Knowledge Center > ISACA Now > Posts > Cybersecurity , The Singularity and the rise of the silicon-based life form
Cybersecurity , The Singularity and the rise of the silicon-based life form

The Singularity, a term coined by science-fiction writer Vernor Vinge and popularized by futurist Ray Kurzweil, strikes fear into some of those familiar with artificial intelligence. Simply put, The Singularity will come to pass once artificial intelligence surpasses human intelligence. Those that fear The Singularity worry that we will create an artificial life form to do our bidding, which will—in an ironic twist—rise up and enslave us.

Now, I am not one to worry about the Cylons rising up and usurping their human masters. However, the fact remains that our romance with computer technology is not only heating up, it is accelerating the evolution of what I call Silicon-Based Life forms (SBLs).

We have become increasing dependent on our silicon-based helpers, those computing systems with ever-increasing processing capabilities that crunch our numbers and increase our productivity, enable our Internet-based communications and perform our trusted transactions.

The result of our dependence on SBLs is that they have bound us with soft shackles of convenience and a sense of connectedness. And though we can’t call it war, we are engaged in a battle for control over our helpers, lest they suddenly stop working—or worse—start working for someone else.

In 65 short years, the humble transistor evolved into an artificial life form called Watson, a computer system that recognizes natural language and, in 2011, handily defeated two former champions on the TV quiz show Jeopardy! In contrast, it took carbon-based life forms (us) four billion years to evolve from the humble amoeba to a species capable of imagining and creating Watson.

In addition to carrying crushing computational loads without complaint, SBLs deliver our communications at the speed of light, transact business on our behalf and help us more efficiently perform myriad tasks. While we often consider the ways we interact with them, few of us think about how SBLs interact with one another.

Just as humans do, SBLs keep secrets—valuable secrets, ranging from customer data to intellectual property. SBLs share those secrets based on validated identities. The machines use IP addresses, Secure Sockets Layer (SSL) digital certificates and Secure Shell (SSH) keys to talk to each other and verify each other’s identities—a virtual representation of the secret handshake used by clubs to identify trusted members.

The question we have to ask ourselves as the keepers of the SBLs is this—how do we protect the information stored within them? One way is to provide our SBLs with strong and protected identities in the form of secure encryption-key lengths, sufficiently strong algorithms, trusted issuers and security best practices. If we don't take these simple steps, our SBLs become vulnerable to their own form of identity theft—the consequences of which are arguably more devastating and far reaching than are the consequences of human identity theft.

After all, a thief who pilfers the right computer, server or application’s identity can steal millions of human identities (and much more) in a matter of minutes.

SBLs can help us do the hard work of managing the tools with which they communicate. What we need to focus on is how we can better protect our SBLs against the consequences of poor security practices and weak technologies that can easily be taken advantage of by nefarious individuals.

After all, we (mankind) continue to control the destiny of our computer systems. The Singularity is the domain of science fiction, and it isn't likely that this dynamic will ever change.

Jeff Hudson
CEO, Venafi

We welcome your comments! Please log in using the Sign In link at the top right of this page and then leave your comment in the box at the end of the post. To view all blog posts, please click on the ISACA Now link in the blue box on the left.

Comments

There are no comments yet for this post.
You must be logged in to post a comment to this blog.