National Academies Press: OpenBook

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop (2019)

Chapter: Appendix B: Additional Discussion Questions from Sponsor

« Previous: Appendix A: Workshop Agenda
Suggested Citation:"Appendix B: Additional Discussion Questions from Sponsor." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×

B

Additional Discussion Questions from Sponsor

Several key questions, listed below, were identified by the sponsor as key to the discussion. They were provided to all workshop participants and discussed during the workshop’s final session.

  1. What is the current progress in the conceptualization, development, and adoption of ML in the cyberattack and cybersecurity processes, such as in components of the cyber kill chain and cybersecurity operations.
  2. What are the key cybersecurity problems that can be solved using ML? What AI and ML techniques are well suited for cybersecurity? What are areas of cybersecurity that ML show great promise for resolving? What are areas of cybersecurity that will prove challenging to address using ML?
  3. What is the biggest “ask” the cybersecurity community could make of the ML community?
  4. What are the key challenges and barriers to ML adoption for cybersecurity by businesses and governments?
  5. What countries or companies are investing in the application of ML to their cybersecurity processes, and what are these company or country partnerships?
  6. How will the proliferation and adoption of ML change the potential consequences (including physical, economic, or psychological impacts) of cyberattacks? Does the answer assume significant qualitative or quantitative improvement in global cyber defenses? If these improvements do not materialize, how would the answer change?
  7. Are there other areas of AI research, beyond ML, that are significant from a cyber threat or cybersecurity perspective?
Suggested Citation:"Appendix B: Additional Discussion Questions from Sponsor." National Academies of Sciences, Engineering, and Medicine. 2019. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25488.
×
Page 75
Next: Appendix C: Planning Committee and Staff Biographies »
Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop Get This Book
×
 Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop
Buy Paperback | $65.00 Buy Ebook | $54.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity.

The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!