- If your AI-generated code becomes faulty, who faces the most liability exposure?
- These discoutned earbuds deliver audio so high quality, you'll forget they're mid-range
- This Galaxy Watch is one of my top smartwatches for 2024 and it's received a huge discount
- One of my favorite Android smartwatches isn't from Google or OnePlus (and it's on sale)
- The Urgent Need for Data Minimization Standards
Emerging Technology Review and Needs
By Milica D. Djekic
The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to the majority across the globe. The new millennium has started with a plenty of great scientific ideas and proposals, but also it has given a highly appealing lesson to the humankind warning the majority of the global population how it appears living and working in an unsafe and pretty unsecure world which has made everyone being dependable on speculating reliable and less trustworthy technology, so far. In other words, the main challenge with this novel time is how to remain cyber safe in an environment of the always evolving threat which has a capacity to significantly impact critical infrastructure and consequently, hurt people, processes and technologies. Apparently, high-tech security has become an imperative in protecting the entire nations and their countries and the fact is such a marketplace has turned into well-developed ecosystem which can offer a lot, but cannot provide an absolute assurance as those using such solutions and services will never be remained in the peace for a reason some risk must be chronically present concerning gatekeepers in their mission to even reduce that unwanted pillar, so far. On the other hand, the fourth industrial revolution has brought a heap of new technological systems such as an artificial intelligence (AI) being in its weak phase of the deployment and many recognized researchers believe a strong age of the AI yet needs to come leaving a lot of places to those who are looking for applied AI outcomes. The point is scientists, engineers and innovators of nowadays must serve hard in order to make a marriage between extremely demanding cyber defense usages and truly promising AI perspectives as those two areas should live in harmony, synergy and collaboration with one another, because those both disciplines of science and practice are still on their road to get much more developed and deeply applied in a very dynamic and complicated surrounding, so far. The purpose of this article is to offer some initial suggestions, letting a potential for much deeper research, which should open up a true scientific, professional and expert’s discussion about the pluses and minuses of those quite close, but yet not completely explored areas of technology.
The low-voltage electronics systems have noticed their boom after the World War 2 bringing with themselves some practical applications of the binary algebra which have led to the digitalization as it is well-known today. The digital technologies are widespread worldwide nowadays and many have mastered how to design and produce some of such technical solutions which makes those endeavors being suitable and available to the majority of the international population, so far. In other words, when an offering is huge a pricing should be lower as the multinational giants, as well as some startups yet have an interest to overwhelm the marketplace with their products and services as getting something accessible to many means being better competitive then the rest of the competitors and providing a plenty of qualitative and still cost-effective outcomes. Indeed, the quality and price can go together as if the marketplace is big such a condition might cover all the offering’s expanses and yet count on some profit which can be, say, 2 or 3 percentages which is in case of ungreedy business more than sufficient which suggests it is worth of putting such a time and effort into that mission. Especially, it is interesting to mention that the majority of the hardware and electronic devices in a digital technology arena are made from semiconductors such as silicon which can be isolated from a sand being a building block for making something cheap and yet functional which might dramatically impact a curve of the optimal solution suggesting that the optimal product or service can provide a high functionality for a very reasonable price. It seems investing into research of the semiconductors technologies could be an extremely return-of-investment (ROI) process as it is truly needed to make some comparing of the industry being available at the present and the industry coming from such an inexpensive and anywhere reaching resource as the silicon is, so far. Further, from a strategic perspective, many world’s corporations and business actors have a deep influence on their governments and the other international organizations seeking from them to push some of their interests through a legal regulation which is well-accepted from a point of view of the national, regional and even global economies. Apparently, many could be lured to invest into such activities as their ROI could be good and to such an experience, the entire distribution of the progress at the global scale could be accelerated requiring less time for betterment and prosperity come to the developing societies and even the most undeveloped parts of the world, so far. In addition, the humankind could significantly progress as a civilization dealing with the equally good opportunities mainly to all members of its family.
No technology is safe from a security risk even being physical and, in this case, virtual being strongly correlated with the current information-communication technologies (ICT) that are mostly something many can see as a cyberspace, so far. With the appealingly high demand for a cyber security in the majority of progressive countries and initially led by the United States there has appeared a totally new branch of the commerce being a cyber industry which in order to acquire the biggest possible marketplace sometimes has used a language of the fear trying to aware a business sector to invest into ICT defense, but after realizing the results to that strategy are poor switched to an approach being much closer to the business people as it is always challenging to make players pay more if they happily can live without such offerings and stay with a more money in their pockets. That was an attitude yesterday, but nowadays many have become convinced that under arising threat from a terrorism mostly, as well as the other asymmetric challenges the cyber security has turned in a requirement many will appreciate and their governments once getting confident about the very feasible consequences to the critical infrastructure have approved such national strategies and legal regulations, so far. It’s fully difficult adopting such an approach as the ongoing lessons from a modern history are quite unhandy and no one would want them ever happen to anyone again, so that’s why such a need has been recognized and maybe that is not a completely global trend as in some parts of the world it’s yet too costy investing funds into those technological landscapes as in the low-level economy countries the money is not an only concern, but more likely a skill shortage is enormously large and those guys simply cannot resolve any of such complicated and complex tasks, so far. In other words, cyber defense looks for an international collaboration as the domestic, regional and global policing organizations must cope with both – human and technological resources to tackle a cybercrime. The experience suggests that the majority of those asymmetric threats are deeply linked with the transnational organized crime and terrorism and it is only a matter of time when someone can drastically attack from the cyberspace and affect the lives of many in a truly negative connotation, so far. The fact is any technological weapon must have its adequate counter-weapon which might respond to an always arising threat which in the best-case scenario, should be prevented to even occur which is an extremely hard problem to those who are not having a technical capacity and if they just have, they cannot count on people who could be enough skilled to even use that. Next, in the modern time, the information travels in a sub-second period of time and even if some defense agencies are technologically equipped, they need a plenty of time to train their human capacities to get vetting about their highly demanding tasks being assigned to them in order to let them provide the best possible response to the crime and literally stay at least a step ahead of the bad guys.
References:
[1] Djekic, M. D., 2017. The Internet of Things: Concept, Application and Security. LAP LAMBERT Academic Publishing.
[2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine
[3] Djekic, M. D., 2021. Smart Technological Landscape. Cyber Security Magazine
[4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine
[5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine
[6] Djekic, M. D., 2021. Communication Streaming Challenges. Cyber Defense Magazine
[7] Djekic, M. D., 2021. Channelling as a Challenge. Cyber Defense Magazine
[8] Djekic, M. D., 2021. Offense Sharing Activities in Criminal Justice Case. Cyber Defense Magazine
[9] Djekic, M. 2019. The Informant Task. Asia-Pacific Security Magazine
[10] Djekic, M. D., 2020. The Importance of Communication in Investigations. International Security Journal
[11] Djekic, M. D. 2019. The Purpose of Neural Networks in Cryptography, Cyber Defense Magazine
[12] Djekic, M. D. 2020. Artificial Intelligence-driven Situational Awareness, Cyber Defense Magazine
[13] Djekic, M. D. 2019. The Perspectives of the 5th Industrial Revolution, Cyber Defense Magazine
[14] Djekic, M. D. 2019. The Email Security Challenges, Cyber Defense Magazine
[15] Djekic, M. D. 2016. The ESIS Encryption Law, Cyber Defense Magazine
[16] Đekić, M. D., 2021. The Insider’s Threats: Operational, Tactical and Strategic Perspective. LAP LAMBERT Academic Publishing.
[17] Đekić, M. D., 2022. Static Absorber Modelling. Military Technical Courier
About the Author
Milica D. Djekic is an Independent Researcher from Subotica, the Republic of Serbia. She received her engineering background from the Faculty of Mechanical Engineering, University of Belgrade. She writes for some domestic and overseas presses and she is also the author of the books “The Internet of Things: Concept, Applications and Security” and “The Insider’s Threats: Operational, Tactical and Strategic Perspective” being published in 2017 and 2021 respectively with the Lambert Academic Publishing. Milica is also a speaker with the BrightTALK expert’s channel. She is the member of an ASIS International since 2017 and contributor to the Australian Cyber Security Magazine since 2018. Milica’s research efforts are recognized with Computer Emergency Response Team for the European Union (CERT-EU), Censys Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation (ECCSA). Her fields of interests are cyber defense, technology and business. Milica is a person with disability.