Find a Question:
IBM’s Watson is able to achieve exam for security professionals
IBM puts the self-learning computer Watson in for security purposes, and it is now able to pass the exam CISSP security training. That tells IBM security chief Marc van Zadelhoff against Tweakers.
saddle courteous ibm Marc van Zadelhoff has worked since 2007 at IBM and has recently become general manager of the global security company. He lives in Boston and spoke during his presence in the Netherlands Tweakers. He said among other things that the company Watson nowadays commitment to security purposes. This system was initially developed to participate in the American game show Jeopardy, and managed in 2011 to the final round of the TV program win . IBM made in 2013 known to put Watson in hospitals, but the system appears to be suitable for many more purposes.
As Watson’s Van Zadelhoff capable of exam CISSP to make -beveiligingsopleiding with the score needed to succeed. The exam consists of 250 multiple choice questions where candidates get six hours of the time. IBM Watson has trained for this by putting tens of thousands of documents on security and related research in its database. The system then analyzes these by machine learning. “It is fascinating that Watson after a while begins to get that words like backdoor, trojan and virus in the security world have a special significance, other than in normal language,” Van Zadelhoff.
“You may wonder why we do this,” he adds. “But the fact is that worldwide more than one million jobs for security staff and companies are slow to adopt talents.” By Watson to be deployed for security to respond to this situation and can for example be used as an assistant in a security operation center. They can also be analyzed much raw security data with Watson Analytics, allowing attackers to be noticed before they penetrate the network.
Other developments are taking place in the field of identifying users. There is a shift from passwords to biometric login methods, like face recognition and iris scans. An ongoing research within IBM has to do with identification on the basis of mouse use. So there would be a hundred ways in which people use their mouse. “If a person within a company usually in profile sits three and one day suddenly present a different profile on the computer, then you know that there may be something going on,” Van Zadelhoff explains.Viewing:-288
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!