Abstract
As with any electronic information processing system in today’s world of hackers, malware, spyware, etc., security is a major component of the overall operational capabilities of a SELF. All information within a SELF must be protected and kept from corruption (whether accidental or intentional). Accidental corruption of information and knowledge within a SELF is handled through continual cross-checking and self-assessment within the ACNF framework. Continuous communications between Cognitrons within the system and constant refresh of memory information keeps information from being arbitrarily modified (loss of bits) and from corruption due to memory failures and catastrophic interference problems discussed earlier. However, these do not protect the system from intentional corruptions and hackers. Since a SELF is intended to be a fully autonomous, self-evolving, self-learning, reasoning artificial entity, any corruption of information across a SELF’s artificial cognitive framework could have devastating effects on a SELF’s learning, reasoning, memory, and cognitive processes analoagously to what occurs in injured humans (e.g. head injury, Alzheimers). Corruption or incorrect modifications to a SELF’s needs, constraints, goals, memories, or algorithms could cause a SELF to act, evolve, remember, or learn, completely incorrectly and/or out of scope for the intentions of a SELF.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chandramouli R, Sandhu R (1998) Role based access control features in commercial database management systems. In: Proceedings of 21st national information systems security, Arlington
Crowder J, Carbone J (2012) Cyber physical system architectures for dynamic, real-time “need-to-know” authorization. In: Proceedings of the society for design and process science conference 2012, Berlin
Crowder J, Friess S (2010) Artificial neural diagnostics and prognostics: self-soothing in cognitive systems. In: Proceedings of the 12th annual international conference on artificial intelligence, Las Vegas
Dolan R, Vuilleumier P (2003) Amygdala automaticity in emotional processing. Ann N Y Acad Sci 985:348–355
Dudai Y (2004) The neurobiology of consolidations, or, how stable is the engram? Annu Rev Psychol 55:51–86
Kakas R, Kowlaski R, Toni F (1993) Abductive logic programming. J Logic Comput 2(6):719–770
Lenz M, Barsch-Spörl B, Burkhard H, Wess S (1998) Case-based reasoning technology, from foundations to applications. Springer, Berlin
Levesque HJ (1989) A knowledge-level account of abduction. In: Proceedings of the eleventh international joint conference on artificial intelligence, Detroit, pp 1061–1067
Duncan A (2008) Eliminate the impossible: an examination of the world of Sherlock Holmes on page and screen. MX Publishing, London. ISBN 978-1-904312-31-4
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Crowder, J.A., Carbone, J.N., Friess, S.A. (2014). Cyber Security Within a Cognitive Architecture. In: Artificial Cognition Architectures. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8072-3_12
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8072-3_12
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8071-6
Online ISBN: 978-1-4614-8072-3
eBook Packages: EngineeringEngineering (R0)