CIOApplications
static-image
  • Home
  • Applications
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Collaboration
      • Custom Software Development
      • CRM
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Operations Management
      • IT Service Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Mobile Application
      • Order Management
      • Parking Management
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Testing
      • Task Management
      • Unified Communications
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Construction
      • Contact Center
      • Education
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • Digital Transformation
      • Graphics
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Chatbot
      • Cloud
      • Collaboration
      • Contact Center
      • Esri
      • Human Resource
      • InsurTech
      • IT Service Management
      • Machine Learning
      • Manufacturing
      • Master Data Management
      • Procurement Tech
      • Robotic Process Automation
      • Salesforce
      • ServiceNow
      • Software Testing
  • Contact Center
  • Collaboration
  • Chatbot
  • Esri
  • Human Resource
  • InsurTech
  • Machine Learning
Specials
  • Specials

  • Business Continuity
  • Chatbot
  • Cloud
  • Collaboration
  • Contact Center
  • Esri
  • Human Resource
  • InsurTech
  • IT Service Management
  • Machine Learning
  • Manufacturing
  • Master Data Management
  • Procurement Tech
  • Robotic Process Automation
  • Salesforce
  • ServiceNow
  • Software Testing
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Security
Editor's Pick (1 - 4 of 8)
left
Leadership Framework for Building Elite Teams

Leadership Framework for Building Elite Teams
Douglas Duncan, CIO, Columbia Insurance Group

Four Reasons Why You Need a Third-Party Security Assessment

Four Reasons Why You Need a Third-Party Security Assessment
Jeff Cann, CIO, Encore Electric, Inc.

Information Security Against Cyber Attacks

Information Security Against Cyber Attacks
Brad Peterson, EVP & CIO, Nasdaq

 The Technology Project Life Cycle: Lessons Learned

The Technology Project Life Cycle: Lessons Learned
Tony Laska, SVP-CIO, BrickStreet Insurance

Implementing a Cybersecurity Program - The Journey of True Partnership with IT

Implementing a Cybersecurity Program - The Journey of True...
Maurice Edwards, Senior Vice-President Enterprise Risk, Mattress Firm

Information Governance = Data Governance + Disclosure

Information Governance = Data Governance + Disclosure
Tera Ladner, Director, Information Governance, Aflac

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!
Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Do You Suffer from Cloud Strategy Deficiency (CSD)?

Do You Suffer from Cloud Strategy Deficiency (CSD)?
Hiba S. Sharief, Vice President, IT, Oportun

right

Thank you for Subscribing to CIO Applications Weekly Brief

Leveraging AI for Cybersecurity in Universities

By CIO Applications| Monday, April 22, 2019
Tweet

Leveraging AI for Cybersecurity in UniversitiesBad actors gather in about $1.5 trillion a year, according to the University of Surrey. Recent, Marriott breach caused millions of dollar worth data loss. Facebook and Cambridge Analytica episode forced companies to evaluate data breaches. These incidents validate that hackers engagement in data breaches consciously, with the intent to profit from the infringement. Implications of these events have resulted in making security an important commodity.

Colleges, universities, and research institutions have increased their investment in cybersecurity. The cost of security has increased due to advancements in AI tools which has made attacks more lethal, as result solutions have corresponded to these actions. Institutions can fight data breach by adopting the same capabilities that hackers use.

However, the novel way to approach cybercrime is by fixing vulnerabilities and analyzing user behavior to develop ideal security settings. Training ML algorithms can do this to the datasets that have current and potential bugs.

Security Companies: Bridg-it, CampusGuard, ETHIX360

The University of California, San Diego, newly created Halıcıoğlu Data Science Institute which aims at exploring the scientific foundations of data science. Experts at the institution suggest that organizations must use people and computing power in concert. Since companies know that computers can detect suspicious data, but only humans have the agency to act on it, which leaves with one lingering question—what should colleges and companies do to fight the cybercrime?

The answer lies in training the staff and students in the domain of threats and solutions. Education of the tools and patterns of cybercrime is essential to help verify what is fake and what is real.

But colleges can take a head start by implementing cybersecurity principles by tightening their environments, resources, storage, networking, and monitoring. This will help prevent resource leakage. Additionally, institutions should make sure that attackers don’t have greater capabilities than legitimate users. Also, universities should use a secure runtime monitor. This will help when systems get compromised. The runtime monitor will ensure that the attacker can’t reach the data.

Machine learning systems can be leveraged to perform tasks such as evaluating user-application interactions to set session durations accordingly, thus limiting the window of opportunity for cybercriminals.

Check this out: Top Security Companies

Weekly Brief

loading
ON THE DECK

Top Vendors

Field Service 2021

Top Vendors

Previous Next
Tweets by CIOApplications

Read Also

Four Benefits of Cloud-Based Business Budgeting Software

Four Benefits of Cloud-Based Business Budgeting Software

Four Major Benefits of Green Technology in the Construction Industry

Four Major Benefits of Green Technology in the Construction Industry

Things You Should Know About Insurtech

Things You Should Know About Insurtech

AiFi Announces Partnership with Wundermart to Launch Autonomous Convenience Stores

AiFi Announces Partnership with Wundermart to Launch Autonomous Convenience Stores

Abalta's WebLink Receives Support from Genius Maps

Abalta's WebLink Receives Support from Genius Maps

iTradeNetwork Implements Walmart-Compliant ASN on its Platform

iTradeNetwork Implements Walmart-Compliant ASN on its Platform

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplications.com/news/leveraging-ai-for-cybersecurity-in-universities-nid-3854.html