Page 15 - index
P. 15







An “algorithm adapts to information” instead of “information adapts to algorithm” scenario of
action,

The ability to manage information and analyze them in order to provide an intelligence as a
result,

Reliable monitoring, prevention and incident-response capabilities at all levels of its
operation,


Good analytics skills which should be concentrated on pattern recognition models and
predictive analytics,

A real-time risk management, etc.



How could we move from traditional security software to intelligence-led security
software?

In order to understand and satisfy its requirements, every security software should show a
comprehensive understanding of risk. By definition, risk is the potential of losing something
of value, weighed against the potential to gain something of value. Basically, values can be
gained or lost when taking risk resulting from a given action, activity and/or inaction,
foreseen or unforeseen.

If we talk about intelligence-led security software, we should try to analyze the concept of an
adaptive algorithm. We mentioned there had to be the use of an adaptive algorithm which
would be able to adapt to input information. What does this mean? In traditional
programming, an algorithm is a set of instructions which is supposed to lead the information
through itself.

On the other hand, in intelligence-led software, information should be able to lead an
algorithm. In other words, the algorithm should adapt to information.

Regarding everything mentioned above, we can invoke an “algorithm adapts to information”
instead of “information adapts to algorithm” scenario of action. The next generation security
software would be capable of fulfilling these demands.

Also, what would make this concept an intelligence-led is the ability of a security software to
manage information and analyze them in order to provide an intelligence as a result.
Providing intelligence is crucially important for a good strategy or scenario development
which would assure an appropriate reaction to the risk.

As it is known, every competitive intelligence-led system should be capable of providing
reliable monitoring, prevention and incident-response capabilities at all levels of its
operation. The similar demands could be applied in case of an intelligence-led software.
Such a software should offer some sort of an intelligent self-defense.

In addition, an intelligence-led security software is supposed to have good analytics skills
which should be focused on pattern recognition models and predictive analytics. This
requirement is strategically important for every smart security model.


15 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   10   11   12   13   14   15   16   17   18   19   20