{"id":3218,"date":"2016-09-06T13:56:00","date_gmt":"2016-09-06T17:56:00","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3218"},"modified":"2016-09-06T13:56:00","modified_gmt":"2016-09-06T17:56:00","slug":"how-machine-learning-is-making-for-better-it-security","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/06\/how-machine-learning-is-making-for-better-it-security\/","title":{"rendered":"How Machine Learning is Making for Better IT Security"},"content":{"rendered":"<p>I found the article below more interesting than the others I happened to read primarily for reasons dealing with competitive advantage and the fact that it is discussing a proactive and cheaper solution to IT security. \u00a0As the number of ways an individual can attack a system increases, as should our number ways to defend against those attacks. \u00a0In my opinion, IT security or cyber security seems to always be reactive in nature or &#8220;damage control&#8221; as other articles point to a speedy reaction time as being key to mitigating a business&#8217; loss. \u00a0Imagine a world were intrusions and attacks can be predicted and avoided as opposed to hardening a system with the hope that an attack or intrusion is unsuccessful. \u00a0From an enterprise risk management perspective having a predictive\u00a0approach to IT security on top of solid detective and compensating controls could be the solution to better mitigating loss to the business. \u00a0What does this mean with regards to competing in the market? \u00a0It means margin; if two companies are competing directly in the e-commerce market place and one company has an automated machine learning approach to IT security, that means it doesn&#8217;t have the expense that comes with hiring humans, even if it is one less human. \u00a0One less human means one less employee benefit package and salary, which means decreases expenses and increases margins. \u00a0The long-term viability of the firm that implements a Machine Learning approach to IT security is greatly increased. \u00a0Implementing cheaper more efficient means of doing any business function almost always means more profits and better share performance.<\/p>\n<p>At my firm we are working on such Machine Learning algorithms, and most of the executives say, &#8220;it won&#8217;t work&#8230;&#8221; but that is because they don&#8217;t understand the math behind the algorithms or the applications of Machine Learning. \u00a0Pattern recognition and response time to the n&#8217;th degree and at levels far beyond that of a human. \u00a0I&#8217;ve heard and have been involved in many debates around combining Machine Learning and Cyber Security.<\/p>\n<p>So I pose a question, should this type of technology be used as a decision support tool within the business or should it be used as a stand-alone IT tool with minimal human interaction? \u00a0To play devil&#8217;s advocate, on May 6, 2010 the &#8216;Flash Crash&#8217; was said to have been caused by a trader spoofing the algorithm. \u00a0Could this happen in this case?<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/insidebigdata.com\/2016\/08\/26\/machine-learning-making-better-security\/\">http:\/\/insidebigdata.com\/2016\/08\/26\/machine-learning-making-better-security\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I found the article below more interesting than the others I happened to read primarily for reasons dealing with competitive advantage and the fact that it is discussing a proactive and cheaper solution to IT security. \u00a0As the number of ways an individual can attack a system increases, as should our number ways to defend [&hellip;]<\/p>\n","protected":false},"author":7350,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3218","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/7350"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3218"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3218\/revisions"}],"predecessor-version":[{"id":3219,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3218\/revisions\/3219"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}