https://www.businesswire.com/news/home/20170726005117/en/DarkLight-Offers-Kind-Artificial-Intelligence-Enhance-Cybersecurity.
  5. DeepLocker: How AI Can Power a Stealthy New Breed of Malware. (2018). Security intelligence (blog). 8 August 2018. https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/.
  6. Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360.  https://doi.org/10.1098/rsta.2016.0360.CrossRefGoogle Scholar
  7. Mirsky, Y., Mahler, T., Shelef, I., & Elovici, Y. (2019). CT-GAN: Malicious tampering of 3D medical imagery using deep learning. ResearchGate. https://www.researchgate.net/publication/330357848_CT-GAN_Malicious_Tampering_of_3D_Medical_Imagery_using_Deep_Learning/figures?lo=1.
  8. Taddeo, M. (2012). An analysis for a just cyber warfare. In 2012 4th international conference on cyber conflict (CYCON 2012) (pp. 1–10).Google Scholar
  9. Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356.  https://doi.org/10.1007/s13347-013-0140-9.CrossRefGoogle Scholar
  10. Taddeo, M. (2014a). Just information warfare. Topoi.  https://doi.org/10.1007/s11245-014-9245-8.Google Scholar
  11. Taddeo, M. (2014b). The struggle between liberties and authorities in the information age. Science and Engineering Ethics.  https://doi.org/10.1007/s11948-014-9586-0.Google Scholar
  12. Taddeo, M. (2017a). The limits of deterrence theory in cyberspace. Philosophy and Technology.  https://doi.org/10.1007/s13347-017-0290-2.Google Scholar
  13. Taddeo, M. (2017b). Deterrence by norms to stop interstate cyber attacks. Minds and Machines.  https://doi.org/10.1007/s11023-017-9446-1.Google Scholar
  14. Taddeo, M., & Floridi, L. (2018a). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296–298.  https://doi.org/10.1038/d41586-018-04602-6.CrossRefGoogle Scholar
  15. Taddeo, M., & Floridi, L. (2018b). How AI can be a force for good. Science, 361(6404), 751–752.  https://doi.org/10.1126/science.aat5991.MathSciNetCrossRefGoogle Scholar
  16. The 2019 Official Annual Cybercrime Report. (2019). Herjavec group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/.
  17. Yang, G.-Z., Bellingham, J., Dupont, P. E., Fischer, P., Floridi, L., Full, R., et al. (2018). The grand challenges of science robotics. Science Robotics, 3(14), 7650.  https://doi.org/10.1126/scirobotics.aar7650.CrossRefGoogle Scholar
  18. Zhuge, J., Holz, T., Han, X., Song, C., & Zou, W. (2007). Collecting autonomous spreading malware using high-interaction honeypots. In S. Qing, H. Imai, & G. Wang (Eds.), Information and communications security. Lecture notes in computer science (pp. 438–451). Berlin: Springer.CrossRefGoogle Scholar

Copyright information

© Springer Nature B.V. 2019

Authors and Affiliations

  1. 1.Oxford Internet InstituteUniversity of OxfordOxfordUK
  2. 2.Alan Turing InstituteLondonUK

Personalised recommendations