人工智能和区块链塑造网络安全的未来

来源 :英语世界 | 被引量 : 0次 | 上传用户:nallysun
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  As we become increasingly dependent on technology in our daily lives we open ourselves up to an entirely new kind of threat, cyberattacks.
  When we started thinking about cybersecurity and where it’s heading, one of the first issues brought up was the Internet of Things. Someone tampering with your computer while you’re surfing the web is an inconvenience, but what about someone hacking into your car while you’re driving down the highway?
  So, in an effort to ease our fears and gain a better perspective we decided to ask a group of cybersecurity experts…
  What’s the future of cybersecurity?
  随着我们在日常生活中愈加依赖科技,我们将面对一种全新的威胁:网络攻击。
  我们开始思考网络安全及其发展方向时,提出的第一个问题就是物联网。在您上网时,有人窜改您的计算機会带来不便,那您在路上行驶时,有人黑入您的汽车怎么办?
  因此,为了缓解我们的恐惧并获得更好的认知,我们决定咨询一群网络安全专家……
  网络安全的未来是什么样的?
  Ondrej Vlcek, CTO & GM of Consumer at Avast1
  “In 10-15 years, we will be deep in a ‘war of the machines’ era with advances in artificial intelligence bringing fast and sophisticated execution of security defense and cybercrime. This will be a battle of AI vs AI.
  “The availability of low cost computing and storage, off-the-shelf machine learning algorithms, AI code and open AI platforms will drive increased AI use by the good guys to defend and protect—but also increase deployment of AI by the bad guys. There will be sophisticated attacks launched on a grand scale, quickly and intelligently with little human intervention, that compromise our digital devices and web infrastructure.
  “Cybercriminals will create fully autonomous, AI-based attacks that will operate completely independently, adapt, make decisions on their own and more. Security companies will counter this by developing and deploying AI-based defensive systems. Humans will simply supervise the process.”
  翁德雷·弗尔切克,Avast首席技术官兼客户总经理
  “10到15年内,人工智能的进步会让安全防御和网络犯罪变得快速且复杂,我们将深陷‘机器战’时代。这将是一场人工智能对人工智能的战斗。
  “低成本计算及存储、现成的机器学习算法、人工智能代码和开放式人工智能平台,将促使好人更多地使用人工智能来捍卫安全,但也会让坏人增加对人工智能的利用。几乎无须人工干预,快速、智能且复杂的大规模攻击将会危及我们的数码设备和网络基础设施。
  “网络犯罪分子将基于人工智能制造完全自主的攻击;这些攻击将完全独立运行、自行调节、自主决策等。安全公司将通过开发和部署基于人工智能的防御系统来应对。人类仅需监督该过程。”
  Konstantinos Karagianni, CTO of BT
  “Blockchains are moving from the realm of just fueling cryptocurrencies like Bitcoin to providing smart contracts, identity management, and multiple ways of proving integrity of data. They may also hold the key to defending against IoT attacks.
  “Quantum computing will have possibly the biggest impact within 10 years. Most over-the-wire encrypted transmissions collected over the next decade will be readable, and even private keys will be reversible from public blockchains (for example, you can spend someone else’s Bitcoin). Post-quantum safe crypto will be a must.   “AI will be used to identify hacking flaws and patch them to stay ahead of malicious attackers.”
  康斯坦丁诺斯·卡拉詹尼,英国电信集团首席技术官
  “区块链此前仅为比特币等加密货币提供技术支撑,现正转向其他领域,如提供智能合约、身份管理及多种证明数据完整性的方法。它们也可能是防御物联网攻击的关键。
  “量子计算可能是10年内最具影响力的技术。未来10年,大多数在线加密传输都是可读的,甚至公共区块链中的私钥也是可逆的(譬如,您可以花别人的比特币)。后量子安全加密将势在必行。
  “人工智能将用于主动识别并修补黑客漏洞,使恶意攻击者无法得逞。”
  Carl Herberger, VP of security at Radware2
  “The top challenge for cybersecurity isn’t preventing data breaches, stamping out ransomware, or preventing ever-more-massive DDoS attacks, it is securing our digital privacy. Digital threats have evolved quickly and can wreak havoc on our lives, endangering our personal privacy and the privacy of those around us.
  “To tackle this important issue, we need the national government to take a stance on what our digital privacy is. Is it an immutable human right? If so, there needs to be explicit legislation that goes beyond what is currently in place. It needs to protect each and every citizen and hold those who might put our privacy in jeopardy accountable for their actions. This will be the most important cybersecurity decision in the next year and it will shape the security landscape for years to come.”
  卡爾·赫伯格,Radware安全副总裁
  “网络安全的最大挑战不是防止数据泄露、杜绝勒索软件或提防越来越大规模的分布式拒绝服务攻击,而是要保护我们的数字隐私。数字威胁发展迅速,可能会严重破坏我们的生活,危及我们个人和周围人的隐私。
  “为了解决这一重要问题,我们需要国家政府对我们的数字隐私表明立场。这是永恒不变的人权吗?如果是,则需要制定比目前还要明确的法律。它需要保护每个公民,并让那些可能危害我们隐私的人对其行为负责。这将是明年最重要的网络安全决策,将塑造未来几年的安全格局。”
  Michael Shinn, CEO of Atomicorp3
  “IoT will overtake everything else in connected devices and not only will be the most hacked stuff, it will continue to be the hardest to protect. This will turn cybersecurity on its head because security on all IoT is terrible, and totally opaque to users. It’s take it or leave it. You can’t harden the devices after the fact. You can’t even log into them. You just have to hope they are secure and your perimeter can stop all attacks.
  “Building secure, hardened IoT devices from the start is ultimately the best solution. One new challenge will be that IoT devices will have encrypted connections (or they should!). It will be effectively impossible for any network based device like a firewall to see inside that session. There are some SSL/TLS4 interception methods that can be used, but that requires the devices to trust the interception device. Harden your IoT now.”
  迈克尔·希恩,Atomicorp首席执行官
  “物联网将在连接设备方面超越其他网络,它不仅会受到最多的黑客攻击,还将一如既往地最难以保护。这将完全颠覆人们对网络安全的看法,原因在于所有物联网的安全性都很糟糕,而且对用户完全不透明。对此,要么接受,要么放弃。发生事故后,您将无法加固设备安全。您甚至都无法登录。您只能盼望它们是安全的,并且希望外围设备能阻止所有攻击。   “最佳终极解决方案是从一开始就构建安全、坚固的物联网设备。一项新的挑战是物联网设备将会加密连接(或者应是如此!)。事实上,任何像防火墙之类的联网设备都将无法窥视会话内容。可以使用安全套接字层协议拦截或传输层安全协议拦截的方式,但这要求联网设备信任该拦截装置。即刻强化您的物联网。”
  Eugene Pilyankevich, CTO at Cossack Labs5
  “Many traditional concepts will be hopefully gone. Perimeter security, storage-only encryption, access control based on privilege records, authentication that relies on one strong factor, DMZ6—they will fade out or vanish completely.
  “Many new techniques will arise through machine learning and weak AIs, especially in intrusion detection and making sense of large-scale monitoring and signal analysis. Many new techniques will arise from advancements in cryptography and collective effort to eliminate poor cryptography. Still, we will have snake-oil products and systems.
  “Attackers will still be ahead of the game because security is asymmetric in effort and success criteria between attacker and defender.
  “With proliferation of IoT and a bunch of computers in every device, the damage will get physical. Growing complexity of real-world processes, intertwined with complexity of security protocols protecting them, will lead to many new challenges in practical use cases for security tooling.”
  尤金·皮利安凯维奇,Cossack Labs首席技术官
  “许多传统概念有望消失。外围设备安全性、仅存储加密、基于权限的访问控制、依赖于单个强因素的验证、隔离区——它们将消退或完全消失。
  “通过机器学习和弱人工智能,许多新技术会出现,尤其是在入侵检测以及掌握大规模监测和信号分析方面。加密技术的进步以及消除不良加密的共同努力,将催生许多新技术。尽管如此,我们仍将使用夸大宣传的产品和系统。
  “由于攻击者和防御者在网络安全上的努力和成功标准有所不同,攻击者在角逐中仍将处于领先。
  “由于物联网普及且每套设备内置大量计算机,破坏将十分严重。现实世界中愈加复杂的程序,与保护它们的安全协议的复杂性交织在一起,将给安全工具的实际应用带来诸多新的挑战。”
  Betsy Cooper, Executive Director, Center for Long-Term Cybersecurity, at UC Berkeley
  “In 10-15 years, cybersecurity might be about preventing ‘real’ identity theft. In 2017, we call theft of social security numbers and passwords ‘identity theft’. But what if criminals could steal not just these, but also our fingerprints, our brain waves, and even our genetics? This could happen, as passwords get easier to crack.
  “First, we’ll shift to using biometrics like fingerprints and iris scans to authenticate ourselves online. But once hacked, we can’t change these things, so we’ll have to abandon them.
  “We might switch to new methods of authentication, through brain wave sensors or genetics. But these can be hacked too. And the more information we provide, the closer criminals will get to capture our essential selves.”
  貝齐·库珀,加州大学伯克利分校长期网络安全中心执行主任
  “在10到15年内,网络安全可能会围绕关于防止盗窃‘真实’身份开展。2017年,我们将盗窃社会安全号码和密码称为‘身份盗窃’。但是,如果罪犯不仅可以窃取这些,还可以窃取我们的指纹、脑电波,甚至基因的话,怎么办?这种情况可能发生,因为密码变得更容易被破解。
  “首先,我们将转而使用指纹和虹膜扫描等生物识别技术,进行在线身份验证。然而一旦遭到黑客入侵,我们将无法更改这些内容,就不得不放弃它们。
  “通过脑电波传感器或基因学,我们可能改用新的身份验证方法。但是这些也可能会被黑客入侵。而且,我们提供的信息越多,犯罪分子就越能掌握我们自身的关键信息。”
其他文献
Three men are in the middle of a desert when their car breaks down. For their hike to town, they each decide to take one thing with them.  One man takes a jug of water. The second man takes a sandwich
期刊
【譯者言】 前年上半年,北京外国语大学英语学院教师梁昊博士请我读一遍她翻译的书稿《中西文明对比》3,帮她把一下质量关。她1996年在北外读硕士,后又读博士,我都是她导师,她的请求我不能不答应;更重要的是,我看书中有许多论述西方文化的经典选篇,这正是长期以来我的兴趣所在,于是欣然接受。然而一年过去了,由于手头事情比较多,一直没有抽出时间看她的译稿。2020年秋,北京外国语大学成立不久的北外学院请我为
期刊
You might have heard a lot about ancient towns (like Lijiang Ancient Town, Pingyao Ancient Town, and Huangyao Ancient Town) and ancient cities (like Beijing and Xi’an) in China. Here, we list several
期刊
Presidents’ Day, like most American holidays, is a celebration of shopping. But unlike holidays such as Christmas or Thanksgiving, where the commercial spirit is a corruption of the holiday’s true pur
期刊
“《英语世界》杯”翻译大赛肇始于2010年,由商务印书馆《英语世界》杂志社主办。短短数载,大赛参赛人数屡创新高,目前已经成为国内最有影响的翻译赛事之一。为推动翻译学科进一步发展,促进中外文化交流,我们秉承“给力英语学习,探寻翻译之星”的理念,于2021年继续举办第十二届“《英语世界》杯”翻译大赛,诚邀广大翻译爱好者积极参与,比秀佳译。  第十二届“《英语世界》杯”翻译大赛得到北京师范大学的大力支持
期刊
Stay-at-home consumers and stimulus checks have been a boon1 for online installment financing, digital banks and day trading. 消費者宅在家里,手里握着经济刺激补助金,这对于在线分期付款、数字银行和日内交易来说可谓是一大福音。  In 2015, Nick Molnar wa
期刊
Cyber-attack can happen to any digital user at any time and at any place.  Some might be harmless or might cause just a little damage. But there are a few types of cyber-attacks that have caused signi
期刊
Zhang Xiqing is an outlier2 in Chinese society.  At 33, the designer based in the southern city of Shenzhen is happily unmarried, has no plans to have children with her boyfriend, and left her job at
期刊
Cyber-attacks may sound like something that happens only in Hollywood movies. You picture a team of talented hackers gathered around computer monitors trying to break into a secure bank or government
期刊
One of the dominating astronomical discoveries of the 20th century was that the galaxies of the universe all seem to be moving away from Earth. Doppler redshifts were observed for spiral nebulae aroun
期刊