Friday, June 30, 2017

Natural catastrophes

We all remember perfectly how years ago, thousands of theories about the end of the world emerged at the end of 2012. These assumptions were based on the fact that the baktun (the Mayan calendar) ended on this date. Evidently, all this fall by the wayside, but it helped many authors to develop stories about apocalypse and to “scare” some people with speeches about the final judgment. One of these stories was developed in the Roland Emmerich film "2012". Without assessing the film, it proposed a destruction of the world based on various natural catastrophes.

The melting of the poles, volcanic eruptions, earthquakes…  in the film occur catastrophe after catastrophe that devastated the population This week, the networks received another wave of cyber attacks that makes us wonder if we will also be facing the end of the digital world.


Friday, June 23, 2017

The paradigm of artificial intelligence

The treatment of artificial intelligence and its settling to the everyday world has always been a controversial subject. Before it became a reality, many authors dreamed with the problems and case studies that might be the subject that we are discussing today.


Moving away from literature and fantasy, Artificial Intelligence is already a reality and its execution in the everyday world is happening. For this reason, in the 18th edition of the Summer Courses of Rey Juan Carlos University we wanted to dedicate a speech to the legal and social aspects that these new techniques represent.


Thursday, June 22, 2017

The challenge of cyber security


When you read the news that are  related to cybersecurity, it is hard not to feel devastated in many cases. Security gaps, phishing, ransomware everywhere ... Danger stalks behind any corner and you never know for sure if you'll be ready to face it.However, although the future may seem hopeless, there are always actors who are on the good side.


In the 18th edition of the URJC Summer Courses we will have the special collaboration of a speaker who works indeed for this last side. An analyst of one of the best world's leading computer companies.


Wednesday, June 21, 2017

Particle physics and machine learning

As much as it may sound like an improbable squaring of the circle, machine learning and particle physics have more in common than you can think of. This subject is taught at the beginning of the university degree. 

In the 18th edition of the URJC Summer Courses we are fortunate to have an eminence from the University of Glasgow, an expert in experimental particle physics. In addition, we also have a speaker who comes directly from Massachusetts.


Tuesday, June 20, 2017

Predictive analysis and algorithms of Machine learning for the exam in URJC courses.

As we already told you in other posts, the 18th edition of the URJC Summer Courses aims to offer a vision of how artificial intelligence and machine learning are tools that cybersecurity can use to safeguard our data in a place full of dangers such as the network.

But… How does artificial intelligence work? Does it offer us opportunities to stay more reinforced on the outside world or it also offered to cybercriminals? These are some of the topics that will be discussed on the last days of the Summer Courses.


Monday, June 19, 2017

Machine Learning, Big Data and Scientific Method in URJC Summer Courses

Machine learning is a subfield of computer science related to artificial intelligence. This area seeks the development of techniques that give machines the ability to learn thanks to the induction of knowledge. By creating "own" behaviors, it becomes very difficult to detect behavioral anomalies when cybercriminals try to steal business-sensitive data. 

Hence the importance of cybersecurity in machine learning. Therefore, in the 18th edition of the URJC Summer Courses we will have two papers dedicated exclusively to this subfield.

Marta Beltrán - Having as main target the detection of new fraud patterns and cybersecurity threats

On Monday June 26th, the teacher of the URJC Marta Beltrán Pardo will analyze how different techniques of machine learning can be used in the detection of anomalies. Thanks to this ability, she will explain how to generate a "security intelligence" capable of being applied to network intrusion detection and prevention, fraud prevention or identity management. And these are just some of the possible examples.

Professor Marta Beltrán is an Electronic Engineer (UCM 2001), graduated in Physical Sciences, branch of Industrial and Automatic Physics (UNED 2003), a PhD in Computer Science (URJC 2005) and she also has a Master's Degree in Performing Arts (URJC 2007), in which she is currently studying her second doctorate.

In addition, she is the director of the GAAP Research Group, and of the Master in Research in Advanced Hardware and Software Systems, she is a faculty member of the Master in Data Science of Rey Juan Carlos University, co-founder of the Cybersecurity Cluster and member of the academic board of the Chair of Applied Data Science to 5G of Ericsson; her latest works are related to distributed systems projects, high performance computing, cyber intelligence or research related to machine learning techniques.

Jesus Cerquiades - Data science or augury: The scientific method in the Big Data era

On Tuesday 27th, the IIIA researcher will expose the risks involved in developing predictions from data without the control given by the scientific method. The lecture will introduce attendees to machine learning and it will be discussed the extent to which the predictive capabilities offered by Big Data are a complement to the scientific method or may even make it obsolete.

The researcher Jesús Cerquiades belongs to the Institute of Research in Artificial Intelligence (IIIA) that is part of the Spanish National Research Council (CSIC). In Jesus' own words, his career is driven by two forces: research into Artificial Intelligence (machine learning and multi-agent systems) and attractive software development projects.

These are only two of the papers that will take place in the Teatro Real Carlos III of Aranjuez on the occasion of the Summer Courses of the URJC. If you want more information on the topics to be discussed from June 26 to 28, keep an eye on our social networks and on our blog, since we will continue to inform you day by day of everything that these courses can offer you.

Friday, June 16, 2017

Cybersecurity, Artificial Intelligence and Machine Learning discussed at the URJC


An area of growing importance in any enterprise, such as cybersecurity, and two areas of immediate future in economic development, such as artificial intelligence and machine learning, are meeting this year at the 18th edition of the Summer Courses of Rey Juan Carlos University. Specifically, in the course that the Research Center for Technological Risk Management (CIGTR) organizes each year since 2011.


Wednesday, June 14, 2017

The prison

Unlike many people think, incarceration (based on its original basis), has no punitive purpose exclusively. Prisons are places whose intention is to re-educate convicts and then reintegrate them into society. Just as when punishing a kid, what jail seeks when depriving of freedom is for individuals to be aware that their actions have consequences, so as to prevent them from recurring in their infractions of the law.

This "learning" method is related to the stimulus-response learning theory. This theory explains human learning or the absence of learning as a consequence of a person's reactions or responses to stimuli.


A survey conducted by Wombat Security to 2,000 respondents (1,000 from the United States and 1,000 from the UK) asked users about cybersecurity issues and which are the best practices that they considered critical to network and data security. That survey showed that half of US participants had been victims of identity theft, while only 19% of English respondents had suffered such an attack.

This difference could be conditioned by the loose security applied by the Americans in their networks. An example to clarify this claim: the survey found out that 54% of respondents considered sites such as a hotel or an international airport as safe places to use WiFi. In contrast, only 27% of UK respondents agreed with this information.

On the other hand, another important piece of information extracted from the study is that while half of the employees have a basic knowledge about phishing, 30% have no knowledge about this threat, while one in ten respondents have no idea what we are talking about. Worse still, researchers have discovered that knowledge about ransomware is even worse, with 63% of Americans and 58% of English people not knowing what to answer ransomware.

Wombat has also examined the behavior and personal choices of employees and how this is directly related to the security of their corporate devices. Of those who use a laptop or smartphone at home, Wombat concludes several risk keys:
  • 54% of US respondents and 36% of UK respondents make use of their social networks in their working devices. 
  • 58 percent of US respondents and 45 percent of UK respondents shop online on work devices
  • 57% of US respondents and 28% of UK respondents use streaming platforms in their work devices. 
  • 52% of US respondents and 30% of UK respondents play games in their work devices.
 In addition, Wombat discovers an alarming number of those same American workers allowing their close friends and family to take a look or reply to emails (43%), streaming (47%) and playing video games (50%) on their work devices.

We find it hard to learn and on many occasions it seems that the only way to do it is through our mistakes. Even with those, the human being is the only animal that stumbles twice against the same stone. We offer you all the information we can to help you avoid these stumbles, but if we are already late, we will try to light the way to avoid you flat on your face.

Monday, June 12, 2017

Normality

Legend has it that in the Middle Ages, there was a feudal lord who ruled his fief with iron fist. Suddenly, one day he lost his mind and left his castle, got undressed and began to bathe in the public fountain of the fief, under the astonished eyes of all his vassals. Evidently, that was an act of madness, but he was still the feudal lord. The final result was that from then on in that fief, it was a normal act to bathe in the public fountain and those who did not do it were banished from the lands of the lord. 

Therefore, the concept of normality is quite ambiguous. What some people consider normal, other people could consider it to be a real madness, and the other way around. Today in our look to the past we check our perception of "normal" in the world of cybersecurity.  


Friday, June 9, 2017

Appearances are deceptive

We call prejudice to the formation of a pre-established idea associated with a person. It is a psychological process based on concepts previously created and that we use to label people and thus discriminate or accept them. So we generate an opinion about someone without knowing them previously. Associated with a defense mechanism, it is a process that usually has negative connotations. Tattoos are associated with jail, beards with filth, glasses with nerds... those are some examples of outdated prejudices that confirm that these value judgments are, in most cases, erroneous. 

Hence the saying that titles this post, because many times we have been hit by reality, discovering that not everything is as we think it is. Today our review of the best of the week in cybersecurity, we apply this saying to prove for the umpteenth time that the Spanish collection of sayings never deceives.


Wednesday, June 7, 2017

The protagonists of the Cold War

The Cold War refers to the political conflict between the so-called Western Bloc, led by the United States and capitalist countries; and the Eastern Bloc, headed by the Soviet Union and other communist nations. Its origin took place after the end of World War II (1945) and ended with the fall of the communist bloc after the USSR coup d'etat attempt. That name refers to the fact that during all these years there was no direct armed conflict between the two sides, although there were small representations, such as the wars in Vietnam or Afghanistan.


It was a war of information, in which the main protagonists were the spies who were in enemy territory. Their function was to collect information to be able to anticipate any kind of belligerent action by the enemy. Spies were the eyes and ears of the political blocs, giving their commanders crucial data that offered them a position of advantage over their enemies. In the world of cybersecurity, we live in a constant Cold War where we also have the enemy at home. In this case, these spies are represented on many occasions by the Internet of Things.


Monday, June 5, 2017

Déjà vu feeling

A year ago, today ...

Do you know that feeling when you enter a place and suddenly you feel that you had been there before? No matter that you know for sure that you have never stepped on that place, a part inside of you is convinced that you have already lived that moment. This is that we call déjà vu. Some theorists think that it is related to dreams, others relate it to parapsychology, and the sciences attribute it to an anomaly in memory, specifically in the overlap between short and long term memory.

In the world of cybersecurity the feeling of déjà vu involves us over and over again. It does not matter that we fight against all types of malware, cybercriminals, etc. We find in the present many situations that already happened in the past. Today in our return to the past we have a perfect example of this effect.


Friday, June 2, 2017

Achilles heel

Homer’s Iliad is one of the most important books of ancient Greek literature. In it, the great battle waged by the Greeks and the Trojans was related. In this book appears Achilles, a Greek warrior who was considered invincible, since when he was a child his mother immersed his body in the river Styx. However, he was being held by his heel when her mother was sinking him into the water, so that part of the body remained vulnerable. This small weakness was the cause of this death in the battle of Troy, when Paris managed to hit him with a poisoned arrow.

Thus, an invincible hero perished in combat when he was considered to be immortal. This is a perfect example of everything having its weaknesses, whether it is a heel, a bug a vulnerability. Today in our review of the week we will discover several weaknesses found in the world of cybersecurity.