Tuesday 21 May 2019

what is hacking ? and who are hackers ?

                 What is hacking ? and who are hackers ? 


Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.

Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.


Who are hackers ? 

The basic definition of a hacker is someone who uses a computer system to gain unauthorized access to another system for data or who makes another system unavailable. These hackers will use their skills for a specific goal, such as stealing money, gaining fame by bringing down a computer system, or making a network unavailable -- even sometimes destroying them. However, there are three different types of hackers, each with a particular goal, and not all are the bad guys.
Types of Hackers
The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat hacker. Each type of hacker hacks for a different reason, a cause, or both. All have the required skills needed to accomplish their mission. At one end of the spectrum is the black hat, who hacks for evil and malicious intent and without permission. On the other end of the spectrum is the white hat, who hacks against a black hat in order to protect computer and network access and has the company's permission to do so. In the middle is the grey hat, who hacks not for evil and not for good; they are neutral in their cause and usually try to sell their skills for monetary gain, like a mercenary.

Black Hat Hacker - Evil Doer

The black hat hacker is the one who hacks for malicious intent - he is the bad guy. This type of hacker uses his or her skills to steal money or data, knock a computer system offline, or even destroy them. Some of these hackers love to see their work and name in the news, so they would try to target big name organizations and companies. For instance, they might change the front page of a company website.
Black hats also try to break into computer systems to steal credit card information and possibly steal valuable information to sell on the black market. They may even lock out the computer and network system from the owners and then hold them for ransom.
The black hat works outside of the law. This is the hacker that we as a society are most familiar with. Some black hats have cost companies hundreds of millions of dollars in damages for credit card and social security information theft. They can work alone, in that case known as a lone wolf, or with a team. They work slowly and methodically, since the black hat knows it takes patience to compromise a computer or a network system in order to a hit a big payoff and not be caught.
White hat hackers
 Also known as ethical hackers, strive to operate in the public's best interest, rather than to create turmoil. Many white hat hackers work doing penetration testing, hired to attempt to break into the company's networks to find and report on security vulnerabilities. The security firms then help their customers mitigate security issues before criminal hackers can exploit them.
Gray hat hackers
They fall somewhere between white hat hackers and black hat hackers. While their motives may be similar to those of white hat hackers, gray hats are more likely than white hat hackers to access systems without authorization; at the same time, they are more likely than black hat hackers to avoid doing unnecessary damage to the systems they hack. Although they aren't typically -- or only -- motivated by money, gray hat hackers may offer to fix vulnerabilities they have discovered through their own, unauthorized, activities rather than using their knowledge to exploit vulnerabilities for illegal profit.

Personally, if I had a company I would not employ an ex black hat hacker or a Gray hat hacker because they can get to know a lot about my systems and probably be damaging to me if they get unemployed. 

I would honestly employ a white hat hacker as he wouldn't hack my systems as the nature of his work makes him unable to do so. 






Resources : 
1- https://www.webroot.com/gb/en/resources/tips-articles/computer-security-threats-hackers
2-https://economictimes.indiatimes.com/definition/hacking
3- https://www.malwarebytes.com/hacker/

how to set up a firewall ?

                          How to set up a firewall ?


Main functions of a firewall
Personal firewall software prevents connections amid your system and the network, except for the programs, which the firewall software consider trustworthy. The main functions of a firewall include:
  • It filters information coming via an internet connection to your system
  • It stops the incoming packet if the filters flag it
  • Firewalls also put forward proxy service
  • Some firewalls apply a new method in which they do not examine the contents of every packet, instead they compare some of the key parts of a packet
  • It also monitors information that travels from within the firewall to outside to look for specific characteristics and if a reasonable match is found after comparison, then it is allowed to pass through.
Setting up firewall for home system
If you surf the net all the time, then you should know the way to set up firewall for home use. All you have to do is:
  • If you use a router, then first of all you will have to install a firewall in your system
  • If you use Mac, then you will have to open “System Preferences” and then select “Security” under “Personal” tab.
  • Then go to Firewall pane and click on “Start” button
  • For Windows, you will have to go to the Control Panel and then select the “Security Center” which you will find under the section of “Manage Security Settings…,”
  • Then Select Windows Firewall and then turn it on
Choosing the right firewall for work
While setting up firewall for work, you will have to decide whether you will go with hardware firewall or software firewall. You can set up a hardware firewall, if you want added security for your work. For work or corporate use, a host-based firewall can be more useful, as it prevents the host from being infected and also stops other infected hosts to spread a malware.
Configuring firewall for work
A firewall for work has to be configured for each machine depending on the operating system. Apart from Mac and Windows, you can also setup firewall with a Linux box, which can be affordable. For this you have to:
  • Make sure that your system fulfills minimum hardware requirements
  • Install Linux and then turn off the services that are not necessary
  • You will need a way for getting your firewall connected to your ISP other than  IP filtering tools
  • Those, who use a cable modem will have to install Dynamic Host Control Protocol client for handling IP address assignments
Instead of manually setting up a Linux firewall, you can use a firewall configuration tool for this purpose.


I would personally advice anyone who didn’t set up a firewall on his device to install it as it will protect his device from a lot of harmful and damaging effect that can be very crucial for you , and you don’t want this to happen to you and losing very important information .

 Resources:
1-https://www.securitymetrics.com/blog/how-configure-firewall-5-steps
2-https://blink.ucsd.edu/technology/security/user-guides/firewall/windows7.html
3-http://help.comodo.com/topic-72-1-522-6343-.html
4-https://blink.ucsd.edu/technology/security/user-guides/firewall/windows7.html
5-https://computer.howstuffworks.com/firewall2.htm

what is firewall? and how does it work ?

                  What is firewall? and how does it work ?



What Is a Firewall?
A firewall is the first line of defense for your network. The basic purpose of a firewall is to keep uninvited guests from browsing your network. A firewall can be a hardware device or a software application that is usually positioned at the perimeter of the network to act as the gatekeeper for all incoming and outgoing traffic.
Image result for firewallA firewall allows you to establish certain rules to identify the traffic that should be allowed in or out of your private network. Depending on the type of firewall that is implemented, you can restrict access to only certain IP addresses and domain names or you can block certain types of traffic by blocking the TCP/IP ports they use.




How Does a Firewall Work?
There are basically four mechanisms used by firewalls to restrict traffic. One device or application may use more than one of these to provide in-depth protection. The four mechanisms are packet filtering, circuit-level gateway, proxy server, and application gateway.

Packet Filtering
A packet filter intercepts all traffic to and from the network and evaluates it against the rules you provide. Typically the packet filter can assess the source IP address, source port, destination IP address, and destination port. It is these criteria that you can filter to allow or disallow traffic from certain IP addresses or on certain ports.

Circuit-Level Gateway
A circuit-level gateway blocks all incoming traffic to any host but itself. Internally, the client machines run software to allow them to establish a connection with the circuit-level gateway machine. To the outside world, it appears that all communication from your internal network is originating from the circuit-level gateway.

Proxy Server
A proxy server is generally put in place to boost the performance of the network, but it can act as a sort of firewall as well. Proxy servers hide your internal addresses so that all communications appear to originate from the proxy server itself. A proxy server caches pages that have been requested. If User A goes to Yahoo.com, the proxy server sends the request to Yahoo.com and retrieves the webpage. If User B then connects to Yahoo.com, the proxy server just sends the information it already retrieved for User A so it is returned much faster than having to get it from Yahoo.com again. You can configure a proxy server to block access to certain websites and filter certain port traffic to protect your internal network.

Application Gateway
An application gateway is essentially another sort of proxy server. The internal client first establishes a connection with the application gateway. The application gateway determines if the connection should be allowed or not and then establishes a connection with the destination computer. All communications go through two connections — client to application gateway and application gateway to the destination. The application gateway monitors all traffic against its rules before deciding whether to forward it. As with the other proxy server types, the application gateway is the only address seen by the outside world, so the internal network is protected.


Resources:
1-https://www.digitalocean.com/community/tutorials/what-is-a-firewall-and-how-does-it-work
2-https://www.comodo.com/resources/home/how-firewalls-work.php
3-https://www.bullguard.com/bullguard-security-center/pc-security/computer-security-resources/how-does-a-firewall-work.aspx
4-https://www.alienvault.com/blogs/security-essentials/explain-how-firewalls-work-to-me

What is the difference between cyber security and information security?

           What is the difference between cyber security and information security?



Information Security

Information security (or “InfoSec”) is another way of saying “data security.” So if you are an information security specialist, your concern is for the confidentiality, integrity, and availability of your data. (This is often referred to as the “CIA.”) Most modern business data resides electronically on servers, desktops, laptops, or somewhere on the internet—but a decade ago, before all confidential information migrated online, it was sitting in a filing cabinet. And some confidential information still is! InfoSec is concerned with making sure data in any form is kept secure and is a bit broader than cyber-security. So, someone could likely be an information security expert without being a cyber-security expert.

Cyber-security

Cyber-security is all about protecting data that is found in electronic form. Part of that is identifying what the critical data is, where it resides, and the technology you have to implement in order to protect it.



Overlap Between Information Security & Cyber-security

There is a physical security component to both cyber-security and information security.
If you have a warehouse full of confidential paper documents, you clearly need some physical security in place to prevent anyone from rummaging through the information. And as more data becomes digital, the process to protect that data requires more advanced IT security tools. So, while you can’t put a physical padlock on a desktop computer, you can put a padlock on your server room door. In other words, if your data is stored physically or digitally, you need to be sure you have all the right physical access controls in place to prevent unauthorised individuals from gaining access.


They both take the value of the data into consideration.
If you’re in information security, your main concern is protecting your company's data from unauthorised access of any sort—and if you’re in cyber-security, your main concern is protecting your company’s data from unauthorised electronic access. But in both scenarios, the value of the data is of utmost importance. Both individuals need to know what data is most critical to the organisation so they can focus on placing the right controls on that data. In some scenarios, an information security professional would help a cyber-security professional prioritise data protection—and then the cyber-security professional would determine the best course of action for the data protection. But with the changing security landscape over the past decade, things aren’t always this black and white.


Resources:
1-https://www.valpo.edu/onlinecybersecurity/2019/01/16/cyber-security-vs-information-security-is-there-a-difference/
2-https://www.computersciencedegreehub.com/faq/what-is-the-difference-between-cyber-security-and-information-security/
3-https://www.ifsecglobal.com/cyber-security/understanding-the-difference-between-it-security-and-cybersecurity/



data protection law

                            Data protection law 


Data exists everywhere in 2015. It has evolved from a necessary procedural function into a fundamental component of modern society. Such progress requires adequate legislative development in order to safeguard democratic rights. Moreover, this transformative importance now places an expectation of responsibility on data controllers, data processors and data subjects who must respect the values inherent in data protection law. Such law is more than a mere safeguard against potential infringement. Rather, it serves to balance privacy and data use without sacrificing one for the benefit of the other.

The right to privacy was first outlined in European law in Article 8 of the 1950 European Convention on Human Rights (the Convention); 'Right to respect for private and family life'. Although not containing any explicit mention of data protection, privacy law deriving from the Convention has developed to include the right to the protection of personal data. The Charter of Fundamental Rights of the European Union (the Charter) which was proclaimed in 2000 went further than the Convention, echoing the earlier proclamation concerning privacy in Article 7 and making specific reference to personal data via Article 8:
1. Everyone has the right to the protection of personal data concerning him or her.
2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
3. Compliance with these rules shall be subject to control by an independent authority.

In Ireland, the right to privacy is widely viewed and understood as a fundamental human right, and is recognised by Bunreacht na hÉireann, the Charter and the Convention. However, the right is not absolute which thus permits an element of flexibility to be afforded when balancing priorities. Moreover, it could be argued that if privacy is a concept with no common core it may be difficult to find a definitive right to privacy across changeable social arrangements. This would make the right to data protection quite different to classical civil rights such as life or freedom, which are regarded as beyond interpretation or discussion. 


Nevertheless, in the present age the relative importance and influence of information privacy to cultural utility cannot be understated. As of now, almost 20 years after its introduction, the governing EU legislation on data protection remains Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data (the Directive). The implementation of the Directive in 1995 was enabled to harmonize standards pertaining to data protection across member states; an objective which will be replicated with the enactment of the General Data Protection Regulation (the Regulation) which is currently being finalised.


                            




What are different programs of cyber security ?

       What are different programs of cyber security ?


Malware
Malware has been around for a long time, and continues to plague computers to this day. Malware is catch-all word for any software designed to damage a computer or computer system. The first widely spread malware, known as the Melissa Virus, was unleased in 1999. Eighteen years later, malware remains a dangerous weapon, used by cyber criminals to harvest information, commit fraud, or just cause mayhem.

Cyber security strategies for malware
For both homes and businesses, a good anti-malware software is essential. Anti-malware programs can both find and remove malware that has been installed on a computer, and prevent malware from installing itself in the first place. Also essential is instructing users to practice common sense when using the internet: never open unexpected email or chat attachments, and be careful when clicking links on the internet if you can't be certain where they'll lead.

DoS (Denial of Service) attacks
One of the simplest forms of cyber attack, DoS attacks shut down a target's servers, making it impossible to access their websites or use their online services. This is most commonly done by flooding a target's servers with traffic until they overload and crash. One of the most common forms DoS attack involves getting large numbers of attackers to flood their target's servers at once, making it almost impossible to block the incoming traffic.

Image result for cyber security

Strategies for DoS attacks

The simplest method for thwarting DoS attacks is having extra bandwidth. If you fear your business might be targeted for DoS attacks, simply having enough server space to handle the increased traffic can render the attacks moot. There are also third-party services who can help your company stay online during a DoS attack

Phishing
In a phishing attack, a cyber criminal attempts to extract personal information out of you by tricking you into giving it to them. Bolder scam artists might attempt to acquire a victim's social security number or bank account information. However, many phishing scams involve tricking a victim into giving away their password for a single website or app. A recent phishing scam used Google Docs to trick users into entering their Google login information.

Strategies for Phishing attacks
Phishing attacks are particularly worrisome because they involve tricking users through the appearance of legitimacy; the Google Docs scam spread by tricking users into opening a shared document sent to them by someone they knew and submitting their login info. Their attackers could then steal that information and send the document to everyone on the victim's contact list, causing the scam to spread rapidly.



Resources:
1-https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php
2-https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-to-know.html
3- 

Monday 20 May 2019

what is encryption ? and how does it work ?


                              What is encryption? And how does it work?




Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. The message contained in an encrypted message is referred to as plaintext. In its encrypted, unreadable form it is referred to as ciphertext.
Basic forms of encryption may be as simple as switching letters. As cryptography advanced, cryptographers added more steps, and decryption became more difficult. Wheels and gears would be combined to create complex encryption systems. Computer algorithms have now replaced mechanical encryption.


How does it work?

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key. There are many types of algorithms, which all involve different ways of scrambling and then decrypting information.
When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).
The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.




Resources:
1-https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
2-https://www.androidauthority.com/encryption-gary-explains-712802/

why is it important ?

                                                      Why is it important ?


In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.
There are two broad categories of cyber-crime, breaches in data security and sabotage. Data security breaches refers to the theft of personal data, intellectual property or trade secrets, for example, whereas sabotage usually culminates in service attacks. These attacks flood web services with bogus messages, as well as more conventional efforts to disable systems and infrastructure.

Commercial losses, public relations issues, disruption of operations and the possibility of extortion aside, cyber-attacks may also impose companies to regulatory action, negligence claims, the inability to meet contractual obligations and a damaging loss of trust amongst customers and suppliers.
Cyber-crime is unlikely to slow down, despite government efforts and input from specialists. Its growth is being driven by the expanding number of services available online, and the increasing evolution of online criminals who are engaged in a continuous game with security experts.
With constant technical innovation, new dangers are constantly coming to the surface. For example, the migration of data to third-party cloud providers has created an epicentre of data and therefore, more opportunities to misappropriate critical information from a single target. Similarly, mobile phones are now targets, expanding the opportunities to penetrate security measures.
M2M (machine-to-machine) is used globally. This development of the Internet of Things, which enables communication between machines, is said to be responsible for a boost in information misuse. With much of the worlds controlling services and critical infrastructure already depending on M2M, protecting the network that controls and carries these services is imperative, especially since decision marketing is often done without human involvement.
Cyber security should be thorough and seamless, regardless or business size or organisational standing. Computer networks will forever be the target of criminals, and it can be argued that the danger of cyber-security breaches will only increase in the future as networks continue to expand. Having the right level of preparation and specialist assistance is vital to minimise and control damage, and recover from a cyber breach and its consequences.




Resources: 

2- https://online.maryville.edu › Blog
4- https://investingnews.com/daily/tech.../cybersecurity.../why-is-cybersecurity-important...





how does cybersecurity work ?


                                 How does cybersecurity work to protect us ? 



For a long time many people thought that passwords were dead, but as it turns out, no one so far has come up with something better. Therefore, passwords are still your first line of defense in the protection of your data. Unfortunately, many people are still using weak passwords and in most cases reusing them while others continue using the default passwords they were provided with. According to a 2016 report by Verizon, weak, stolen or default passwords help cybercriminals to steal private data and use it for their own benefits, so in this post i will show you some ways that cybersecurity is protecting you in : 


1-Securing your password
Cyber-criminals have tools that can crack weak passwords. What’s more, when they manage to access your email account, they can use it to reset passwords in your other online accounts. Therefore, if you use a single password for all your accounts, then you will be making things easier for them.
2-Backing up your data
One of the most important data protection tips is data backup. This involves creating a copy of your data so that if your device is stolen, lost or compromised; you won’t lose important information. Therefore, you should create a backup on an external hard drive.
3-Securing your wireless network at home or business 
Both small business owners and individuals should secure their wireless networks with passwords. Strong passwords prevent unauthorised individuals from hijacking wireless networks. If you have a Wi-Fi network at your workplace, ensure that it is encrypted, secure, and hidden. To secure and hide your Wi-Fi network, set up a router or wireless access point, so it doesn’t broadcast your SSID. 


Resources:
1-https://www.floridatechonline.com/blog/information-technology/cybersecurity-analyst-career-guide/
2-https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html

what is cyber security ?

                                 what is cyber security ?



Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.

Related imageCyber security has never been simple. And because attacks evolve every day as attackers become more inventive, it is critical to properly define cyber security and identify what constitutes good cyber security.
Cyber security also refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorised access. Cyber security may also be referred to as information technology security.

In a computing context, security comprises cyber security and physical security -- both are used by enterprises to protect against unauthorised access to data centres and other computerised systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cyber security.





Resources : 
1-https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-t...

2- www.ibm.com/Security/Solutions‎

Tuesday 14 May 2019

how can AI effect people's life's ?

                                    How can AI effect people's life's ?


In many ways. AI may sound like something from the other dimension, or at list from a sci-fi book. But it is much closer than we might think. We already use various types of AI in our everyday life, maybe without even noticing it.
Advertising
Finally, artificial intelligence is going to take targeted/personalized advertising to a whole other level. If you think the Facebook Cambridge Analytica scandal was bad, then you have no idea what's in store in the next decade.
Advertisers are already able to predict what types of ads emotionally impact your purchasing behavior. As time goes on, ads are going to continue to become more tailored to the individual. Imagine Amazon's Alexa slipping sponsored messages into a natural conversation or personalized augmented reality billboard ads that know you by name (think Tom Cruise in Minority Report).
Criminal Justice
The next industry disrupted by artificial intelligence is the criminal justice system. Advancements in facial recognition are making the fingerprint obsolete. Tech startups are using AI to automate legal work. Meanwhile, some courts are already using AI to sentence criminals and determine parole eligibility.
Virtual personal
assistants like Siri, Google Now and Cortana are all AIs. They collect information during your requests and that data to better recognize your speech and give you results that are a better fit to your preferences.
video games
One of instances of using AI are video games. AI has been there since the very first ones, actually. The complexity and effectiveness has increased over time, though. Characters learn your behaviours, respond to stimuli and react in unpredictable ways.
Smart cars
Smart cars like Google’s self-driving car and Tesla’s “autopilot” use AI as well. Car’s AI “learns” to look at the road and make decisions based on what it sees.
Marketing
Target and Amazon use AI to make purchase predictions. This can be used in a wide variety of ways, whether it’s sending you coupons, offering you discounts, targeting advertisements, or stocking warehouses that are close to your home with products that you’re likely to buy.
Chabot’s
Many websites use chatbots to talk to customers. Some of them are actually able to extract knowledge from the website and present it to customers when they ask for it.




Resources : 
1- https://robohub.org/the-impact-of-ai-on-work-implications-for-individuals-communities-and-societies/
2- https://www.cnbc.com/2018/01/05/how-artificial-intelligence-will-affect-your-life-and-work-in-2018.html
3- https://www.pewinternet.org/2018/12/10/artificial-intelligence-and-the-future-of-humans/

can AI be dangerous ?

                                                             Can AI be dangerous ?


Most researchers agree that a super intelligent AI is unlikely to exhibit human emotions like love or hate, and that there is no reason to expect AI to become intentionally benevolent or malevolent. Instead, when considering how AI might become a risk, experts think two scenarios most likely:

1-The AI is programmed to do something devastating: Autonomous weapons are artificial intelligence systems that are programmed to kill. In the hands of the wrong person, these weapons could easily cause mass casualties. Moreover, an AI arms race could inadvertently lead to an AI war that also results in mass casualties. To avoid being thwarted by the enemy, these weapons would be designed to be extremely difficult to simply “turn off,” so humans could plausibly lose control of such a situation. This risk is one that’s present even with narrow AI, but grows as levels of AI intelligence and autonomy increase.

2- The AI is programmed to do something beneficial, but it develops a destructive method for achieving its goal: This can happen whenever we fail to fully align the AI’s goals with ours, which is strikingly difficult. If you ask an obedient intelligent car to take you to the airport as fast as possible, it might get you there chased by helicopters and covered in vomit, doing not what you wanted but literally what you asked for. If a super intelligent system is tasked with a ambitious geoengineering project, it might wreak havoc with our ecosystem as a side effect, and view human attempts to stop it as a threat to be met.

I would honestly say that the up sides of Ai are more than the negative sides ,
The positive parts are developing and the negative parts can be avoided by the good using of it .



Resources : 
1- https://www.nbcnews.com/think/opinion/ai-dangerous-why-our-fears-killer-computers-or-sentient-westworld-ncna943111
2- https://www.technologyreview.com/s/612689/never-mind-killer-robotshere-are-six-real-ai-dangers-to-watch-out-for-in-2019/

AI in Cyber Security

Ai in cyber security where do we stand today with artificial intelligence in cyber security? First of all, i will stop using the term ...