SlideShare a Scribd company logo
1 of 21
Download to read offline
Cyber and
Intelligence
“From bits to information”
Outline
• Understanding job roles in cybersecurity.
• Understand what intelligence is.
• Heuristics and decision making.
• Types of intelligence
• Differences between human and machine intelligence.
Outline
Analogue world
Digital world
DAC (Digital to
Analogue)
Convertor
ADC (Analogue
to Digital)
Convertor
1010101..0010Sensors
Actuators
(Motor)
Light, heat,
movement
Outline
Industry 1.0
Mechanization
(1760-1820)
Industry 2.0
Electrification
(1870-1914)
Industry 3.0
Automation
(20th Century)
Industry 4.0
Digitization
(21st Century)
Steam-power or
water-powered
engines
Railways,
factories,
telegram
Electronics,
Electrical
generator, CPU,
Internet, Web
Virtualization, AI,
Cyberphysical, IoT
Outline
• RFC 791. Defines the format of IP packets (IPv4)
• RFC 793. Defines TCP (Transport Control Protocol), which provides the
foundation of the virtually all of the traffic that exists on the Internet.
Industry 4.0
“From bits to information”
6vs and 6Cs
Industry 4.0 brings:
• 6 Cs: Connection (sensor and networks); Cloud (computing and data
on demand); Cyber (model and memory); Content/context (meaning
and correlation); Community (sharing and collaboration); and
Customization (personalization and value).
• 6 Vs: Volume; Velocity; Variety; Variability; Veracity; and Value.
Cybersecurity
“From bits to information”
Cybersecurity
NIST define Cybersecurity as:
• Prevention of damage to, protection of, and restoration of computers,
electronic communications systems, electronic communications services,
wire communication, and electronic communication, including information
contained therein, to ensure its availability, integrity, authentication,
confidentiality, and non-repudiation.
and information security as:
• the protection of information and information systems from unauthorized
access… to provide confidentiality, integrity, and availability.
Cybersecurity
NIST define NICE framework. Within this, they outlined seven core categories; 33
specialty areas; and 52 work roles, and then mapped these to 1,007 tasks, 374
skills, 630 knowledge areas, and 176 abilities. The categories were:
• Securely Provision (SP);
• Operate and Maintain (OM);
• Oversee and Govern (OV);
• Protect and Defend (PR);
• Analyze (AN);
• Collect and Operate (CO); and
• Investigate (IN).
Intelligence
“From bits to information”
Intelligence
Industry 4.0 brings: Cyber-phyiscal systems, IoT, Cloud Computing and
Cognitive computing.
Neisser define:
• Individuals differ from one another in their ability to understand complex
ideas, to adapt effectively to the environment, to learn from experience, to
engage in various forms of reasoning, and to overcome obstacles by taking
thought.
• Intelligence is a very general mental capability that, among other things,
involves the ability to reason, plan, solve problems, think abstractly,
comprehend complex ideas, learn quickly and learn from experience.
Types of intelligence
• Naturalist Intelligence (nature smart). This involves the ability to discriminate between living
things and their interaction with the natural world.
• Musical Intelligence (sound smart). This involves the ability to understand pitch, rhythm, and
tone, especially focused on the ability to create, analyse and reproduce music, such as in
stimulating emotions around music.
• Logical-Mathematical Intelligence (number/reasoning smart). This involves the ability to
calculate, hypothesize, and quantify using mathematical operations. Key skills are to: abstract;
define reasoned approaches; and to apply inductive and deductive thinking methods.
• Existential Intelligence (life smart). This involves the ability to search for deep meanings to life,
such as why we exist, and why we must die.
• Inter-personal Intelligence (people smart). This involves the ability to understand other people
using both verbal and non-verbal communications. Those with the best abilities for this are
typically strong communicators and can understand the feelings and motivations of others.
Humans v Computers
• Learning. Humans adapt to changing situations, and generally quickly learn tasks.
Unfortunately, once these tasks have been learnt, this can often lead to boredom if they
are repeated repetitively.
• Strategy. Humans are excellent at taking complex tasks and splitting them into smaller,
less complex, tasks. Then, knowing the outcome, they can implement these in the
required way, but can make changes depending on conditions.
• Enterprise. Computers, as they are programmed at the present, are an excellent business
tool. They generally allow for better decision making, but, at present, they cannot initiate
new events.
• Creativity. As with enterprise, humans are generally more creative than computers. This
is likely to change over the coming years as they could programmed with the aid of
psychologists, musicians, and artists, and will could include elements which are pleasing
to the human senses.
Humans v Computers
• Spatial. This is the ability to differentiate between two- and three- dimensional objects. Computers, even
running powerful image processing software, often have difficulty in differentiating between two-
dimensional objects and three-dimensional ones. Humans, though, find this easy, but can be tricked by
optical illusions, where a two-dimensional object is actually a three-dimensional object. The objects in left-
hand side of Figure ref{fig:stick} are a mixture of a two-dimensional and three-dimensional object. Humans
can quickly determine objects which are defined in 2D and which in 3D.
• Perception. This is the skill of identifying simple shapes from complex ones. For example, humans can quickly
look at a picture and determine the repeated sequences, shapes, and so on. For example, look at the picture
on the right-hand side of Figure ref{fig:stick}, and determine how many triangles it contains? It is relatively
easy for a human to determine this, as they have good perception skills. This is because the human brain can
easily find simple shapes from complex ones. But, imagine writing a computer program which would
determine all of the triangles in an object, then modifying it so it finds other shapes, such as squares,
hexagons, and so on?
• Memory. This is the skill of memorizing and recalling objects which do not have any logical connection.
Humans have an amazing capacity for recalling objects, typically by linking objects, and from one to the next.
Computers can implement this with a linked-list approach, but it becomes almost impossible to manage
when the number of objects becomes large.
Humans v Computers
• Numerical. Most humans can manipulate numbers in various ways. Humans are by no-way as fast
as computers, but humans can often simply complex calculations, either by approximating, or by
eliminating terms which have little effect on the final answer. For example, we may have a tasks
to find the approximate area for a room that is 6.9 metres and 9.1 meters? Many humans just
approximate this to 7 times 9, and find the answer of 63 meters squared.
• Verbal. This involves the comprehension of language, and while there has been great advances in
the way that machines are able to process speech, they are often still weaker than humans in
extracting meaning.
• Lexical. This is a manipulation of vocabulary. Machines can generally analyse the lexical structure
of written work, but they often still struggle to create their own lexical structures, and which lack
interest or even meaning. They are thus generally good at spotting spelling mistakes and at
grammar checking.
• Reasoning. This is induction and deduction. Humans can often deduce things when they are not
given a complete set of information.
Humans v Computers
Humans v Computers
Types of intelligence
• Attribute & Machine & Human 
• hline
• Speed & Superior & Comparatively slow 
• Power Output & Superior in level in consistency & Comparatively weak 
• Consistency & Ideal of consistency, repetitive action & Unreliable learning and fatigue factors
• Information capacity & Multi-channel & Primarily single channel
• Memory & Idea of literal reproduction, access restricted, and formal & Better for principles and strategies, access is versatile and
innovative 
• Reasoning computation & Deductive, tedious to program, fast and accurate, poor error correction & Inductive, easier to program,
slow, accurate, and good error correction 
• Sensing & Good at quantitative assessment, poor at pattern recognition & Wide ranges, multi-function, judgement
• Perceiving & Copes with variation poorly & Copes with variation better, susceptible to noise
Motivations
• Entertainment. This is basically the thrill of performing an attack.
• Hacktivists. This relates to those who are motivated by political, religious,
and social causes.
• Financial gain. This relates to those attackers who are motivated by
financial gain.
• Spying. This relates to the stealing of information from others, typically in
the form of Intellectual Property (IP).
• Revenge. This relates to those who have motivations around revenge, such
as a disgruntled employee/customer, or who might be someone who has
been humiliated in the past.
Cyber and
Intelligence
“From bits to information”

More Related Content

What's hot

Simplified Introduction to AI
Simplified Introduction to AISimplified Introduction to AI
Simplified Introduction to AIDeepu S Nath
 
Cognitive Science and AI
Cognitive Science and AICognitive Science and AI
Cognitive Science and AISaboor Ahmed
 
Artificial intelligence(simulating the human mind)
Artificial intelligence(simulating the human mind)Artificial intelligence(simulating the human mind)
Artificial intelligence(simulating the human mind)Dinesh More
 
Cognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceCognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceSamantha Luber
 
Computational Thinking in the Workforce and Next Generation Science Standards...
Computational Thinking in the Workforce and Next Generation Science Standards...Computational Thinking in the Workforce and Next Generation Science Standards...
Computational Thinking in the Workforce and Next Generation Science Standards...Josh Sheldon
 
Lecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligenceLecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligenceAlbert Orriols-Puig
 
Psychology Human Computer Interaction
Psychology Human Computer InteractionPsychology Human Computer Interaction
Psychology Human Computer InteractionSeta Wicaksana
 
Marek Rosa - Inventing General Artificial Intelligence: A Vision and Methodology
Marek Rosa - Inventing General Artificial Intelligence: A Vision and MethodologyMarek Rosa - Inventing General Artificial Intelligence: A Vision and Methodology
Marek Rosa - Inventing General Artificial Intelligence: A Vision and MethodologyMachine Learning Prague
 
Computational thinking jeannette m. wing
Computational thinking   jeannette m. wingComputational thinking   jeannette m. wing
Computational thinking jeannette m. winginformaticacuitlahuac
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligenceBikas Sadashiv
 
Ux lady-designing-for-error
Ux lady-designing-for-errorUx lady-designing-for-error
Ux lady-designing-for-errorsilvana churruca
 
Artificial general intelligence research project at Keen Software House (3/2015)
Artificial general intelligence research project at Keen Software House (3/2015)Artificial general intelligence research project at Keen Software House (3/2015)
Artificial general intelligence research project at Keen Software House (3/2015)Marek Rosa
 

What's hot (20)

Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Simplified Introduction to AI
Simplified Introduction to AISimplified Introduction to AI
Simplified Introduction to AI
 
Cognitive Science and AI
Cognitive Science and AICognitive Science and AI
Cognitive Science and AI
 
HCI Quick Guide
HCI Quick GuideHCI Quick Guide
HCI Quick Guide
 
Artificial intelligence(simulating the human mind)
Artificial intelligence(simulating the human mind)Artificial intelligence(simulating the human mind)
Artificial intelligence(simulating the human mind)
 
Cognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceCognitive Science Artificial Intelligence
Cognitive Science Artificial Intelligence
 
Computational Thinking in the Workforce and Next Generation Science Standards...
Computational Thinking in the Workforce and Next Generation Science Standards...Computational Thinking in the Workforce and Next Generation Science Standards...
Computational Thinking in the Workforce and Next Generation Science Standards...
 
AIML_Unit1.pptx
AIML_Unit1.pptxAIML_Unit1.pptx
AIML_Unit1.pptx
 
Lecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligenceLecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligence
 
Ai lecture 02 ai definition
Ai lecture 02 ai  definitionAi lecture 02 ai  definition
Ai lecture 02 ai definition
 
Ai chapter1
Ai chapter1Ai chapter1
Ai chapter1
 
Psychology Human Computer Interaction
Psychology Human Computer InteractionPsychology Human Computer Interaction
Psychology Human Computer Interaction
 
Interaction Paradigms
Interaction ParadigmsInteraction Paradigms
Interaction Paradigms
 
Marek Rosa - Inventing General Artificial Intelligence: A Vision and Methodology
Marek Rosa - Inventing General Artificial Intelligence: A Vision and MethodologyMarek Rosa - Inventing General Artificial Intelligence: A Vision and Methodology
Marek Rosa - Inventing General Artificial Intelligence: A Vision and Methodology
 
Computational thinking jeannette m. wing
Computational thinking   jeannette m. wingComputational thinking   jeannette m. wing
Computational thinking jeannette m. wing
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Ux lady-designing-for-error
Ux lady-designing-for-errorUx lady-designing-for-error
Ux lady-designing-for-error
 
Artificial general intelligence research project at Keen Software House (3/2015)
Artificial general intelligence research project at Keen Software House (3/2015)Artificial general intelligence research project at Keen Software House (3/2015)
Artificial general intelligence research project at Keen Software House (3/2015)
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
901470 chap1
901470 chap1901470 chap1
901470 chap1
 

Similar to Understanding Cybersecurity and Intelligence Roles

Artificial Intelligence power point presentation
Artificial Intelligence power point presentationArtificial Intelligence power point presentation
Artificial Intelligence power point presentationDavid Raj Kanthi
 
Artificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptxArtificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptxhoneydv1979
 
ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)Niyati Mehta
 
AI Lecture-01 (Introduction) NN and Fuzzy
AI Lecture-01 (Introduction) NN and FuzzyAI Lecture-01 (Introduction) NN and Fuzzy
AI Lecture-01 (Introduction) NN and FuzzySirRafiLectures
 
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptx
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptxcsc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptx
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptxAlexKaul1
 
AI ROUGH NOTES.pptx
AI ROUGH NOTES.pptxAI ROUGH NOTES.pptx
AI ROUGH NOTES.pptxnireekshan1
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceMayank Saxena
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersDHANIK VIKRANT
 
Introduction to Artificial intelligence and ML
Introduction to Artificial intelligence and MLIntroduction to Artificial intelligence and ML
Introduction to Artificial intelligence and MLbansalpra7
 
Artificial Intelligent introduction or history
Artificial Intelligent introduction or historyArtificial Intelligent introduction or history
Artificial Intelligent introduction or historyArslan Sattar
 
Human computer interaction with the complete syllabus
Human computer interaction with the complete syllabusHuman computer interaction with the complete syllabus
Human computer interaction with the complete syllabus201roopikha
 
UNIT1-AI final.pptx
UNIT1-AI final.pptxUNIT1-AI final.pptx
UNIT1-AI final.pptxCS50Bootcamp
 

Similar to Understanding Cybersecurity and Intelligence Roles (20)

Artificial Intelligence power point presentation
Artificial Intelligence power point presentationArtificial Intelligence power point presentation
Artificial Intelligence power point presentation
 
Artificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptxArtificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptx
 
ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)
 
AI Lecture-01 (Introduction) NN and Fuzzy
AI Lecture-01 (Introduction) NN and FuzzyAI Lecture-01 (Introduction) NN and Fuzzy
AI Lecture-01 (Introduction) NN and Fuzzy
 
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptx
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptxcsc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptx
csc384-Lecture01-Introduction_abcdpdf_pdf_to_ppt.pptx
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
n01.ppt
n01.pptn01.ppt
n01.ppt
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
AI ROUGH NOTES.pptx
AI ROUGH NOTES.pptxAI ROUGH NOTES.pptx
AI ROUGH NOTES.pptx
 
AI CH 1d.pptx
AI CH 1d.pptxAI CH 1d.pptx
AI CH 1d.pptx
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Introduction to Artificial intelligence and ML
Introduction to Artificial intelligence and MLIntroduction to Artificial intelligence and ML
Introduction to Artificial intelligence and ML
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Lec-1.pdf
Lec-1.pdfLec-1.pdf
Lec-1.pdf
 
Artificial Intelligent introduction or history
Artificial Intelligent introduction or historyArtificial Intelligent introduction or history
Artificial Intelligent introduction or history
 
Session 1
Session 1Session 1
Session 1
 
Human computer interaction with the complete syllabus
Human computer interaction with the complete syllabusHuman computer interaction with the complete syllabus
Human computer interaction with the complete syllabus
 
UNIT1-AI final.pptx
UNIT1-AI final.pptxUNIT1-AI final.pptx
UNIT1-AI final.pptx
 

More from Napier University

10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and PandasNapier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneNapier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-WattNapier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergNapier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinNapier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeNapier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarNapier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiNapier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraNapier University
 
P2P Publication Model on Blockchain, Imtiaz Khan
P2P Publication Model on Blockchain, Imtiaz KhanP2P Publication Model on Blockchain, Imtiaz Khan
P2P Publication Model on Blockchain, Imtiaz KhanNapier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 
P2P Publication Model on Blockchain, Imtiaz Khan
P2P Publication Model on Blockchain, Imtiaz KhanP2P Publication Model on Blockchain, Imtiaz Khan
P2P Publication Model on Blockchain, Imtiaz Khan
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Understanding Cybersecurity and Intelligence Roles

  • 2. Outline • Understanding job roles in cybersecurity. • Understand what intelligence is. • Heuristics and decision making. • Types of intelligence • Differences between human and machine intelligence.
  • 3. Outline Analogue world Digital world DAC (Digital to Analogue) Convertor ADC (Analogue to Digital) Convertor 1010101..0010Sensors Actuators (Motor) Light, heat, movement
  • 4. Outline Industry 1.0 Mechanization (1760-1820) Industry 2.0 Electrification (1870-1914) Industry 3.0 Automation (20th Century) Industry 4.0 Digitization (21st Century) Steam-power or water-powered engines Railways, factories, telegram Electronics, Electrical generator, CPU, Internet, Web Virtualization, AI, Cyberphysical, IoT
  • 5. Outline • RFC 791. Defines the format of IP packets (IPv4) • RFC 793. Defines TCP (Transport Control Protocol), which provides the foundation of the virtually all of the traffic that exists on the Internet.
  • 6. Industry 4.0 “From bits to information”
  • 7. 6vs and 6Cs Industry 4.0 brings: • 6 Cs: Connection (sensor and networks); Cloud (computing and data on demand); Cyber (model and memory); Content/context (meaning and correlation); Community (sharing and collaboration); and Customization (personalization and value). • 6 Vs: Volume; Velocity; Variety; Variability; Veracity; and Value.
  • 9. Cybersecurity NIST define Cybersecurity as: • Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation. and information security as: • the protection of information and information systems from unauthorized access… to provide confidentiality, integrity, and availability.
  • 10. Cybersecurity NIST define NICE framework. Within this, they outlined seven core categories; 33 specialty areas; and 52 work roles, and then mapped these to 1,007 tasks, 374 skills, 630 knowledge areas, and 176 abilities. The categories were: • Securely Provision (SP); • Operate and Maintain (OM); • Oversee and Govern (OV); • Protect and Defend (PR); • Analyze (AN); • Collect and Operate (CO); and • Investigate (IN).
  • 12. Intelligence Industry 4.0 brings: Cyber-phyiscal systems, IoT, Cloud Computing and Cognitive computing. Neisser define: • Individuals differ from one another in their ability to understand complex ideas, to adapt effectively to the environment, to learn from experience, to engage in various forms of reasoning, and to overcome obstacles by taking thought. • Intelligence is a very general mental capability that, among other things, involves the ability to reason, plan, solve problems, think abstractly, comprehend complex ideas, learn quickly and learn from experience.
  • 13. Types of intelligence • Naturalist Intelligence (nature smart). This involves the ability to discriminate between living things and their interaction with the natural world. • Musical Intelligence (sound smart). This involves the ability to understand pitch, rhythm, and tone, especially focused on the ability to create, analyse and reproduce music, such as in stimulating emotions around music. • Logical-Mathematical Intelligence (number/reasoning smart). This involves the ability to calculate, hypothesize, and quantify using mathematical operations. Key skills are to: abstract; define reasoned approaches; and to apply inductive and deductive thinking methods. • Existential Intelligence (life smart). This involves the ability to search for deep meanings to life, such as why we exist, and why we must die. • Inter-personal Intelligence (people smart). This involves the ability to understand other people using both verbal and non-verbal communications. Those with the best abilities for this are typically strong communicators and can understand the feelings and motivations of others.
  • 14. Humans v Computers • Learning. Humans adapt to changing situations, and generally quickly learn tasks. Unfortunately, once these tasks have been learnt, this can often lead to boredom if they are repeated repetitively. • Strategy. Humans are excellent at taking complex tasks and splitting them into smaller, less complex, tasks. Then, knowing the outcome, they can implement these in the required way, but can make changes depending on conditions. • Enterprise. Computers, as they are programmed at the present, are an excellent business tool. They generally allow for better decision making, but, at present, they cannot initiate new events. • Creativity. As with enterprise, humans are generally more creative than computers. This is likely to change over the coming years as they could programmed with the aid of psychologists, musicians, and artists, and will could include elements which are pleasing to the human senses.
  • 15. Humans v Computers • Spatial. This is the ability to differentiate between two- and three- dimensional objects. Computers, even running powerful image processing software, often have difficulty in differentiating between two- dimensional objects and three-dimensional ones. Humans, though, find this easy, but can be tricked by optical illusions, where a two-dimensional object is actually a three-dimensional object. The objects in left- hand side of Figure ref{fig:stick} are a mixture of a two-dimensional and three-dimensional object. Humans can quickly determine objects which are defined in 2D and which in 3D. • Perception. This is the skill of identifying simple shapes from complex ones. For example, humans can quickly look at a picture and determine the repeated sequences, shapes, and so on. For example, look at the picture on the right-hand side of Figure ref{fig:stick}, and determine how many triangles it contains? It is relatively easy for a human to determine this, as they have good perception skills. This is because the human brain can easily find simple shapes from complex ones. But, imagine writing a computer program which would determine all of the triangles in an object, then modifying it so it finds other shapes, such as squares, hexagons, and so on? • Memory. This is the skill of memorizing and recalling objects which do not have any logical connection. Humans have an amazing capacity for recalling objects, typically by linking objects, and from one to the next. Computers can implement this with a linked-list approach, but it becomes almost impossible to manage when the number of objects becomes large.
  • 16. Humans v Computers • Numerical. Most humans can manipulate numbers in various ways. Humans are by no-way as fast as computers, but humans can often simply complex calculations, either by approximating, or by eliminating terms which have little effect on the final answer. For example, we may have a tasks to find the approximate area for a room that is 6.9 metres and 9.1 meters? Many humans just approximate this to 7 times 9, and find the answer of 63 meters squared. • Verbal. This involves the comprehension of language, and while there has been great advances in the way that machines are able to process speech, they are often still weaker than humans in extracting meaning. • Lexical. This is a manipulation of vocabulary. Machines can generally analyse the lexical structure of written work, but they often still struggle to create their own lexical structures, and which lack interest or even meaning. They are thus generally good at spotting spelling mistakes and at grammar checking. • Reasoning. This is induction and deduction. Humans can often deduce things when they are not given a complete set of information.
  • 19. Types of intelligence • Attribute & Machine & Human • hline • Speed & Superior & Comparatively slow • Power Output & Superior in level in consistency & Comparatively weak • Consistency & Ideal of consistency, repetitive action & Unreliable learning and fatigue factors • Information capacity & Multi-channel & Primarily single channel • Memory & Idea of literal reproduction, access restricted, and formal & Better for principles and strategies, access is versatile and innovative • Reasoning computation & Deductive, tedious to program, fast and accurate, poor error correction & Inductive, easier to program, slow, accurate, and good error correction • Sensing & Good at quantitative assessment, poor at pattern recognition & Wide ranges, multi-function, judgement • Perceiving & Copes with variation poorly & Copes with variation better, susceptible to noise
  • 20. Motivations • Entertainment. This is basically the thrill of performing an attack. • Hacktivists. This relates to those who are motivated by political, religious, and social causes. • Financial gain. This relates to those attackers who are motivated by financial gain. • Spying. This relates to the stealing of information from others, typically in the form of Intellectual Property (IP). • Revenge. This relates to those who have motivations around revenge, such as a disgruntled employee/customer, or who might be someone who has been humiliated in the past.