Information Technology Reference
In-Depth Information
From a distance, it seems useful to design a computer and software security en-
gine for corporate and government use and also for sophisticated private computer
users with valuable data such as patents and new intellectual property. This en-
gine is probably too expensive to work as a retail product, but access to its features
would be available by license.
The computer security engine would be linked to every national security
agency in friendly countries and also to corporate and private security groups. The
engine would perform real-time monitoring on a global basis for new zero-day
threats as soon as they occur in any time zone. This monitoring would use intelli-
gent agents.
The artificial intelligence (AI) kernel in the computer security engine would
also notify major vendors of firewalls and antivirus packages in order to alert them
to the threat, and it would, of course, send messages to all government security of-
fices as well. The AI would also analyze known facts about the threat and classify
its method of action against any similar threats detected on a global basis.
As responses and defensive measures become available, the AI feature would
analyze their effectiveness. The AI would calculate how many networks and com-
puters had been infected.
As effective countermeasures become available, users of infected computers
and networks would be notified using an uninfected channel such as radio, tele-
phone, or a special shortwave band (which would be needed since internet connec-
tions may be compromised).
Subscribers to this computer security engine would be able to register their own
computers by make, model, operating system, and other factors. When subscribers
turn on their computers, they would receive a start-up screen that informed them of
current threats that might affect their equipment, including zero-day threats from
other time zones. If proven solutions are available, they could be downloaded at
once. These might even have been downloaded as soon as the subscriber's com-
puter powered up.
In case a subscriber's computer or software had already been hacked and was
under hostile control, the AI engine would direct the most effective removal meth-
od to the computer.
Subscribers could also notify the security engine of the credit cards, banks, and
stores at which they are likely to shop. The subscribers would receive real-time
notices of any attacks or data thefts from the major banks and service providers
used by those companies.
Search WWH ::




Custom Search