Drücke „Enter”, um zum Inhalt zu springen.
Hinweis zu diesem Datenschutz-Blog:
Anscheinend verwenden Sie einen Werbeblocker wie uBlock Origin oder Ghostery, oder einen Browser, der bestimmte Dienste blockiert.
Leider wird dadurch auch der Dienst von VG Wort blockiert. Online-Autoren haben einen gesetzlichen Anspruch auf eine Vergütung, wenn ihre Beiträge oft genug aufgerufen wurden. Um dies zu messen, muss vom Autor ein Dienst der VG Wort eingebunden werden. Ohne diesen Dienst geht der gesetzliche Anspruch für den Autor verloren.

Ich wäre Ihnen sehr verbunden, wenn Sie sich bei der VG Wort darüber beschweren, dass deren Dienst anscheinend so ausgeprägt ist, dass er von manchen als blockierungswürdig eingestuft wird. Dies führt ggf. dazu, dass ich Beiträge kostenpflichtig gestalten muss.

Durch Klick auf folgenden Button wird eine Mailvorlage geladen, die Sie inhaltlich gerne anpassen und an die VG Wort abschicken können.

Nachricht an VG WortMailtext anzeigen

Betreff: Datenschutzprobleme mit dem VG Wort Dienst(METIS)
Guten Tag,

als Besucher des Datenschutz-Blogs Dr. DSGVO ist mir aufgefallen, dass der VG Wort Dienst durch datenschutzfreundliche Browser (Brave, Mullvad...) sowie Werbeblocker (uBlock, Ghostery...) blockiert wird.
Damit gehen dem Autor der Online-Texte Einnahmen verloren, die ihm aber gesetzlich zustehen.

Bitte beheben Sie dieses Problem!

Diese Nachricht wurde von mir persönlich abgeschickt und lediglich aus einer Vorlage generiert.
Wenn der Klick auf den Button keine Mail öffnet, schreiben Sie bitte eine Mail an info@vgwort.de und weisen darauf hin, dass der VG Wort Dienst von datenschutzfreundlichen Browser blockiert wird und dass Online Autoren daher die gesetzlich garantierten Einnahmen verloren gehen.
Vielen Dank,

Ihr Klaus Meffert - Dr. DSGVO Datenschutz-Blog.

PS: Wenn Sie meine Beiträge oder meinen Online Website-Check gut finden, freue ich mich auch über Ihre Spende.
Ausprobieren Online Webseiten-Check sofort das Ergebnis sehen

Artificial Intelligence in the Security Sector: Fundamentals and Possibilities

0
Dr. DSGVO Newsletter detected: Extended functionality available
More articles · Website-Checks · Live Offline-AI
📄 Article as PDF (only for newsletter subscribers)
🔒 Premium-Funktion
Der aktuelle Beitrag kann in PDF-Form angesehen und heruntergeladen werden

📊 Download freischalten
Der Download ist nur für Abonnenten des Dr. DSGVO-Newsletters möglich

The possibilities of Artificial Intelligence help companies solve or mitigate security problems. This includes both physical security, such as on company premises, as well as technical security, like in corporate networks (cybersecurity). Excerpt from my contribution, which what published in the magazine Security Advisor.

Introduction

How does one teach a computer program to recognize intruders sneaking around on company premises? Can a computer program identify an intruder based on sounds or motion alarm reports that sensors report?

Personally (long-term experience in software development) I would certainly have a hard time writing a program that can solve such tasks based on my specific, pre-programmed requirements.

To answer these questions today, only one question needs to be answered: Can a person do this? The answer is obviously yes. Proof: Security personnel can clearly identify intruders by looking at monitors or patrolling the grounds. What works in real life also applies to networks, such as a company's internal network. There, security specialists determine whether an attack from outside (or occasionally by malicious employees) is to be assumed.

Artificial intelligence learns through examples. Concrete specifications do not have to be programmed in. Rather, examples suffice.

How does man do that? Simplest answer: With his brain. Complete answer: Nobody knows it. Anyway, man learns from examples. In early years of life these examples are especially presented by the parents of the child. This process we call then education.

With the help of modern methods of artificial intelligence, machines can do the same as humans or even better. At least it is certain that a machine does not get tired, but a human already does. Machines also always want to carry out an assigned task, in contrast to humans. Machines are cheaper than employees.

To get an AI system that satisfactorily (or well or very well or excellently) solves a highly complex task, one only has to feed it a lot of examples. Just like with humans. Once an AI system has reached a certain level of intelligence, then for new tasks just a few examples are enough. Just like with humans.

Due to the nature of current AI algorithms I believe they replicate the functioning of the human brain. So far no one has shown me that my theory is wrong.

Security scenarios

To identify intruders, signals must be classified. These signals come for example from cameras, microphones or motion detectors.

A classification is equivalent to file drawer thinking. Thus, people on company premises could be distinguished as follows:

  • Innocent passerby or customer
  • Janitor or handyman
  • Burglars

To recognize a burglar disguised as a craftsman, a specific alarm should also be triggered when a person is recognized as a craftsman. With the help of a Trust Value, it can be controlled whether a quiet or loud alarm is installed, possibly with direct and automatic calling of the police or additional security personnel.

Analytical results that occur over a period of time can be viewed in sections to identify underlying events that are relevant in total. This way, burglars can also be recognized who always dance just a little out of line with behavior that would be attributed to an unobjectionable contemporary.

The exact same procedure that can be used for detecting intruders on company premises can also be used for detecting hackers in IT systems. The difference lies in the sensors, i.e., input data. What is a camera on the company premises is, for example, the Firewall in the computer network.

Wherever sensors and other input data exist, whether physical or software-based, AI algorithms can be used for security purposes. Input data without sensorics occur in contact forms, or when calling a URL that hackers like to add security-critical parameters.

Recommendations

Those who want to enter completely unsensible data into a third-party system like ChatGPT are welcome to do so. Often, however, the data is personally identifiable, or it's even business secrets. Sometimes the data isn't extremely critical, but should still not fall into the hands of outsiders for competitive reasons.

A system like ChatGPT is also very slow and chargeable. Quickly, even with moderately intensive use, several hundred or thousand euros per month in costs only arise for using the OpenAI interface.

Better are local systems, i.e., AI systems, that run on their own computers. Servers or providers located in the USA generally have a problem with data protection (keyword: Privacy Shield – Schrems II). These data protection problems dissolve into thin air with local systems. Even business secrets would probably be given by every reasonable thinking person to their own system, rather than distributing them extensively throughout world history.

High-quality AI systems can already be built with little effort. Feel free to contact me if you need anything.

The image accompanying this post what not only created with the help of a locally running AI on my system, but it what also upscaled to larger image dimensions nearly loss-free using another local AI (which I use among other things when articles are printed on paper). This type of image scaling can also be used for images from surveillance cameras.

My contribution has appeared in Security Advisor and is quoted above in other words.

Key messages

Artificial intelligence can be used to solve security problems, both physical and technical.

AI learns from examples, similar to how humans learn.

AI systems can classify signals from security devices to identify potential threats.

AI algorithms can be used for security purposes by analyzing data from sensors, like cameras or firewalls.

Optimized local AI systems are better than cloud-based ones for data protection and cost-effectiveness.

High-quality AI systems can be built easily and used for various applications, including image processing.

About

About the author on dr-dsgvo.de
My name is Klaus Meffert. I have a doctorate in computer science and have been working professionally and practically with information technology for over 30 years. I also work as an expert in IT & data protection. I achieve my results by looking at technology and law. This seems absolutely essential to me when it comes to digital data protection. My company, IT Logic GmbH, also offers consulting and development of optimized and secure AI solutions.

Artificial Intelligence: Regulation is hardly possible (Proof: concrete examples)