What to Expect in 3rd Generation Cybersecurity?

What to Expect in 3rd Generation Cybersecurity?

cybersecurity

This post is also available in: heעברית (Hebrew)

China’s first- and second-generation cybersecurity systems relied on blacklists and whitelists to screen out potential threats, but hackers can always find a way to get around such lists, and attackers can also hide their presence. AI and big data-support are ready for a role in the development of the country’s third-generation cybersecurity defense system, evaluates China’s leading cybersecurity company, 360 Enterprise Security Group.

“A cybersecurity system that monitors online behavior will be more efficient. Based on big data and AI behavioral analysis, the third-generation system will be able to identify an attack through intelligence on threats. Behaviors that go against the baseline set up by the system will be reported and warnings will be given,” said Qi Xiangdong, the company chairman. He noted that the baseline can be adjusted to mark out abnormal behaviors that differ from usual ones.

The new defense system, like the previous ones, will mainly serve businesses and institutes rather than individuals. Hence, it will only look for abnormal activity targeting those institutes. “It will not put personal privacy at risk or damage personal information,” Qi stressed, according to en.people.cn.

For example, if a user usually visits a certain company website only once a day, then its baseline will be identified as breached if the website is viewed over 1,000 times a day.