Science topic

Cyber Defense - Science topic

Explore the latest questions and answers in Cyber Defense, and find Cyber Defense experts.
Questions related to Cyber Defense
  • asked a question related to Cyber Defense
Question
10 answers
Could the use of generative artificial intelligence technology to detect cybercrime attacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
How can systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases be improved through the use of generative artificial intelligence technology?
In a situation where companies, enterprises, financial and public institutions have a built in cybercrime risk management system, including email anti-spam applications, anti-virus systems, complex login tools, backap systems for data contained on hard drives, firewalls, cyber threat early warning systems, etc., then most cybercrime attacks targeting these business entities prove to be ineffective, and those that are effective cause very limited problems, financial losses, etc. However, there are still many business entities, especially companies and SMEs, that do not have complex, high-tech, integrated systems built to manage the risk of cybercrime and/or loss of sensitive data stored in databases. In recent years, one of the most serious cybercrime problems causing serious financial losses in some companies, enterprises, public institutions include cyberattacks used by cybercriminals with ransomware-type viruses. A successful attack carried out using ransomware viruses results in infecting a computer, blocking users, company employees from accessing the company's internal systems, stealing or blocking access to data collected in the company's databases, information stored on hard drives, etc., with a simultaneous demand to pay a ransom to remove the imposed blockades. In Poland, of the companies attacked with ransomware viruses, as many as 77 percent agree to pay the ransom. So security systems are still too poorly organized in many companies and institutions. In many business entities, systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases are still not professionally built. Cybercrime risk management in many companies and enterprises apparently works poorly or not at all. Since generative artificial intelligence technology is being applied in many areas of cyber-security, so the question arises, could the application of this technology to detect cyber-crime attacks carried out with ransomware-type viruses significantly increase the level of cyber-security in many companies, enterprises, financial and public institutions?
I am conducting research in the problems of analyzing cybercriminal attacks conducted using ransomware viruses and in improving cyber security systems. I have included the conclusions of my research in the following articles:
Analysis of the security of information systems protection in the con-text of the global cyberatomy ransomware conducted on June 2, 2017
Development of malware ransomware as a new dimension of cybercrime taking control of IT enterprise and banking systems
Determinants of the development of cyber-attacks on IT systems of companies and individual clients in financial institutions
The Impact of the COVID-19 Pandemic on the Growing Importance of Cybersecurity of Data Transfer on the Internet
Cybersecurity of Business Intelligence Analytics Based on the Processing of Large Sets of Information with the Use of Sentiment Analysis and Big Data
THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING
I invite you to get acquainted with the issues described in the above-mentioned publications and to scientific cooperation in these issues.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can cybercrime risk management systems and/or loss of sensitive data archived in internal databases be improved through the application of generative artificial intelligence technology?
Could the application of generative artificial intelligence technology to detect cyberattacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
Can generative artificial intelligence technology help detect cybercrime attacks carried out using ransomware viruses?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Relevant answer
Answer
Generative Artificial Intelligence is a new field for me, but I have already formed an opinion that is based on reading the discussion thread question and the six responses. In my view, the "bug" in GAI is rooted, first, in the way GAI works like a "motion detector," by which I mean that its premise is that normal behavior is systematic or can be systematized. The assumption seems to be that everything should be operating like robots and anybody who steps out of line is held to be suspected of malfeasance. Second, the attackers have sophisticated means by which to mimic the normalized and systematized behavior perfectly and thereby conduct a peaceful invasion, undetected. This impression is admittedly skimming the surface of the discussion thread question; however, it just simplifies the gist of the previous answers to the discussion question.
Prior to this GAI issue in the context of detecting cybercrime attacks, I have typically encountered Generative Artificial Intelligence as a big problem in the college classroom. Students have begun to plagiarize by using prefabricated compositions and term papers available on the Internet. College instructors are strategizing to turn the tide by brain-storming and determining ways to train themselves and their students to use GAI skillfully and honestly.
The concept of compatibility may hold one of the keys to de-demonizing Generative Artificial Intelligence. Perhaps GAI will be more adaptable and useful in some contexts than in others. Fortunately, my direct experiences as a recipient of the benefits of GAI are very positive. For one thing, GAI saves a great deal of time by weeding out the spam in my email accounts. However, as the above answers indicate, there is no 100% guarantee that cybercriminals are not going to devise new ways to trick email recipients into falling into a skillfully camouflaged trap that will worsen exponentially.
  • asked a question related to Cyber Defense
Question
2 answers
Hello Researchers and all,
Are you interested in Digital Twin, Cyber Attack and Dynamic Bayesian Network. Do you want to know what can happen to a digital twin based Industrial organization if a Malware and DDoS attack occur? What could be its impact on dynamic situation? If your answer is yes, Here I am sharing with you one of my paper link named, " Analyzing the impact of Cyber Attack on the performance of Digital Twin Based Industrial Organizations" which is got published in Journal of Industrial Information and Integration (Elsevier, Q1, IF = 15.7). You will get a good idea about:
  • Digital Twin,
  • Cyber attack propagation,
  • Markov chain and
  • Dynamic Bayesian Network
Not only this, We also discussed different prevention mechanism and resilience mechanism to keep your digital twin mostly functional under Malware and DDoS Attack. If you want to work further on this topic with different cyber attack and prevention mechanism, you will get an idea from this paper how to do this.
Here is the link of the paper:
From this link, you will get a 50 days' free access to the article. Anyone clicking on this link before August 03, 2024 will be taken directly to the final version of this fantastic article on ScienceDirect, which you are welcome to read or download. No sign up, registration or fees are required.
You are welcome to read, download and cite this article and flourish your research skill on cyber attack, Digital twin and Dynamic Bayesian Network.
Relevant answer
Answer
Please Check my last publication about it:
  • asked a question related to Cyber Defense
Question
11 answers
Please provide information which area will be good for doing Ph.D research in cyber security. Thanks
Relevant answer
Answer
As machine learning technology and generative artificial intelligence are increasingly being used by cyber criminals to improve cybercrime techniques, create new more effective types of viruses, malware to take control of smartphones, laptops, computers, etc. individuals, companies, enterprises, financial and/or public institutions targeted by cybercrime attacks then a good topic for a doctoral dissertation in the field of cyber security is to explore the current and potential possibilities of applying the now rapidly developing technology of machine learning, deep learning using multi-layer artificial neural networks and generative artificial intelligence to detect cybercrime attacks, situations of attempts to infect IT equipment, smartphones, etc. with malware, ransomware viruses, phishing techniques used, fake emails sent out by cyber criminals containing computer viruses created using artificial intelligence technology.
Perhaps in formulating a good, interesting, up-to-date, future-oriented topic for a dissertation, it may also help to read my article, in which I described the key issues of opportunities and threats to the development of artificial intelligence technology:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
I invite you to join me in scientific cooperation on this issue,
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
3 answers
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which previously employees of these entities enter into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
Despite the training and updating of internal rules and regulations in many companies and enterprises regarding the proper use of intelligent chatbots, i.e., for example, the ChatGPT made available online by OpenAI and other similar intelligent applications that more technology companies are making available on the Internet, there are still situations where reckless employees enter sensitive data of the companies and enterprises where they are employed into these online tools. In such a situation, there is a high risk that the data and information entered into ChatGPT, Copilot or any other such chatbot may subsequently appear in a reply, an edited report, essay, article, etc. by this application on the smartphone, laptop, computer, etc. of another user of the said chatbot. In this way, another Internet user may accidentally or through a deliberate action of searching for specific data come into possession of particularly important, key, sensitive data for a business entity, public institution or financial institution, which may concern, for example, confidential strategic plans, i.e., information of great value to competitors or intelligence organizations of other countries. This kind of situation has already happened and occurred in some companies characterized by highly recognizable brands in specific markets for the sale of products or services. Such situations clearly indicate that it is necessary to improve internal procedures for data and information protection, improve issues of efficiency of data protection systems, early warning systems informing about the growing risk of loss of key company data, and improve systems for managing the risk of potential leakage of sensitive data and possible cybercriminal attack on internal company information systems. In addition, in parallel to improving the aforementioned systems that ensure a certain level of data and information security, internal regulations should be updated on an ongoing basis according to the scale of the risk, the development of new technologies and their implementation in the business entity, with regard to the issue of correct use by employees of chatbots available on the Internet. In parallel, training should be conducted, during which employees learn about both new opportunities and risks arising from the use of new applications and tools based on generative artificial intelligence technology made available on the Internet. Another solution to this problem may be to order the company to completely ban employees from using smart chatbots made available on the Internet. In such a situation, the company will be forced to create its own, operating as internal such applications and intelligent chatbots, which are not connected to the Internet and operate solely as integral modules of the company's internal information systems. This type of solution will probably involve the company incurring significant financial expenses as a result of creating its own such IT solutions. The costs can be significant and many small companies' financial barrier can be high. However, on the other hand, if the construction of internal IT systems equipped with their own intelligent chatbot solutions becomes an important element of competitive advantage over key direct competitors, the mentioned financial expenses will probably be considered in the category of financial resources allocated to investment and development projects that are important for the future of the company.
The key issues of opportunities and threats to the development of artificial intelligence technology are described in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which employees of these entities previously input into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
How do you mitigate the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Relevant answer
Answer
What serious things can an LLM like ChatGPT be used for in work? From what I see, it is most often used by people who lack natural intelligence and use this tool to create shallow content. Especially in marketing and advertising. I'm probably not seeing everything, but the responses generated by ChatGPT themselves are so buggy and unreliable that I can't imagine anyone responsible using them for any serious purpose. Yes - the best solution seems to me to avoid using such tools in serious applications where the tool could have access to sensitive data, and to use it only as a successor to the "answering machine", or as a replacement for copywriters.
  • asked a question related to Cyber Defense
Question
4 answers
With the rapid development of online banking, including mobile banking, are commercial banks increasing spending on improving cyber risk management processes to a greater extent than on credit risk management?
In recent years, the importance of managing the risk of cybercrime of information systems and the potential loss of data transferred over the Internet has been growing, as well as improving systems and instruments for cyber security of information systems using modern ICT, Internet and Industry 4.0 information technologies, including, among others, Internet of Things technology. A major factor in the growing importance of information systems cybercrime risk management is the rapid development of online and mobile banking. In addition, during the SARS-CoV-2 (Covid-19) coronavirus pandemic, the development of online and mobile banking accelerated. This was due to the increase in the scale of digitization and internetization of various spheres of business entities during the pandemic. The financial sector, including the commercial banking sector, is one of those sectors in the economy where the opportunities for the application of ICT information technologies, Internet technologies, Industry 4.0/5.0 including artificial intelligence, artificial neural networks, machine learning, deep learning, Internet of things, cloud computing, Big Data Analytics, multi-criteria simulation models, digital twins, Blockchain, virtual and augmented reality, etc. are the greatest. On the other hand, this is also a sphere of advanced information systems that is particularly vulnerable to attacks from cyber criminals using various cybercriminal techniques to extort bank account access data from bank customers and/or hacking into e-banking systems. In this area, something is constantly happening. On the one hand, banks are implementing new ICT information technologies and Industry 4.0/5.0 and on the other hand, cybercriminals are also taking advantage of these new technologies. Often it even happens the other way around, i.e., first the cybercriminals create new techniques to seize customer data necessary to log in to bank accounts operating on Internet bubble systems and then the bank's hired IT specialists patch system gaps and improve security for access to bank IT systems, improve firewalls, anti-virus applications, etc. However, commercial banks operating under the formula of classic deposit-credit banking get most of their revenue from their banking activities, generate most of their profits from their lending activities, from providing loans to different types of business entities, to citizens, to other banks that act as borrowers. Procedures for granting credit, improving credit risk management, regulations shaping credit activities improved, perfected and adapted to the changing economic environment usually for many decades. In contrast, the development of online and mobile banking was realized in a much shorter period of time than the development of commercial banks' lending activities. As a result, the procedures associated with lending activities in recent years are no longer subject to the same degree of change as the development of communication procedures, techniques for accessing banking products, etc. under the development of Internet banking. In addition, due to the development of online and mobile banking, the increase in the scale of cyber-attacks on banking systems has increased the importance of improving the security of banking information systems. The aforementioned increase in scale has been faster in recent years compared to the improvement of credit business procedures. As a result, commercial banks have in recent years allocated significantly more expenditures on improving cyber-security systems and instruments for banking information systems, on improving cybersecurity risk management systems than on improving credit risk management systems. Besides, both risk management processes can increasingly be carried out in an integrated manner.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
With the rapid development of online banking, including mobile banking, are commercial banks increasing spending on improving cyber risk management processes more than on credit risk management?
Are commercial banks increasing spending on improving cybersecurity risk management processes more than on credit risk management?
And what is your opinion on this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Relevant answer
Answer
Dear Prof. Prokopowicz!
You pointed to a great problem. Hackers and cyber-criminal teams are always one or two steps ahead of defending IT - teams:
Peters, G.W., Malavasi, M., Sofronov, G. et al. Cyber loss model risk translates to premium mispricing and risk sensitivity. Geneva Pap Risk Insur Issues Pract 48, 372–433 (2023). https://doi.org/10.1057/s41288-023-00285-x Open access:
Pavel V Shevchenko, Jiwook Jang, Matteo Malavasi, Gareth W Peters, Georgy Sofronov, Stefan Trück, The nature of losses from cyber-related events: risk categories and business sectors, Journal of Cybersecurity, Volume 9, Issue 1, 2023, https://doi.org/10.1093/cybsec/tyac016, Available at: https://academic.oup.com/cybersecurity/article/9/1/tyac016/7000422?login=false
Yours sincerely, Bulcsu Szekely
  • asked a question related to Cyber Defense
Question
6 answers
How will the rivalry between IT professionals operating on two sides of the barricade, i.e. in the sphere of cybercrime and cyber security, change after the implementation of generative artificial intelligence, Big Data Analytics and other technologies typical of the current fourth technological revolution?
Almost from the very beginning of the development of ICT, the rivalry between IT professionals operating on two sides of the barricade, i.e. in the sphere of cybercrime and cyber security, has been realized. In a situation where, within the framework of the technological progress that is taking place, on the one hand, a new technology emerges that facilitates the development of remote communication, digital transfer and processing of data then, on the other hand, the new technology is also used within the framework of hacking and/or cybercrime activities. Similarly, when the Internet appeared then on the one hand a new sphere of remote communication and digital data transfer was created. On the other hand, new techniques of hacking and cybercriminal activities were created, for which the Internet became a kind of perfect environment for development. Now, perhaps, the next stage of technological progress is taking place, consisting of the transition of the fourth into the fifth technological revolution and the development of 5.0 technology supported by the implementation of artificial neural networks based on artificial neural networks subjected to a process of deep learning constantly improved generative artificial intelligence technology. The development of generative artificial intelligence technology and its applications will significantly increase the efficiency of business processes, increase labor productivity in the manufacturing processes of companies and enterprises operating in many different sectors of the economy. Accordingly, after the implementation of generative artificial intelligence and also Big Data Analytics and other technologies typical of the current fourth technological revolution, the competition between IT professionals operating on two sides of the barricade, i.e., in the sphere of cybercrime and cybersecurity, will probably change. However, what will be the essence of these changes?
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How will the competition between IT professionals operating on the two sides of the barricade, i.e., in the sphere of cybercrime and cyber security, change after the implementation of generative artificial intelligence, Big Data Analytics and other technologies typical of the current fourth technological revolution?
How will the realm of cybercrime and cyber security change after the implementation of generative artificial intelligence?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Relevant answer
Answer
I believe the way we view security will change with the advent of Gen AI. Since any lay man will now have access to the most comprehensive and complex scripts(depending on what the model was trained on), it will definitely make it a lot harder to secure the data and infrastructure. My belief is that anything digital and connected is never secure.
We have to accept that our data can be accessed by malicious actors. What we can do is entrap such actors by associating/pegging a tracker and malicious code to all the data we store, and making sure that they can never use/view what they have extracted. So, whenever someone gains access to our data/infrastructure, they not only disclose themselves, but also get compromised through the executable scripts they downloaded. What's important to do is never store any stand alone files, and instead have scripts associated with each file(which shouldn't be able to be removed when extracting this data).
Only certain organization specific software should be allowed to extract the date, in the know that certain scripts will be executed when doing so. Appropriate measures can be taken with respect to specific scripts associated with the data file to prevent the org itself from being the victim.
  • asked a question related to Cyber Defense
Question
3 answers
Greetings fellow scholars and cybersecurity experts,
I am excited to initiate a discussion centered around the dynamic and increasingly important field of cybersecurity, especially in the context of advancing artificial intelligence technologies. As digital threats evolve and become more sophisticated, the role of AI in enhancing cybersecurity measures is becoming more crucial and, simultaneously, more complex.
I would like to focus our discussion on several key areas:
AI in Cyber Defense: How is AI currently being utilized to improve cybersecurity defenses? What are some of the most promising AI-driven cybersecurity tools and techniques in development or use today?
Threat Detection and Response: In what ways has AI enhanced our capabilities in threat detection and response? Are there notable examples where AI has successfully identified or mitigated cyber threats?
Ethical and Privacy Concerns: With the integration of AI in cybersecurity, what ethical dilemmas and privacy concerns are emerging? How can we balance the need for advanced security measures with the protection of individual privacy and data rights?
Future Threat Landscape: How might the cyber threat landscape evolve with the increasing use of AI, and what challenges does this pose for cybersecurity professionals?
Collaborative Efforts and Knowledge Sharing: In what ways can cybersecurity professionals and AI researchers collaborate more effectively to address these challenges? Are there platforms or networks that facilitate this interdisciplinary exchange?
The goal of this discussion is not only to share knowledge and insights but also to explore potential collaborative research opportunities and innovative solutions to these pressing issues.
I look forward to your contributions, diverse perspectives, and experiences in this field.
Regards.
Relevant answer
Answer
Thank you for initiating this insightful discussion on the intersection of artificial intelligence and cybersecurity.
AI in Cyber Defense: AI is currently being utilized in various ways to bolster cybersecurity defences. Machine learning algorithms are used to analyze patterns and detect anomalies that could indicate a cyber threat. AI-driven tools like predictive analytics, risk scoring, and automated reports are being developed and used to proactively identify and mitigate potential threats.
Threat Detection and Response: AI has significantly enhanced our capabilities in threat detection and response. For instance, AI can analyze vast amounts of data in real-time, allowing for quicker identification of threats. AI has been successful in identifying and mitigating cyber threats, such as the use of machine learning algorithms to detect phishing attacks.
Ethical and Privacy Concerns: The integration of AI in cybersecurity indeed raises ethical dilemmas and privacy concerns. While AI can enhance security measures, it also has the potential to be used maliciously, and there is a need for regulations to prevent misuse. Balancing advanced security measures with the protection of individual privacy and data rights is a challenge that needs to be addressed through comprehensive policies and ethical guidelines.
Future Threat Landscape: As AI becomes more prevalent, the cyber threat landscape is likely to become more complex. Cybersecurity professionals will need to stay ahead of AI-driven cyber threats, which will require continuous learning and adaptation.
Collaborative Efforts and Knowledge Sharing: Collaboration between cybersecurity professionals and AI researchers is crucial in addressing these challenges. Platforms and networks that facilitate interdisciplinary exchange, such as academic conferences, online forums, and professional networks, can be beneficial.
  • asked a question related to Cyber Defense
Question
25 answers
How can artificial intelligence help improve cyber security systems and techniques in online and mobile banking?
In recent years, technologies that play an important role in the field of Industry 4.0, technologies that determine the current fourth technological revolution, including machine learning technologies, deep learning and artificial intelligence are finding their way into improving cyber security systems. Financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies into specific areas of banking in order to increase process efficiency, economic efficiency, etc. Artificial intelligence is already being used by banks to improve remote communication processes with customers, in call centre departments as part of the creation of automated remote communication systems and digitised adviser avatars, in the process of managing credit risk and other risk categories, and also in the area of cyber-security.Therefore, opportunities are emerging for the application of artificial intelligence technologies in improving cyber-security techniques and systems in various areas of cyber-security in online and mobile banking, including issues such as:
1. improving cyber-security techniques to protect the information systems of financial institutions, including banks, from external cyber-attacks via email and ransomware viruses.
2. improving cybercrime risk management systems for integrated internal information systems connected to the Internet.
3. Improving cyber security techniques implemented through the implementation of new Industry 4.0 technologies, including artificial intelligence, machine learning, Blockchain, multi-criteria simulation models, etc., and advanced analytical techniques such as Big Data Analytics, Business Intelligence.
4. improving the anti-spam systems used to protect email inboxes in order to increase the filtering out of emails where cybercriminals use phishing techniques and/or send malware and ransomware viruses in the background of the email.
5. Improving cyber-security techniques for online and mobile banking systems with a particular focus on mobile banking implemented on the bank's customer side using smartphones equipped with specific operating systems and web applications.
6. Analysis of the level of effectiveness and cyber security for biometric techniques for encoding access to information systems as an important factor in cyber security.
7. perfecting cyber-security techniques in integrated, internal, intranet information systems operating in financial institutions, including commercial banks characterised by a complex organisational structure and companies forming interconnected business entities.
In view of the above, financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies in various areas of banking, including in the improvement of cyber-security techniques and systems.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can artificial intelligence help improve cyber-security systems and techniques in online and mobile banking?
What do you think about this topic?
What is your opinion on this subject?
Please respond,
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
Please write what you think in this issue? Do you see rather threats or opportunities associated with the development of artificial intelligence technology?
I invite you to familiarize yourself with the issues described in the article given above and to scientific cooperation on these issues.
I invite you to scientific cooperation in this problematic.
Please write what you think in this problematics?
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me based on my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Relevant answer
Answer
  1. Threat Detection and Prevention: AI can analyze large volumes of data, network traffic, and system logs in real-time to identify patterns and anomalies indicative of potential cyber threats. Machine learning algorithms can be trained to detect malicious activities, such as network intrusions, malware, or unauthorized access attempts. AI-powered systems can continuously monitor and respond to emerging threats faster than traditional methods.
  2. Intrusion Detection and Response: AI-based systems can learn from historical data and identify patterns of malicious activities to detect and respond to intrusions promptly. They can analyze network traffic, user behavior, and system logs to identify suspicious activities and generate alerts. AI can also automate incident response, enabling rapid mitigation and containment of security breaches.
  3. Malware Detection and Prevention: AI algorithms can analyze the characteristics and behavior of known malware to identify new or previously unseen threats. Machine learning models can learn to recognize malware signatures or detect malware-like behavior, enabling proactive defense against evolving malware attacks.
  4. User and Entity Behavior Analytics (UEBA): AI can analyze user behavior, device interactions, and system logs to establish normal patterns of activity. Any deviations from these patterns can raise alerts for potential insider threats or compromised user accounts. AI-powered UEBA systems can detect unusual or suspicious behaviors, helping identify unauthorized access or compromised accounts.
  5. Vulnerability Assessment and Patch Management: AI can assist in identifying system vulnerabilities by analyzing code, network configurations, or system logs. It can automatically scan systems, applications, or network infrastructure to pinpoint vulnerabilities and prioritize patching or remediation efforts.
  6. Fraud Detection and Prevention: AI techniques, such as anomaly detection and predictive modeling, can be used to identify fraudulent activities in financial transactions, online banking, or e-commerce. AI models can learn from historical data and patterns to detect and prevent fraudulent behavior, reducing financial losses and protecting sensitive information.
  7. Phishing and Social Engineering Mitigation: AI-powered systems can analyze and classify email messages, URLs, or social media content to identify phishing attempts, malicious links, or social engineering attacks. AI algorithms can learn to recognize patterns in phishing campaigns and warn users or block malicious content.
  • asked a question related to Cyber Defense
Question
5 answers
I am trying to make a dataset based on MITRE ATT&CK (https://attack.mitre.org/) website to create AI-based threat intelligence. However, I didn't find any automated tools or readymade datasets for it.
Is there any dataset based on the MITRE ATT&CK?
Thanks in advance.
Relevant answer
Answer
Anik Islam Abhi I am working on a relevant paper currently (happy to share findings offline). It covers a regression analysis and AI modeling of data to detect anomalies.
I suspect that another thing you'll need to deal with is how to do this threat analysis in a manner that does not lead to data privacy concerns for both those in the dataset and the data being analyzed for threat intelligence (i.e., ensuring anonymity). I do have a paper that addresses this. Although it is not directed toward your specific research question, it may be useful for that challenge of structuring your dataset:
  • asked a question related to Cyber Defense
Question
3 answers
Does anyone know about some good journal that will publish e-banking and cyberthreat related papers?
Relevant answer
Answer
Dear Hasibul Islam,
You may want to review the following sources:
Cybersecurity eBook: Attacker Economics in Financial Services
What financial services institutions need to know about cyberattack cost vs. value
_____
Imperva Data Security Fabric
Imperva® Data Security Fabric is the first data-centric solution that enables security and compliance teams to quickly and easily secure sensitive data no matter where it resides with an integrated, proactive approach to visibility and predictive analytics.
_____
Reimagined Enterprise Data Protection for Insider Risk
_____
Electronic Banking: Impact, Risk and Security Issues
  • asked a question related to Cyber Defense
Question
9 answers
Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the Internet of Things?
Will cybercrime in the future mainly concern the technology of the Internet of Things?
Will the improvement of the risk management process of the Internet information transfer in the future concern mobile devices and Internet of Things technology?
Is the online mobile banking currently offered mainly on smartphones also extended to other devices functioning as part of the Internet of Things technology?
Please reply
I invite you to discussion and scientific cooperation
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Best wishes
Relevant answer
Answer
Dear Md. Abdur Rashid,
Thanks for the answer. I also believe that in the coming years there will be an increase in the importance of cybercrime and the improvement of cybercrime risk management and the improvement of cybersecurity systems in the field of information systems used in devices equipped with the Internet of Things technologies. The importance of this issue is also growing due to the development of e-logistics systems developed as part of computerized systems of international supply and procurement logistics equipped with ICT and Industry 4.0.
Best wishes,
Dariusz
  • asked a question related to Cyber Defense
Question
16 answers
The analysis of banking Trojans consists in researching methods of cybercrime in the field of infecting the bank's information systems, both those which are intra-bank and those that serve bank customers as part of online mobile banking. Analysis of attacks by cybercriminals, for example, viruses popular in recent years, trojans of the ransomware type, which after encrypting computers encrypt data disks. In addition, other types of Trojan horses are used to steal sensitive data, personal customers or embezzlement of money from clients' bank accounts, extorting loans, etc. After analyzing methods used by cybercriminals, banks strengthen security systems, protect banking systems against these attacks, improve security and authorization tools online banking clients. In addition, the next step is to improve the risk management process of IT systems. I described these issues, among others, in the following publications:
In addition, cybercriminal attacks on electronic banking systems are probably much more than official statistics provide, because banks do not boast of these events if they do not have to.
This is because many of these cybercrime attacks are ineffective or have relatively low costs, and the identified gaps in the e-banking system are quickly repaired.
however, if the bank customers knew all these events of cyber-criminals, this could reduce the level of confidence in banks.
Then, bank customers could start to withdraw bank deposits from banks and dopiers on a massive scale, then a serious problem for banks would appear associated with a sharp increase in the level of liquidity risk.
In view of the above, the current question is: What would be the consequences for banks to fully inform banks' clients about cybercrime attacks on electronic online banking systems?
I invite you to discussion.
greetings
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
Relevant answer
Answer
Dear Shadreck,
I don't have a WhatsApp profile. When I create a profile on this portal, I will contact you.
Thank you,
Have a nice day, Stay healthy! Best wishes,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
29 answers
In some countries, rumors of cybercriminals with Ransomware are reportedly again being reported again. These viruses spread via e-mails, which automatically send themselves out from infected e-mail accounts and send out infected e-mails to all e-mail contacts of a virus mailbox infected with the virus. The virus is very dangerous because after opening a fake e-mail, the virus installs deeply into the computer and encrypts access to the disks by blocking access to the contents of the disks. I wrote scientific publications on this subject.
In view of the above, I am asking you the following question: Are cybercriminals now attacking personal and corporate computers using Ransomware viruses again?
Please reply. I invite you to the discussion
Relevant answer
Answer
Yes, in recent months there have been new, spectacular and effective cybercriminal attacks targeting selected large technology companies, companies from the energy sector, fuel sector, food production and other companies operating in strategic sectors of the economy as well as public institutions, including selected local government institutions and central public administration institutions countries. Cybercriminal attacks were carried out on the basis of cybercriminal techniques and solutions that have been known for years, i.e. through spamming containing malware, infecting computers with ransomware viruses encrypting access to disks containing important company data, through various variants of the cybercriminal technique known as phishing, by hijacking data to log in to specific accounts of various websites, to log in to e-mail, data downloaded from social networks and other places where Internet users enter personal and sensitive data and do not maintain high cybersecurity standards.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
28 answers
What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes
Relevant answer
Answer
In the area of ​​cybersecurity of online banking, I propose the following research topic: Analysis of the use of Industry 4.0 technology in the field of improving cybersecurity of online banking, including mobile banking. This topic may also take into account the scale of application of cybersecurity rules and recommendations by bank customers and the level of cybersecurity of operating systems used by bank customers, web browsers and other Internet applications installed on laptops and smartphones, through which bank customers use online banking.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
17 answers
Relevant answer
Answer
If sentiment analysis carried out on information and data downloaded from online information, industry and social portals and processed on Big Data Analytics platforms help to identify the dominant trends of changing opinions of Internet users on specific topics, dominant issues in public debates, dominant answers to specific questions, then Can sentiment analysis also help to diagnose key cybersecurity problems about which discussions are held in the form of discussions etc. on the Internet?
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
19 answers
The field of research and business applications in the field of obtaining, archiving, analyzing and processing data in Big Data database systems has been developing strongly for several years.
There were hacking theft of personal, sensitive and secret data regarding users of social networks.
Are the results of research known, or are you familiar with publications describing risk management processes in the area of obtaining, archiving, analyzing and processing data in Big Data systems run by technological internet companies such as Google, Facebook, etc.
Technological internet companies such as Google, Facebook, etc. have the ability to obtain classified, sensitive and personal data from the Internet about the users of websites, including search engines and social media portals, who use these information services.
For the needs of these considerations, the issue of the security of classified data stored in Big Data database systems run by internet technology companies managing social media portals should be added.
There have been frequent thefts made by cybercriminals who, from these Big Data systems, stole classified and sensitive information about hundreds of thousands or millions of users of particular social media portals.
The development of social media portals therefore generates an increased risk of theft of data on users of social media portals.
Therefore, technological internet companies that run social media portals but also other companies that collect large amounts of data about users of specific, information services should continually develop and improve risk management systems for potential data loss from Big Data information resources.
Due to the above, in many companies, especially in large corporations, integrated risk management systems are built and improved.
Integrated risk management systems combine risk management processes in various areas of a company, institution or other organization.
One of the areas of risk management, the importance of which in many companies is growing, is risk management in the area of obtaining, archiving, analyzing and processing data in Big Data database systems.
In view of the above, I am asking you: Is the risk of cybercriminal attacks on Big Data database systems that contain personal data of social media portal users growing?
Please, answer, comments. I invite you to the discussion.
Relevant answer
Answer
Yes it is actually on the upward trend as pointed out by Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
13 answers
There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work undertaken under the auspices of the United Nations, namely under the General Assembly, is progressing at a very slow pace. I recently published a research article on that ongoing work at the UN in the field of cybersecurity, available at : . It confirms that progress is slow, so this raises a few questions. What is needed to improve multilateral cooperation on cybersecurity? Are there some specific topics of cybersecurity that should be prioritized in the multilateral arenas? What format (binding, non-binding, information sharing, confidence-building) should the expected deliverables have?
Relevant answer
Answer
thanks for your valuable question
  • asked a question related to Cyber Defense
Question
11 answers
recent hot area of research in the field of cyber forensics
Relevant answer
Answer
Below I briefly described the issues related to cybercrime and cybersecurity, which I researched and described in scientific publications that are available on the Research Gate portal. Over the past few years, the scale of cybercrime attacks on the IT systems of various institutions, including government institutions, on the databases of social media portals, on the ICT systems of banks, on electronic banking systems has been growing. Cybercriminals are increasingly attacking mobile online banking systems made available to Internet users and bank customers through mobile devices, mainly via smartphones. Research shows that the scale of cybercrime attacks on the IT systems of banks, institutions, etc. using social engineering combined with perfidiously created malicious software such as ransomware, i.e. encrypting access to data on disks or redirecting users to fake websites of banks and institutions on the Internet to phishing personal data, access passwords to electronic banking accounts and, as a result, to steal money. For several years, many mailbox users have appeared strange emails of unknown origin, which are sent as spam from private other email accounts or others with false information. Attachments containing false information are attached to many of these suspicious emails, usually sent by cybercriminals and hackers. Attachments are usually of the WORD * .doc document type, the Acrobat Reader * .pdf format, image files or other formats, and often contain Ransomware-type viruses. These are very dangerous viruses that encrypt access to a computer's disk. In addition, cyber criminals are increasingly using mailboxes set up on the e-mail portal to send infected e-mails to subsequent Internet users by generating fake emails so that they look like a specific user of the mailbox would send e-mails prepared by cybercriminals to their friends. These types of cybercrime techniques are becoming more common. Why are Internet technology companies that dominate the market and offer e-mail services do not improve the security of e-mail communication systems using e-mail boxes to significantly reduce cybercriminals' activity harmful to citizens? This question is still valid. On the other hand, internet banks and technology internet companies, technology fintechs are constantly improving cyber security techniques. The development of Business Intelligence business intelligence, Blockchain technology, data analysis in Big Data database systems, artificial intelligence to track movements and attacks made by cybercriminals, for prognostic analyzes, etc. can be helpful in the process of improving IT systems risk management. Therefore, the skilful and efficient use of data science technology can be helpful in combating cybercrime, but it all depends on how these technologies will be used and, as a consequence, who will win in the following years in this IT, information "arms race". I conduct research in this area. Conclusions from the research I published in scientific publications that are available on the Research Gate website. I invite you to scientific cooperation.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
9 answers
In reading various articles and in even discussions with consultants, the terms Cyber Security and Information Security are used interchangeably and sometimes the former seems to be taking over the latter. I want to share my thoughts on this and to show how there can be a distinction between Cyber Risks and Information Security Risks and also show how these two risks can be defined.
Cyber Risks
All risks that affects the organization’s Information Systems such as breaches, IT related threats (Ransomware, virus, malware, etc.). This requires that the relevant People, Process & Technology are in place to predict, prevent, detect and respond against cyber threats.
Information Security (IS) Risks
With IS Risk the focus is on the tenets of Information Security, these are the controls which are to be designed in all IT solutions prior to go live:
Confidentiality – Controls in place to mitigate against the unauthorized disclosure of information.
Integrity – Controls in place to mitigate against the unauthorized modification of information.
Availability – Controls in place to mitigate against downtime of Information Systems, such as Denial Of Service attacks.
So Cyber Risks would relate more to the daily IT related activities of an organization and the Information Security Risks would be the controls that are baked in to IT solutions during the development phase.
Relevant answer
Answer
Yes, due to the high dynamics of development of cyber crime, cyber threats, cyber risk, information security on the Internet, cyber crime risk management, information management transferred in cyberspace, hacking techniques in online and mobile banking etc. it happens that some synonymous terms are used interchangeably. This can cause interpertional dissonance. In this connection, an important issue is the permanent updating of the language of the problem in the field of cyber crime and cyber security and the semantic classification of individual concepts and relationships between them.
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Defense
Question
3 answers
The interest is to understand what are the perspectives of bio or nature inspired methods for matching the signs of intrusuions.
Relevant answer
Answer
Deeplearning approach can be great for future IDS. In general, IDS should be approached from a big data perspective.
  • asked a question related to Cyber Defense
Question
6 answers
What are the main determinants of the process of integrated risk management of cybercrime and the security of information transferred on the Internet?
In my opinion, the processes of integrated cyber risk management and security of information transferred via the Internet should include the following issues:
- Modern organization management
- Innovations related to information security
- Big Data logistic management in the organization
- IT systems risk management
- Security of information posted on the company's websites
- Good practices in information security management
- Methods for estimating losses as a result of teleinformatic attacks
- Economic aspects of building an IT security team in an organization
- Security of IT infrastructure and Operation Technology
- Information security management standards
- Cloud Computing and information security
- Incident and crisis management
- Business Continuity Planning (BCM)
- Personal data protection
- Technical solutions in the field of information security management
- Cryptography and security mechanisms
- Equipment security and network management
In your opinion, what other issues should be taken into account in building and improving the process of integrated cyber risk management and information security transferred on the Internet?
Please reply
Best wishes
Relevant answer
Answer
Hi Dariusz,
I think one of the biggest risks to security will be the ongoing development and mass adoption of quantum computing.
Regards
Martin
  • asked a question related to Cyber Defense
Question
3 answers
Cyber attacks and espionage are on the rise. To defend yourself and even your devices, I think it's a better idea to first inspect or review all the software you download or to purchase.
Relevant answer
Answer
I am afraid that the most secure way of protecting your computer and data from espionage is NEVER connect it to Internet or any networks. Practically it is impossible these days, since you can not set-up newly purchased computer without connecting it to Internet. All other methods, like SW inspections or reviews - sorry to say - give only impression of security because with tools available to average or even above-average computer user we do not have skills and capabilities to detects various sorts of malitious SW developed and used by specialized agencies. Various sorts of espionage SW modules can be "inserted" into normal application and/or systems SW without giving user any clue that such modules have been added. Some protection give various sorts of antivirus SW, but also in this case we, users, do not have 100 % guarantee that our machine and assets are free of risk being subject of espionage. Everything which I wrote sounds pessimistic, but it is reality. We are surrounded and we are using SW containing millions lines of code, developed by various parties, who not always disclose their practices towards users. Just small example: WhatsApp, which was collecting and giving away data to some governmental agencies. Therefore it is illusion to expect that in an "open" usage of IT we can protect to 100 % from espionage.
  • asked a question related to Cyber Defense
Question
21 answers
One of the threat to humanity is THE emergence intelligent machines. When AI gets full control and when sky-net comes to exist....might be already there, ....the plan is to enslave humanity rather than making things easy for him. I know, soon the robots replace many employees and do many complicated jobs including industry works, medical works (complicated surgery, scanning etc), cooking, nuclear and other energy sector operations, care works for child and elderly etc.
Machines are smart and fast; they don't get tired, they don't do random (ie they are error free). They are very adaptive, capable of evolving abruptly and are self aware. Machines spy on humans 24/7, on every little corner of the earth due to the emergence of 5G which gives them this ability, the ability to track and identify everyone for every space-time on the glob with their direct satellite connection...and this means the end of human privacy. I have no idea what the fate of human being will be in such times.
Making human half machine half human (cyborg), a bio-mechanical being is one application of this field to create superhuman soldiers. Many countries including Russia, US, china, UK are using such technology side by side with their genetic engineering research to strengthen their military. They are always up to humanity, to destroy the human race from the face of the earth in every way possible.
5G is a key together with AI for all these to succeed. 5G towers are already in place to begin work in US and UK (some are already in operation). 5G has a data speed of 100 times that of the 4G network system and the towers should be installed very near to the client residents as it work in very short distance point to point communication. It uses very short wavelength or very high frequency which obviously expected to cause caner and other serious side effects on any living cell due to its high frequency microwave radiation. I know many people are not aware of the downside of such technology and the potential damage it might cause. It is my belief that 5G radiation is responsibly the cause for the massive death of birds and other animals near to such towers in US. The towers look like this, you might find one of these on your building or neighborhood.
I would like to know what you think about 5G network and the technology related with it.
Relevant answer
Answer
I rally liked your description of the expected disastrous effects of 5G, and I asked Dr. Ted Rappaport (one of pioneering professors from the NYU in the field of mmWave and 5G) about the health effects resulted from using such frequencies and he mentioned that he did this research on that topic before beginning his experiments on the mmWave channel measurements few years ago:
It is obvious that using these frequencies (i.e. mmWaves) is far from ionization that causes health issues for humans if they are used in the right way and according to federal regulations.
Best Regards.
  • asked a question related to Cyber Defense
Question
8 answers
Antivirus programs signal this, but are the new attacks appearing, or maybe the companies that produce antivirus software use this kind of alerts mainly to stimulate consumers to buy these applications?
Is the information about the growing threat from the activities of cybercriminals also partly a result of marketing activities of antivirus software vendors?
Cybercriminal attacks involving various types of viruses occur on a daily basis in various places around the globe.
However, large-scale attacks on the global scale and publicized in the media are probably much rarer.
An example was the type of cybercriminals, which was carried out on a large scale in mid-2017, which was mainly targeted at large public and financial institutions and corporations operating in Ukraine, but quickly spread over the world through capital and business links between companies.
Then ransomware viruses known only often in the environments of security specialists, among computer scientists analyzing cybercriminal attacks, has been publicized in the media in many countries and has become a global and public problem.
In this situation, sales revenues and profits of companies producing antivirus software are growing significantly.
Recently, some of these antivirus programs inform that the threat of cybercriminal attacks involving ransomware is growing.
Is it a real increase in the risk of cybercrime or a new form of marketing for companies that produce antivirus software?
Or both?
Please, answer, comments. I invite you to the discussion.
Relevant answer
Answer
I agree with you, but it's not all about sales.
I think the most blatant was the quest for fame/notoriety by the irresponsible so-called researchers, who published the obscure (and, largely unexploitable) 'vulnerability in the instruction queue of Intel CPU's. This caused widescale panic, a few remedies which were worse than the disease, all for a bug which no hacker would ever dream of trying to exploit. Why? Because it's not cost-effective. Cybercrime is a business and, like any other, it needs to maximise ROI, so patiently hacking one PC in the hope that a password will materialise for a bank account which actually contains money is something only a researcher would do.
As a cybersecurity company, (designsim.com.au) we take a battering 24/7 from about 72 countries, mainly from botnets, so we're fairly up to date on the latest trends.
The main attack vector over the last three or four months is a DDoS attempt which appears to come from compromised IoT devices, probably NVR/DVR or routers, originating mainly in South America and looking like this (with the cutely-imbecilic and fake Referer)
181.214.196.62 - - [30/Oct/2018:00:37:37 +1100] "POST /botnet_hack.txt/trackback/ HTTP/1.0" 403 16896 "http://staging.Esal.us/wiki/index.php?title=The_Famous_Koh-i-nor_Diamond" "PHP/5.3.01"
To date we've had over 10,000 such hack attempts.
Second, is a revival of an old Drupal vulnerability, consisting of a pair of queries like:
107.161.94.87 - - [29/Oct/2018:16:03:17 +1100] "GET /?q=node/add HTTP/1.1" 200 18466
107.161.94.87 - - [29/Oct/2018:16:03:18 +1100] "GET /?q=user/register HTTP/1.1" 200 18466
the hope being for an escalation of privileges.
Lastly, one that never goes away, is the eternal exploitation of the thousands of bugs in WordPress/PHP:
94.102.49.122 - - [30/Oct/2018:06:07:50 +1100] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 404 226 "-" "ZmEu"
159.69.39.191 - - [30/Oct/2018:06:14:04 +1100] "GET /wp-includes/wlwmanifest.xml HTTP/1.1" 404 225
Perhaps it would be a good time to get the IDS to trigger on these.
  • asked a question related to Cyber Defense
Question
1 answer
I am a student of Manipal University, India and currently pursuing my Masters in Geopolitics and International Relations. I am in my last semester and have to submit a dissertation. My topic for dissertation is "Advances in ICT and the likely nature of warfare." Since you are an expert in the field of cybersecurity, could you answer few of my Questions, which I can use for my dissertation, with your due permission.
PFA the Research Proposal that has been approved by the university and the submission deadline is 10 March 2018
Other Questions
  • Is the nature of warfare changing? If yes, then do you attribute this change to advances in ICT technology or are there other factors? Or you consider it as a cyclic process i.e. The form of warfare is ever changing even traditionally nation-states tend to gain superiority against their adversaries by innovating new means to deter and in the process are changing the ways wars were fought?
  • Can we build a safer world?
  • What are the emerging and future technologies that we will have to worry the most about from a security perspective?
  • How should an organization think about cyber defense? What are the limits of a ‘perimeter-oriented’ security posture?
Relevant answer
Answer
1 -The nature of the war is the same, "more"; just the styles has changed based up on each historical, and geopolitical reasons. Also, ICT-technology is not first revolution that human kind has experienced in the continental or international level ( renaissance, industrial age, modern era); it may be our first time to experience it in our life-time. 2 - Is it the first time that international organizations such as United Nations or others try hard to make the world a better place?! This would be part of the self-conflicting nature of human to stage, and personalize him or herself for "more", but as usual, the tough times and regresses would constrain him for less. 3 - Usually, after each revolution, there is a confusion period in the social values and standards, because of a fluctuations in privileges versus side-effects, and this could be the next emerging one.