SlideShare a Scribd company logo
1 of 22
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and Artificial Intelligence
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Dr. Utku Kose received the B.S. degree in 2008 from computer education of
Gazi University, Turkey as a faculty valedictorian. He received M.S. degree in
2010 from Afyon Kocatepe University, Turkey in the field of computer and D.S. /
Ph. D. degree in 2017 from Selcuk University, Turkey in the field of computer
engineering. Between 2009 and 2011, he has worked as a Research Assistant
in Afyon Kocatepe University. Following, he has also worked as a Lecturer and
Vocational School - Vice Director in Afyon Kocatepe University between 2011
and 2012, as a Lecturer and Research Center Director in Usak University
between 2012 and 2017, and as an Assistant Professor in Suleyman Demirel
University between 2017 and 2019. Currently, he is an Associate Professor in
Suleyman Demirel University, Turkey. He has more than 100 publications
including articles, authored and edited books, proceedings, and reports. He is
also one of the series editors of the Biomedical and Robotics Healthcare Series
by CRC Press. His research interest includes artificial intelligence, machine
ethics, artificial intelligence safety, optimization, the chaos theory, distance
education, e-learning, computer education, and computer science.
Academic Profiles:
• Google Scholar
• ResearchGate
• Academia
• Mendeley
• for more:
www.utkukose.com
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Isparta / Turkey Afyonkarahisar / Turkey
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Suleyman Demirel University
Süleyman Demirel University (SDU) is a public university
located in Isparta, Turkey. Established in 1992, the university,
with around 70.000 students, is a large academic institution
in Turkey. SDU is known for its programs in agricultural research,
medicine, engineering, and business sciences.
Dept. of Computer Engineering
SDU-CEng currently has three Profs., two Assoc. Prof., eight
Assist. Profs. and two Res. Assists. working in three different
areas of Computer Science, Computer Software, and Computer
Hardware. The dept. has BSc., MSc., and PhD. degrees.
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
1. WHAT IS CYBER SECURITY?
 What is ‘cyber’?
 Coming from ‘Cybernetics’ (Couffignal, Wiener)
 As used by Gibson in the novel: Neuromancer…
 For defining anything related to virtual world
 Cyber world, cyber space, cyber environment…etc.
 What is Cyber Security?
 Security related to digital systems
 Consider both hardware and software side…
 Related to both dark and light side
 Unstoppable area…
 An evolving area…
 An area for the present and future
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
1. WHAT IS CYBER SECURITY?
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Data
Hardware
Software
Human
 Factors of Cyber Security
 Hardware: physical
 Software: abstract
 Data: information
 Human: sensitive factor
 Two sides of cyber
security
 Collection of factors are
shaping both defensive and
aggressive sides cyber
security…
Defensive
(Ethical-White) Aggressive
(Unethical-Black)
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
2. CYBER WORLD AND CYBER WARS
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Land
Air
Navy
Cyber
World
Space
 Cyber World:
Fifth Operation Zone
 Cyber world is a virtual world employing inter-digital system based
communication.
 Computer and Internet technologies have caused to gain
momentum in last periods of the 20th century.
 Essential Concepts Related to Cyber World:
 Digital Transformation
 Social Media
 E-Technologies
 Data Processing
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
2. CYBER WORLD AND CYBER WARS
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Features of the Cyber Wars
 Between countries
 At light speed
 Low cost
 Destructive results
 Diversity in results
 Multi-dimensional
 Undetectable
 Abstract…
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
3. CYBER WARS AND AI.
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Brave Smart World
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
3. CYBER WARS AND AI.
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Brave Smart World
 Internet of Things
 Wearables
 Sensors
 Unmanned vehicles
 Distributed computing
 Blockchain, IOTA
 Big Data
 Smart computing
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
3. CYBER WARS AND AI.
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Application types of AI in problems of cyber security
 ML / DL
Problem
Model?
Training
Data
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
3. CYBER WARS AND AI.
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Components required to ensure AI based cyber security
Artificial Intelligence based
cyber security
Experience
Algorithmic
Actions
Expert
Knowledge
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
4. FUTURE PERSPECTIVES
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Cyber wars of the future will be carried out by Artificial
Intelligence based systems rather than people. In this context,
people will only be in the role of management - control.
 Although we talk about human management - control, it would
not be wrong to predict that the cyber wars of the future will be
over 95% autonomous (entirely related to Artificial Intelligence
decision and action processes).
 Physical wars will be replaced by advanced AI based cyber
wars. The reason for this will be the desire of human being to
leave critical roles to responsibility of Artificial Intelligence-based
systems. Cyber wars will replace physical wars because the
existing infrastructures and many vital elements of humanity will
be related to the cyber world.
 Artificial Intelligence based cyber wars will be much more
destructive than the cyber wars today.
 Defensive cyber security will be more and more critical…
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
4. FUTURE PERSPECTIVES
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
Commander
systems
Soldier
systems
Manipulator
systems
Worker
systems
Central
AI.
Collective
Intelligence
Cyber
War
(Attack /
Defense)
AI and
Cyber
Wars
Hierarch.
Systems
Digital
Languages
Cryptograp.
Wars
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
5. OPEN PROBLEMS
 What data are needed for developing autonomous cyber security
systems?
 Is it possible to develop a system sensitive to all cyber systems?
 How can cyber security be ensured within the Internet of Things?
 Security and privacy of personal / sensitive data!?
 How can we combat adversarial examples?
 Encryption of the data?
 Safe data sharing - transforming systems?
 Societal effects, problems…etc.
 Policies, organizations, international rules…
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
5. OPEN PROBLEMS
 Adversarial Examples
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
5. OPEN PROBLEMS
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Defensive solutions against hybrid attacks
 Advanced cryptography
 Distributed cyber security
 Reinforcement learning based cyber security
 Adjustments for AI based cyber wars
 Precautions against cyber wars, policies…etc.
 Control of unmanned cyber wars
 Human errors in data
 Security of Big Data
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
6. SUGGESTED SOURCES
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
6. SUGGESTED SOURCES
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
 Keywords are;
 «cyber wars»,
 «future of cyber security»,
 «cyber security and artificial intelligence / machine
learning / deep learning»,
 «autonomous cyber security»
 https://github.com/jivoi/awesome-ml-for-cybersecurity
 https://github.com/shramos/Awesome-Cybersecurity-Datasets
 https://github.com/wtsxDev/Machine-Learning-for-Cyber-
Security
 What is Cyber Security?
 Cyber World and Cyber Wars
 Cyber Wars and AI.
 Future Perspectives
 Open Problems
 Suggested Sources
 Questions?
Pres. Content
7. QUESTIONS?
International Webinar by
ENSC / FSAC / AMRST / UCD - El Jadida / EHTP
20 July 2020
«Thank you very
much for listening!»

Assoc. Prof. Dr. Utku KOSE
Suleyman Demirel University
Dept. of Computer Engineering
utkukose@gmail.com utkukose@sdu.edu.tr
http://www.utkukose.com

More Related Content

Similar to Future of Cyber Security - Dr. Utku Kose

IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsTutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsRaffaele Giaffreda
 
Call for papers - 7th International Conference on Computer Science and Inform...
Call for papers - 7th International Conference on Computer Science and Inform...Call for papers - 7th International Conference on Computer Science and Inform...
Call for papers - 7th International Conference on Computer Science and Inform...IJCSES Journal
 
Call for Papers - 8th International Conference on Signal, Image Processing an...
Call for Papers - 8th International Conference on Signal, Image Processing an...Call for Papers - 8th International Conference on Signal, Image Processing an...
Call for Papers - 8th International Conference on Signal, Image Processing an...VLSICS Design
 
Call for papers - 10th International Conference on Computer Science, Engineer...
Call for papers - 10th International Conference on Computer Science, Engineer...Call for papers - 10th International Conference on Computer Science, Engineer...
Call for papers - 10th International Conference on Computer Science, Engineer...IJCSES Journal
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayDeja Lewis
 
7th International Conference on Computer Science and Information Technology (...
7th International Conference on Computer Science and Information Technology (...7th International Conference on Computer Science and Information Technology (...
7th International Conference on Computer Science and Information Technology (...IJCSES Journal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
9th International Conference on Advanced Information Technologies and Applica...
9th International Conference on Advanced Information Technologies and Applica...9th International Conference on Advanced Information Technologies and Applica...
9th International Conference on Advanced Information Technologies and Applica...IJCSES Journal
 
Ert 20200420 v11
Ert 20200420 v11Ert 20200420 v11
Ert 20200420 v11ISSIP
 
11th International Conference on Computer Science and Information Technology ...
11th International Conference on Computer Science and Information Technology ...11th International Conference on Computer Science and Information Technology ...
11th International Conference on Computer Science and Information Technology ...ijgca
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)IJDKP
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...IJNSA Journal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)pijans
 
AI Meets Digital Health, Social Science and AgriTech
AI Meets Digital Health, Social Science and AgriTechAI Meets Digital Health, Social Science and AgriTech
AI Meets Digital Health, Social Science and AgriTechHaithem Afli
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)ijujournal
 

Similar to Future of Cyber Security - Dr. Utku Kose (20)

IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsTutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
 
Mohamed N. El-Guindy
Mohamed N. El-GuindyMohamed N. El-Guindy
Mohamed N. El-Guindy
 
Call for papers - 7th International Conference on Computer Science and Inform...
Call for papers - 7th International Conference on Computer Science and Inform...Call for papers - 7th International Conference on Computer Science and Inform...
Call for papers - 7th International Conference on Computer Science and Inform...
 
Call for Papers - 8th International Conference on Signal, Image Processing an...
Call for Papers - 8th International Conference on Signal, Image Processing an...Call for Papers - 8th International Conference on Signal, Image Processing an...
Call for Papers - 8th International Conference on Signal, Image Processing an...
 
Call for papers - 10th International Conference on Computer Science, Engineer...
Call for papers - 10th International Conference on Computer Science, Engineer...Call for papers - 10th International Conference on Computer Science, Engineer...
Call for papers - 10th International Conference on Computer Science, Engineer...
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
7th International Conference on Computer Science and Information Technology (...
7th International Conference on Computer Science and Information Technology (...7th International Conference on Computer Science and Information Technology (...
7th International Conference on Computer Science and Information Technology (...
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
9th International Conference on Advanced Information Technologies and Applica...
9th International Conference on Advanced Information Technologies and Applica...9th International Conference on Advanced Information Technologies and Applica...
9th International Conference on Advanced Information Technologies and Applica...
 
Ert 20200420 v11
Ert 20200420 v11Ert 20200420 v11
Ert 20200420 v11
 
11th International Conference on Computer Science and Information Technology ...
11th International Conference on Computer Science and Information Technology ...11th International Conference on Computer Science and Information Technology ...
11th International Conference on Computer Science and Information Technology ...
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
AI Meets Digital Health, Social Science and AgriTech
AI Meets Digital Health, Social Science and AgriTechAI Meets Digital Health, Social Science and AgriTech
AI Meets Digital Health, Social Science and AgriTech
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Future of Cyber Security - Dr. Utku Kose

  • 1. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 2.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and Artificial Intelligence  Future Perspectives  Open Problems  Suggested Sources  Questions? International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 3. Dr. Utku Kose received the B.S. degree in 2008 from computer education of Gazi University, Turkey as a faculty valedictorian. He received M.S. degree in 2010 from Afyon Kocatepe University, Turkey in the field of computer and D.S. / Ph. D. degree in 2017 from Selcuk University, Turkey in the field of computer engineering. Between 2009 and 2011, he has worked as a Research Assistant in Afyon Kocatepe University. Following, he has also worked as a Lecturer and Vocational School - Vice Director in Afyon Kocatepe University between 2011 and 2012, as a Lecturer and Research Center Director in Usak University between 2012 and 2017, and as an Assistant Professor in Suleyman Demirel University between 2017 and 2019. Currently, he is an Associate Professor in Suleyman Demirel University, Turkey. He has more than 100 publications including articles, authored and edited books, proceedings, and reports. He is also one of the series editors of the Biomedical and Robotics Healthcare Series by CRC Press. His research interest includes artificial intelligence, machine ethics, artificial intelligence safety, optimization, the chaos theory, distance education, e-learning, computer education, and computer science. Academic Profiles: • Google Scholar • ResearchGate • Academia • Mendeley • for more: www.utkukose.com International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 4. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 5. Isparta / Turkey Afyonkarahisar / Turkey International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 6. Suleyman Demirel University Süleyman Demirel University (SDU) is a public university located in Isparta, Turkey. Established in 1992, the university, with around 70.000 students, is a large academic institution in Turkey. SDU is known for its programs in agricultural research, medicine, engineering, and business sciences. Dept. of Computer Engineering SDU-CEng currently has three Profs., two Assoc. Prof., eight Assist. Profs. and two Res. Assists. working in three different areas of Computer Science, Computer Software, and Computer Hardware. The dept. has BSc., MSc., and PhD. degrees. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 7.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 1. WHAT IS CYBER SECURITY?  What is ‘cyber’?  Coming from ‘Cybernetics’ (Couffignal, Wiener)  As used by Gibson in the novel: Neuromancer…  For defining anything related to virtual world  Cyber world, cyber space, cyber environment…etc.  What is Cyber Security?  Security related to digital systems  Consider both hardware and software side…  Related to both dark and light side  Unstoppable area…  An evolving area…  An area for the present and future International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 8.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 1. WHAT IS CYBER SECURITY? International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020 Data Hardware Software Human  Factors of Cyber Security  Hardware: physical  Software: abstract  Data: information  Human: sensitive factor  Two sides of cyber security  Collection of factors are shaping both defensive and aggressive sides cyber security… Defensive (Ethical-White) Aggressive (Unethical-Black)
  • 9.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 2. CYBER WORLD AND CYBER WARS International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020 Land Air Navy Cyber World Space  Cyber World: Fifth Operation Zone  Cyber world is a virtual world employing inter-digital system based communication.  Computer and Internet technologies have caused to gain momentum in last periods of the 20th century.  Essential Concepts Related to Cyber World:  Digital Transformation  Social Media  E-Technologies  Data Processing
  • 10.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 2. CYBER WORLD AND CYBER WARS International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Features of the Cyber Wars  Between countries  At light speed  Low cost  Destructive results  Diversity in results  Multi-dimensional  Undetectable  Abstract…
  • 11.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 3. CYBER WARS AND AI. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Brave Smart World
  • 12.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 3. CYBER WARS AND AI. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Brave Smart World  Internet of Things  Wearables  Sensors  Unmanned vehicles  Distributed computing  Blockchain, IOTA  Big Data  Smart computing
  • 13.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 3. CYBER WARS AND AI. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Application types of AI in problems of cyber security  ML / DL Problem Model? Training Data
  • 14.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 3. CYBER WARS AND AI. International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Components required to ensure AI based cyber security Artificial Intelligence based cyber security Experience Algorithmic Actions Expert Knowledge
  • 15.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 4. FUTURE PERSPECTIVES International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Cyber wars of the future will be carried out by Artificial Intelligence based systems rather than people. In this context, people will only be in the role of management - control.  Although we talk about human management - control, it would not be wrong to predict that the cyber wars of the future will be over 95% autonomous (entirely related to Artificial Intelligence decision and action processes).  Physical wars will be replaced by advanced AI based cyber wars. The reason for this will be the desire of human being to leave critical roles to responsibility of Artificial Intelligence-based systems. Cyber wars will replace physical wars because the existing infrastructures and many vital elements of humanity will be related to the cyber world.  Artificial Intelligence based cyber wars will be much more destructive than the cyber wars today.  Defensive cyber security will be more and more critical…
  • 16.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 4. FUTURE PERSPECTIVES International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020 Commander systems Soldier systems Manipulator systems Worker systems Central AI. Collective Intelligence Cyber War (Attack / Defense) AI and Cyber Wars Hierarch. Systems Digital Languages Cryptograp. Wars
  • 17.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 5. OPEN PROBLEMS  What data are needed for developing autonomous cyber security systems?  Is it possible to develop a system sensitive to all cyber systems?  How can cyber security be ensured within the Internet of Things?  Security and privacy of personal / sensitive data!?  How can we combat adversarial examples?  Encryption of the data?  Safe data sharing - transforming systems?  Societal effects, problems…etc.  Policies, organizations, international rules… International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 18.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 5. OPEN PROBLEMS  Adversarial Examples International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 19.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 5. OPEN PROBLEMS International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Defensive solutions against hybrid attacks  Advanced cryptography  Distributed cyber security  Reinforcement learning based cyber security  Adjustments for AI based cyber wars  Precautions against cyber wars, policies…etc.  Control of unmanned cyber wars  Human errors in data  Security of Big Data
  • 20.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 6. SUGGESTED SOURCES International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020
  • 21.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 6. SUGGESTED SOURCES International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020  Keywords are;  «cyber wars»,  «future of cyber security»,  «cyber security and artificial intelligence / machine learning / deep learning»,  «autonomous cyber security»  https://github.com/jivoi/awesome-ml-for-cybersecurity  https://github.com/shramos/Awesome-Cybersecurity-Datasets  https://github.com/wtsxDev/Machine-Learning-for-Cyber- Security
  • 22.  What is Cyber Security?  Cyber World and Cyber Wars  Cyber Wars and AI.  Future Perspectives  Open Problems  Suggested Sources  Questions? Pres. Content 7. QUESTIONS? International Webinar by ENSC / FSAC / AMRST / UCD - El Jadida / EHTP 20 July 2020 «Thank you very much for listening!»  Assoc. Prof. Dr. Utku KOSE Suleyman Demirel University Dept. of Computer Engineering utkukose@gmail.com utkukose@sdu.edu.tr http://www.utkukose.com