Deep Analytics: Technologies for Humanity, AI & Security by Sumit Chakraborty, Suryashis Chakraborty, Kusumita - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

4. SECURITY

Security Analytics

Agents: kids, children, youth, men, women, senior people;

Organization : food security council of global organization, research organization;

Verification mechanism: audit security intelligence.

  • system design policy: verify rationality, fairness, correctness, transparency, accountability, trust and commitment;
  • system performance: verify reliability, consistency, scalability, resiliency, liveness, deadlock freeness, reachability, synchronization, safety (from natural disaster, war, bioterrorism, acts of terrorisms);
  • access control in technology innovation: verify authentication, authorization, correct identification, privacy, audit confidentiality, data integrity and non- repudiation;
  • malicious attacks: verify the risk of false data injection, shilling (push and pull) and fault injection attack;
  • corruption in resource planning and supply chain management; call threat analytics and assess risks of emerging technologies on agriculture, animal husbandries, nanohousing, textile and chemical engineering.
  • what is corrupted or compromised (agents, design schema)?
  • time: what occurred? what is occuring? what will occur? assess probability of occurrence and impact.
  • insights: how and why did it occur? do cause-effect analysis on system performance, exception and alerts.
  • recommend: what is the next best action?
  • predict : what is the best or worst that can happen?

Output: security intelligence

 

Mr. Ronald Thomas is discussing the security of emerging technologies related to food, home, garments and consumer goods. It is essential to verify rationality, fairness and correctness of the design of the systems. It is also crucial to verify system performance in terms of reliability, consistency and safety. The systems should be developed by a set of authorized agents. It is also important to verify the risk of corruption in resource planning and supply chain management and various types of malicious attacks.