Submitted by CyberHub Summit on Mon, 06/11/2018 - 10:57
Cyber Security with less Human Error.
Cyber Security with less Human Error.

Cyber Security experts who have been chanting at us that we need to focus on our strongest (and in terms of Cyber Security, weakest) resource, our users, for years, have started laying the foundations for another route to Cyber safety, which doesn’t rely on manpower.

There are two developing innovations that can only serve to bolster resistance to Hacking efforts across the board, Hardware authentication and Deep learning. 

Our weak link in the Cyber security chain can take a breather and witness game-changing movements against Cybercrime this year.

[Cyberhub Summit is Coming back to Atlanta, Ga | October 9-10, 2018 - Cyber Security education for executives and business owners and Powerful Networking. | Get the latest from Cyberhub Summit by signing up for their newsletters. ]

Security experts who desperately try to drill into users that weak passwords are really a huge part of cyber vulnerability, have realized they have to take a different approach.

Users, simply put, don't have it in them to create cunning enough passwords.

This rolls in a constant supply of easy access for hackers to networks which can compromise entire companies, or even government systems. It's frightening but it has forced the Cyber experts to produce better authentication methods.

Hardware Authentication

Taking the pressure off the software and placing it firmly into hardware has helped, especially in the Internet of Things, where many devices are connected and vulnerable to attack. By making each one of those devices answerable to their connectivity privileges through several components within the system, Hackers are finding it tougher to get to us.

The new Core vPro processor from Intel, for example, is hardware authentication that takes several different hardware components at once to validate the identity of a user.

Hardware is a lot less easy to manipulate than software and by confirming the computers identity in this way, by its parts, which when brought together making it somewhat unique, remote attacks become less likely.

This situation becomes even more interesting when applied to mobile hardware authentication. The frightening statistics are emerging that approximately one third of wireless device pose a significant risk to uncovering business data mainly due to downloaded Apps with malicious software, like all those Chinese phones that were made with pre-installed malware. 

The standard method for user authentication on a mobile has been through 2- step authentication, in terms of sending an SMS with a code or something similar. However, particularly in the ecommerce world, this sort of software authentication can be easily intercepted.

By hitting the hardware and seeking verification through: number of apps uploaded; the specific serial number of apps and the IOS version installed, the authentication process becomes a lot less easy to disrupt.

Deep Learning

Deep learning, an integral part of Machine learning looks for patterns or representations of learning data. They use coding to identify relationships between various impetuses and do not rely on human involvement or input.    

Deep learning looks at unusual behaviors and if they notice that behavior is out of character have the ability to make decisions on how to put a halt to system security threats.  Deep learning, basically cuts out the middle man and is analyzing the entities rather than users.

In a similar way that the Hardware authentication brings together computer components, Deep learning brings together computer patterns, neither of which depend on a user to move forward.

This is not to suggest that other security methods in software shouldn't be used and users shouldn’t be trained, none of that can be removed. The struggle against cyber criminals is both ongoing and real and these developments are simply the next line of defense in an ongoing battle.