16
Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 1/16 Council of the European Union General Secretariat READING REFERENCES 2019 Council Library Artificial Intelligence in the field of cybersecurity From the offensive and the defensive perspective

From the offensive and the defensive perspective · 2019-10-11 · Artificial Intelligence in the field of cybersecurity, from the offensive and ... Request via Ebook central

  • Upload
    others

  • View
    14

  • Download
    1

Embed Size (px)

Citation preview

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 1/16

Council of the European Union General Secretariat

READING REFERENCES 2019

Council Library

Artificial Intelligence in the field of cybersecurity From the offensive and the defensive perspective

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 2/16

Artificial Intelligence in the field of cybersecurity, from the offensive and

the defensive perspective

The future is digital, and in today’s digital landscape offensive and defensive artificial intelligence (AI) will be a key battleground. As complex cybersecurity threats become more commonplace, AI solutions are expected to play an enhanced role in critical fields such as cyber defence, risk management, pattern recognition and malware detection.

To cope with the growing number and complexity of threats, AI technologies are being used both on the attacking and the defending side. With Since October being is the European Cyber Security month, and in view of, as well the Finnish Presidency priority on countering hybrid and cyber threats, the Council Library has compiled a reading relating to the use of artificial intelligence being used in cybersecurity.

This reading list should help you to discover the key concepts of how AI is being used to detect and contain cybersecurity threats, how AI systems can identify system vulnerabilities and rapidly respond to potential threats.

Reading list compiled by the Council Libraries Please note:

This bibliography is not exhaustive; it provides a selection of resources provided by the Council Library.

Most of the titles are hyperlinked to Eureka, the resource discovery service of the Council Library,

where you can find additional materials on the subject. Access to some resources might be limited to

registered Council Library users or to users in subscribing institutions.

The contents are the sole responsibility of their authors. Resources linked from this bibliography do not

necessarily represent the positions, policies, or opinions of the Council of the European Union or the

European Council.

Reuse of the covers is prohibited, they belong to the respective copyrightholders. Additional resources

may be added to this list by request - please contact the Council Library to suggest a title:

[email protected]

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 3/16

BOOKS

AI in Cybersecurity Leslie F Sikos editor. 1st ed. Cham : Springer International Publishing Springer 2019 Online Access "The current variety and scope of cybersecurity threats far

exceed the capabilities of even the most skilled security

professionals. In addition, analyzing yesterday's security

incidents no longer enables experts to predict and prevent

tomorrow's attacks, which necessitates approaches that

go beyond identifying known threats. There are promising

avenues: complex behavior matching can isolate threats

based on the actions taken, while machine learning can

help detect anomalies, prevent malware infections, and

protect assets from hackers. Knowledge representation

enables automated reasoning over network data, helping

achieve cybersituational awareness."

Machine learning for computer and cyber security : principles, algorithms, and practices Brij Gupta 1982- editor. ; Quan Z. Sheng editor. Boca Raton ; London ; New York : CRC Press, Taylor & Francis Group , 2019 Online access "Focuses on the impact on artificial intelligence (AI) on

nuclear strategy. It explores regional perspectives and

trends related to the impact that recent advances in AI

could have nuclear weapons and doctrines, strategic

stability and nuclear risk. It assembles the views of 14

experts from the Euro-Atlantic community on why and how

machine learning and autonomy might become the focus

of an armed race among nuclear-armed states; and how

the adoption of these technologies might impact their

calculation of strategic stability and nuclear risk ".

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 4/16

Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Alessandro Parisi Packt Publishing, 2019 Request via Ebook central "This cybersecurity book presents and demonstrates

popular and successful AI approaches and models that

you can adapt to detect potential attacks and protect

your corporate systems. You'll learn about the role of

machine learning and neural networks, as well as deep

learning in cybersecurity, and you'll also learn how you

can infuse AI capabilities into building smart defensive

mechanisms. As you advance, you'll be able to apply

these strategies across a variety of applications,

including spam filters, network intrusion detection, botnet

detection, and secure authentication".

Cybersecurity : politics, governance and conflict in cyberspace Van Puyvelde, Damien ; Brantly, Aaron Polity , 2019 Online access "Exploring the interactions of individuals, groups and

states in cyberspace, and the integrated security risks to

which these give rise, they examine cyberspace as a

complex socio-technical-economic domain that fosters

both great potential and peril".

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 5/16

The impact of artificial intelligence on strategic intelligence and nuclear risk Volume I, Euro-Atlantic perspectives Vincent Boulanin ; Stockholm International Peace Research Institute, 2019 Online access "This volume focuses on the impact on artificial

intelligence (AI) on nuclear strategy. It explores regional

perspectives and trends related to the impact that recent

advances in AI could have nuclear weapons and

doctrines, strategic stability and nuclear risk. It assembles

the views of 14 experts from the Euro-Atlantic community

on why and how machine learning and autonomy might

become the focus of an armed race among nuclear-armed

states; and how the adoption of these technologies might

impact their calculation of strategic stability and nuclear

risk at the regional level and trans-regional level".

Cyber security : power and technology Martti Lehto ; P Neittaanmäki (Pekka) Cham : Springer , 2018 Available at Council Library Main Collection (105252) "This book gathers the latest research results of scientists

from different countries who have made essential

contributions to the novel analysis of cyber security.

Addressing open problems in the cyber world, the book

consists of two parts. Part I focuses on cyber operations

as a new tool in global security policy, while Part II

focuses on new cyber security technologies when building

cyber power capabilities. The topics discussed include

strategic perspectives on cyber security and cyber

warfare, cyber security implementation, strategic

communication, trusted computing, password cracking,

systems security and network security among others."

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 6/16

Towards a framework for policy development in cybersecurity security and privacy considerations in autonomous agents. Drogkaris, Prokopios ; Bourka, Athena ; European Union Agency for Network and Information Security Heraklion : ENISA, 2018 Online access "Over the last years, Artificial Intelligence (AI) has rapidly

moved beyond the realms of research and academia to

enter the commercial mainstream, with innovative

autonomous agents utilizing AI and transforming how we

access and leverage information. Autonomous agents are

characterized by diversity, with applications varying from

digital assistants residing in our smartphones to

autonomous robots supporting the supply chain.. The

current study highlights a number of relevant

considerations, such as unauthorized autonomous

systems, retention and opacity of processing."

Analysis of the European R&D priorities in cybersecurity : strategic priorities in cybersecurity for a safer Europe. Di Franco, Fabio ; European Union Agency for Network and Information Security Heraklion : ENISA , 2018 Online access "Predicting the future is notoriously difficult. Nevertheless,

the main goal of this document is to identify the

cybersecurity threats to European society and to identify

priorities in research that will lead to mitigations before

those cybersecurity threats materialise. By identifying

future problem areas, Europe can take a proactive

approach in defending against anticipated threats. The

report focuses on identifying emerging challenges and on

those current challenges that are evolving into significant

risks to society".

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 7/16

Artificial intelligence a European perspective. European Commission ; Joint Research Centre ; Luxembourg : Publications Office , 2018 Online access "We are only at the beginning of a rapid period of

transformation of our economy and society due to the

convergence of many digital technologies. Artificial

intelligence (AI) is central to this change and offers major

opportunities to improve our lives. The recent

developments in AI are the result of increased processing

power, improvements in algorithms and the exponential

growth in the volume and variety of digital data. Many

applications of AI have started to appear in our everyday

lives, from machine translations, to image recognition, and

music generation, and are increasingly deployed in

industry, government and commerce."

The sentient machine : the coming age of artificial intelligence Amir Husain New York : Scribner , 2017 Available at Council Library Main Collection (105660) "Artificial “machine” intelligence is playing an ever-greater

role in our society. We are already using cruise control in

our cars, automatic checkout at the drugstore, and are

unable to live without our smartphones. The discussion

around AI is polarized; people think either machines will

solve all problems for everyone, or they will lead us down

a dark, dystopian path into total human irrelevance.

Regardless of what you believe, the idea that we might

bring forth intelligent creation can be intrinsically

frightening. But what if our greatest role as humans so far

is that of creators?."

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 8/16

Cyber-assurance for the internet of things Amir Husain New York : Scribner , 2017 Online access "This book discusses the cyber-assurance needs of the

Internet of Things (IoT) environment, highlighting key

information assurance (IA) IoT issues and identifying the

associated security implications. Through contributions

from cyber-assurance, IA, information security and IoT

industry practitioners and experts, the text covers

fundamental and advanced concepts necessary to grasp

current IA issues, challenges, and solutions for the IoT.

The book also discusses IA measures necessary to

detect, protect, and defend IoT information and

networks/systems to ensure their availability, integrity,

authentication, confidentially, and non-repudiation."

Künstliche Intelligenz – Wann übernehmen die Maschinen? Klaus Mainzer author. Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer , 2016 Online access "Seit ihrer Entstehung ist die KI-Forschung mit großen

Visionen über die Zukunft der Menschheit verbunden.

Löst die „künstliche Intelligenz“ also den Menschen ab?

Dieses Buch ist ein Plädoyer für Technikgestaltung: KI

muss sich als Dienstleistung in der Gesellschaft

bewähren."

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 9/16

SELECTED ARTICLES

3 ways AI will change the nature of cyber attacks Dixon, William ; Eagan, Nicole ; World Economic Forum June 2019 Online access

Cyberattacks are becoming ubiquitous and have been recognised as one of the most

strategically significant risks facing the world today. In recent years, we have witnessed

digital assaults against governments and the owners of critical infrastructure, large private

corporations and smaller ones, educational institutions and non-profit organizations. Not

only is no sector immune from cyberattacks, the level of sophistication of the threats they

face is continually increasing. The future of cybersecurity will be driven by a new class of

subtle and stealthy attackers that has recently emerged. Their aim is not to steal data, but

rather to manipulate or change it. There is little doubt that artificial intelligence (AI) will be

used by attackers to drive the next major upgrade in cyber weaponry and will ultimately

pioneer the malicious use of AI. AI’s fundamental ability to learn and adapt will usher in a

new era in which highly-customised and human-mimicking attacks are scalable. ’Offensive

AI’ – highly sophisticated and malicious attack code – will be able to mutate itself as it

learns about its environment, and to expertly compromise systems with minimal chance of

detection.

Toward AI security : global aspirations for a more resilient future Cussins Newman, Jessica ; Center for Long-Term Cybersecurity (CLTC)

February 2019

Online access

Toward AI security : global aspirations for a more resilient future,” introduces a new

framework for global artificial intelligence (AI) security alongisde an analysis of government

strategies from around the world, including the US, China, France, and India. The report

highlights significant divergences between government approaches to the security

implications of AI, but also identifies numerous synergies that can be leveraged to support

global coordination. The report also includes an analysis of AI strategies and policies from

ten countries, using the AI Security Map to identify areas of convergence and divergence.

This comparative exercise highlights significant policy gaps, but also opportunities for

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 10/16

coordination and cooperation among all surveyed nations as they advance their respective

AI strategies. Artificial intelligence what implications for EU security and defence? Fiott, Daniel ; Lindstrom, Gustav ; European Union Institute for Security Studies Paris : EUISS , 2018 Online access

Consider a world where human decision-making and thought processes play less of a role

in the day-to-day functioning of society. Think now of the implications this would have for

the security and defence sector. Over the next few decades, it is likely that Artificial

Intelligence (AI) will not only have major implications for most areas of society such as

healthcare, communications and transport, but also for security and defence. AI can be

broadly defined as systems that display intelligent behaviour and perform cognitive tasks

by analysing their environment, taking actions and even sometimes learning from

experience. The complex attributes of the human mind are well known, but to replicate

most of these abilities in machine or algorithmic form has given policymakers and scholars

pause for thought. What is more, much of the concern generated by AI centres on whether

such intelligence may eventually lead to post-human systems that can generate decisions

and actions that were not originally pre-programmed. Accordingly, optimists argue that AI

has the potential to revolutionise the global economy for the better, whereas some

pessimists have gone as far as to forecast that AI will mark the end of modern society as

we know it.

Malware in the future? Forecasting of analyst detection of cyber events Bakdash, Jonathan Z ; Hutchinson, Steve ; Zaroukian, Erin G ; Marusich, Laura R ; Thirumuruganathan, Saravanan ; Sample, Charmaine ; Hoffman, Blaine ; Das, Gautam Journal of Cybersecurity, 2018, Vol. 4(1) Online access

Cyberattacks endanger physical, economic, social, and political security. There have been

extensive efforts in government, academia, and industry to anticipate, forecast, and

mitigate such cyberattacks. A common approach is time-series forecasting of cyberattacks

based on data from network telescopes, honeypots, and automated intrusion

detection/prevention systems. This research has uncovered key insights such as

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 11/16

systematicity in cyberattacks. Here, we propose an alternate perspective of this problem

by performing forecasting of attacks that are “analyst-detected” and “-verified” occurrences

of malware. We call these instances of malware cyber event data. Specifically, our dataset

was analyst-detected incidents from a large operational Computer Security Service

Provider (CSSP) for the US Department of Defense, which rarely relies only on automated

systems. Our data set consists of weekly counts of cyber events over approximately 7

years. The advanced information provided by a forecast may help with threat awareness

by providing a probable value and range for future cyber events one week ahead, similar

to a weather forecast. Enhanced threat awareness may improve cybersecurity by helping

to optimize human and technical capabilities for cyber defense.

The EU and artificial intelligence: A human-centred perspective Carriço, Gonçalo ;

European View, April 2018, Vol.17(1), pp.29-36

Online access

This article analyses the potential benefits and drawbacks of artificial intelligence (AI). It

argues that the EU should become a leading force in AI development. As a goal that

captures the public imagination and mobilises a variety of actors, the EU should develop

mission-based innovations that focus on using this technological leadership to solve the

most pressing societal problems of our time whilst avoiding potential dangers and risks.

This leadership could be achieved either by adapting the EU’s available instruments to

focus on AI development or by designing new ones. Be it seeking a visionary future for AI

or addressing concerns about it, progress should always be driven with the human-centred

perspective in mind, that is, one that seeks to augment human intelligence and capacity,

and not to supersede it.

Faut-il craindre l’intelligence artificielle? analyse approfondie. ; Bentley, Peter J ; Brundage, Miles ; Häggström, Olle ; Metzinger, Thomas ; ; European

Parliament ; Directorate-General for Parliamentary Research Services ;

Brussels : European Parliament, 2018

Online access

L’intelligence artificielle (IA) fait depuis plusieurs années une percée remarquable. Une série de

programmes visant à tirer le potentiel maximal de la dernière génération de processeurs permet

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 12/16

d’obtenir des résultats spectaculaires. L’une des applications les plus remarquables de l’IA est la

reconnaissance vocale: alors que les premières versions étaient peu fiables et commettaient de

nombreuses erreurs, ces logiciels sont désormais capables de répondre correctement à des

demandes très diverses émanant des utilisateurs dans les situations les plus variées. Le domaine

de la reconnaissance d’images enregistre aujourd’hui aussi des progrès notables grâce

notamment à des programmes capables de reconnaître des visages – et même des chats – sur

des vidéos en ligne qui ont été adaptés afin de commander les voitures autonomes qui pulluleront

dans nos rues au cours des années à venir. À l’heure actuelle, il est impossible d’imaginer l’avenir

en Europe sans une IA avancée, qui aura une incidence sur un nombre toujours plus important

d’aspects de notre vie, du travail à la médecine, en passant par l’éducation et les relations

interpersonnelles.

How the enlightenment ends A. Kissinger, Henry

The Atlantic, June 2018

Online access

Philosophically, intellectually—in every way—human society is unprepared for the rise of artificial

intelligence. Artificial intelligence will in time bring extraordinary benefits to medical science, clean-

energy provision, environmental issues, and many other areas. But precisely because AI makes

judgments regarding an evolving, as-yet-undetermined future, uncertainty and ambiguity are

inherent in its results. There are three areas of special concern : AI may achieve unintended

results; in achieving intended goals AI may change human thought processes and human values;

AI may reach intended goals, but be unable to explain the rationale for its conclusions

The promise and peril of military applications of artificial intelligence Horowitz, Michael C. Bulletin of the Atomic Scientists, April 23, 2018

Online access

The promise of AI—including its ability to improve the speed and accuracy of everything from

logistics and battlefield planning to human decision making—is driving militaries around the world

to accelerate research and development. Artificial intelligence (AI) is having a moment in the

national security space. While the public may still equate the notion of artificial intelligence in the

military context with the humanoid robots of the Terminator franchise, there has been a significant

growth in discussions about the national security consequences of artificial intelligence. These

discussions span academia, business, and governments, from Oxford philosopher Nick Bostrom’s

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 13/16

concern about the existential risk to humanity posed by artificial intelligence to Tesla founder Elon

Musk’s concern that artificial intelligence could trigger World War III to Vladimir Putin’s statement

that leadership in AI will be essential to global power in the 21st century.

The age of artificial intelligence : towards a European strategy for human-centric machines European Political Strategy Centre

Issue 29, March 27, 2018

Online access

Deployed wisely, AI holds the promise of addressing some of the world’s most intractable

challenges. But the significance of its positive impact is mirrored by its likely destabilising effects

on some aspects of economic and social life. Our paper explores the opportunities and ethical

challenges that come with AI and focuses on how Europe can sharpen its competitive edge vis-à-

vis other leading economies, such as the United States and China.

Beyond the buzzword: big data and national security decision-making Van Puyvelde, Damien ; Coulthart, Stephen ; Hossain, M. Shahriar

International Affairs, 2017, Vol. 93(6), pp.1397-1416

Online access

This article explores the role big data plays in the national security decision-making process. The

global surveillance disclosures initiated by former NSA contractor Edward Snowden have

increased public and academic discussions about big data and national security. Yet, efforts to

summarize and import insights from the vast and interdisciplinary literature on data analytics have

remained rare in the field of security studies. To fill this gap, we explain the core characteristics of

big data, provide an overview of the techniques and methods of data analytics, and explore how

big data can support the core national security process of intelligence. Big data is not only defined

by the volume of data but also by their velocity, variety and issues of veracity. Scientists have

developed a number of techniques to extract information from big data and support national

security practices. We find that data analytics tools contribute to and influence all the core

intelligence functions in the contemporary US national security apparatus. However, these tools

cannot replace the central role of humans and their ability to contextualize security threats. The

fundamental value of big data lies in humans' ability to understand its power and mitigate its limits.

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 14/16

Cybersecurity and cyber defence: national level strategic approach Galinec, Darko ; Možnik, Darko ; Guberina, Boris

Automatika, 03 July 2017, Vol.58(3), pp.273-286

Online access

Cybersecurity encompasses a broad range of practices, tools and concepts related closely to

those of information and operational technology (OT) security. Cybersecurity is distinctive in its

inclusion of the offensive use of information technology to attack adversaries. Use of the term

"cybersecurity" as a key challenge and a synonym for information security or IT security confuses

customers and security practitioners, and obscures critical differences between these disciplines.

Recommendation for security leaders is that they should use the term "cybersecurity" to designate

only security practices related to the defensive actions involving or relying upon information

technology and/or OT environments and systems. Within this paper, we are aiming to explain

"cybersecurity" and describe the relationships among cybersecurity, information security, OT

security, IT security, and other related disciplines and practices, e.g. cyber defence, related to their

implementation aligned with the planned or existing cybersecurity strategy at the national level. In

the case study given example of The National Cybersecurity Strategy of the Republic of Croatia

and Action plan is presented and elaborated. The Strategy's primary objective is to recognize

organizational problems in its implementation and broaden the understanding of the importance of

this issue in the society.

The military and the machine. Stanley-Lockman, Zoe ; European Union Institute for Security Studies

Paris : ISS , 2016

Online access

Artificial intelligence and autonomous systems are already disruptive technologies in civilian

sectors, and the same is likely to happen when they become more prevalent in the military realm.

This Alert focuses on the non-lethal applications of artificial intelligence and autonomous systems,

and how they might impact military capabilities and alter command structures down the road.

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 15/16

ARTICLES AVAILABLE VIA THE EUROPEAN COMMISSION LEARNING CENTRE The Council Libraries cooperate with the Learning Centres of the European Commission.

You can either borrow directly from the Commission Learning Centre in Brussels or you can create a resource sharing request to the Council Library via Eureka. The books can be delivered to your office.

Artificial intelligence and policy: quo vadis? Lauterbach, Anastassia Digital Policy, Regulation and Governance, 13 May 2019, Vol.21(3), pp.238-263 Request via Eureka From the Commission

This paper aims to inform policymakers about key artificial intelligence (AI) technologies,

risks and trends in national AI strategies. It suggests a framework of social governance to

ensure emergence of safe and beneficial AI. Policymakers still need to develop an

informed, scientifically grounded and forward-looking view on what societies and

businesses might expect from AI. AI is progressing at a very fast rate, changing industries,

businesses and approaches how companies learn, generate business insights, design

products and communicate with their employees and customers. It has a big societal

impact, as – if not designed with care – it can scale human bias, increase cybersecurity

risk and lead to negative shifts in employment. Like no other invention, it can tighten

control by the few over the many, spread false information and propaganda and therewith

shape the perception of people, communities and enterprises.

Cybersecurity and its discontents : artificial intelligence, the Internet of Things, and digital misinformation Wilner, Alex S

International Journal, June 2018, Vol.73(2), pp.308-316

Request it via Eureka From the Commission

The future of cybersecurity is in flux. Artificial intelligence challenges existing notions of security,

human rights, and governance. Digital misinformation campaigns leverage fabrications and

mistruths for political and geostrategic gain. And the Internet of Things—a digital landscape in

which billions of wireless objects from smart fridges to smart cars are tethered together—provides

new means to distribute and conduct cyberattacks. As technological developments alter the way

we think about cybersecurity, they will likewise broaden the way governments and societies will

have to learn to respond. This policy brief discusses the emerging landscape of cybersecurity in

Council of the European Union Rue de la Loi/Wetstraat 175 - B-1048 Bruxelles/Brussel - Belgique/België Tel. +32 (0)2 281 65 25 Follow us http://www.consilium.europa.eu/en/library-blog/ - #EUCOlibrary 16/16

Canada and abroad, with the intent of informing public debate and discourse on emerging cyber

challenges and opportunities.

A novel security information and event management system for enhancing cyber security in a hydroelectric dam Di Sarno, Cesario ; Garofalo, Alessia ; Matteucci, Ilaria ; Vallini, Marco International Journal of Critical Infrastructure Protection, June 2016, Vol.13, pp.39-51 Request via Eureka from the European Commission

Security information and event management (SIEM) systems are increasingly used to cope with

the security challenges involved in critical infrastructure protection. However, these systems have

several limitations. This paper describes an enhanced security information and event management

system that (i) resolves conflicts between security policies; (ii) discovers unauthorized network

data paths and appropriately reconfigures network devices; and (iii) provides an intrusion- and

fault-tolerant storage system that ensures the integrity and non-forgeability of stored events. The

performance of the enhanced system is demonstrated using a case study involving a hydroelectric

dam. The case study considers an attack model that affects portions of the information technology

infrastructure of the hydroelectric dam and demonstrates that the security information and event

management system is successfully able to detect and respond to attacks.

This selection of resources was compiled by the Library of the General Secretariat of the Council of the European Union for information only. The contents are the sole responsibility of their authors. Books linked from this review do not represent the positions, policies, or opinions of the Council of the European Union or the European Council. Reuse of the covers is prohibited, they belong to the respective copyright holders.