Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /wp-content/plugins/qtranslate-x/qtranslate_frontend.php on line 497

Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287
Cyber-security of the digital industry - 12 Forum Gospodarcze TIME
Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_excludeUntranslatedPosts() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287

Warning: Parameter 2 to qtranxf_postsFilter() expected to be a reference, value given in /wp-includes/class-wp-hook.php on line 287
  • Home
  • /
  • Page

Cyber-security of the digital industry

Cyber-security and Artificial Intelligence

Due to the progress of digitization, the conceptual range of c-security becomes wider and wider. We are currently using such terms as  c-attack, c-defence, c-interview, c-aggression, c-diversion, c-protection, c-crime, c-terrorism etc. Therefore all concepts related to the world of war, defence, crime and terrorism become used in relation to cyberspace. The material and the virtual world begin to increasingly intersect. In the initial stage, the objects of attack and defence (theft and anti-theft or destruction) were data and information. Later, the object of protection has become the physical security of machines and equipment, the operation of which is dependent on the software. Today, we can even talk about kinetic actions, the results of which are similar to those typically associated with military attacks. Due to the development of artificial intelligence and digital industry, the majority of major industry plants will be involved in digital industry and thus will be susceptible to digital attacks, c-crime or c-terrorism. The effects of such attacks, in addition to theft, or destruction of data and information, may involve:

  • Production halt,
  • damage (including hidden damage) of manufactured objects / machines
  • disorganization of the system, management, orders, shipments, invoicing, forecasting, etc.,
  • destruction of machinery,
  • contamination of the environment due to explosions, spills or emissions of harmful substances,
  • causing casualties (dead and wounded) among the workers and the local population,
  • causing traffic accidents,
  • destruction of critical network infrastructure.

Artificial intelligence modules are currently the most effective tools in both c-attack and in c-defence. Commonly known antivirus software with elements of artificial intelligence. this type of software is increasingly used by companies and manufacturing plants. The awareness of c-attacks is growing. The main subject of the discussion will be AI, yet it will appear in all the discussions conducted within the frames of the .
9th Economic Forum TIME We ask all the participants of the discussion to read a compilation prepared by KIGEiT and entitled:  „Innovative Digitization[1]”. The content of the compilation justifies the main thesis of this panel.

 

Main thesis of the discussion

Software-dedicated intelligent software development programs should seek to adopt the general rule requiring the implementation of appropriate security modules (c-security should be provided at the project level).

Description of the issue

Protection against c-threats is now alarmingly weak. The analyzes made by competent specialists clearly prove that the reduction of the potential impact of this weakness can be achieved only by immediate action.  They should be implemented based on a map of recognized hazards. Perhaps the biggest problem is the fact that malicious software may be installed on the territory of the future attack in an unperceivable way and then activated when it reaches full operational capability. Due to lack of experience in defence against an “invisible” enemy, the politicians and strategists in charge of security can hardly imagine possible scenarios and take appropriate action. There is no doubt that the most vulnerable are the centres of command, control and industry. Responsibility for the security agencies and institutions in charge of the State  belongs to the Government, but for the safety of industrial plants can be only secured by the entrepreneurs. Their biggest weapon is the AI. However, developers must be provided with the information and orders for a particular type of software and the digital industry must be provided with the information and orders in order to manufacture the proper equipment. Therefore, we believe it necessary to open a discussion on appropriate changes in law and  most effective practical solutions. In other words, management of companies must translate the problem into specific action programs that will make it possible to build in the c-space an environment characterized by common and proportionate level of security. During the discussion, the participants will try to determine what actions can lead to the creation of a universal and proportional system of c-defence. How to introduce necessary and sufficient barriers to each device, application, node, branches and IT system in the company and how to identify and eliminate malicious software already installed. Is it necessary to prepare the society for the common c-civil defence? Or maybe c-danger is exaggerated, and the actions that are taken in response to the reported threat are sufficient?