IT in Manufacturing


ChatGPT and cybersecurity: What AI means for digital security

April 2023 IT in Manufacturing


Steve Flynn, sales and marketing director, ESET Southern Africa.

As AI technology like ChatGPT evolves, so too do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed by these developing tools.

As artificial intelligence (AI) technology becomes a new reality for individuals and businesses, its potential impact on cybersecurity cannot be ignored. OpenAI and its language model ChatGPT are no exception, and while these tools offer significant benefits to almost every industry, they also present new challenges for digital security. ChatGPT raises concerns due to its natural language processing capabilities, which could be used to create highly personalised and sophisticated cyberattacks.

The impact of AI on cybersecurity

• The potential for more sophisticated cyberattacks: AI and ChatGPT can be used to develop highly sophisticated cyberattacks, which can be challenging to detect and prevent as natural language processing capabilities may bypass traditional security measures.

• Automated spear phishing: With the ability to generate highly personalised messages, AI can be used to send convincing targeted messages to trick users into revealing sensitive information.

• More convincing social engineering attacks: AI and ChatGPT can also be used to create fake social media profiles or chatbots, which can be used to engage in social engineering attacks. These attacks can be difficult to detect, as the chatbots can mimic human behaviour.

• Malware development: AI can be used to develop and enhance malware, making it more difficult to detect and clean out.

• Fake news and propaganda: ChatGPT can be used to generate fake news and propaganda, which can manipulate public opinion, and create panic and confusion.

Weapon or tool: it’s in the user’s hands

However, as with any other tool, the use (or misuse) depends on the hand that wields it. Organisations like OpenAI are visibly committed to ensuring their technology is used ethically and responsibly and have implemented safeguards to prevent misuse. Businesses can do the same. To protect their digital assets and people from harm, it is essential to implement strong cybersecurity measures, and to develop ethical frameworks and regulations to ensure that AI is used for positive purposes and not for malicious activities.

Nine steps organisations can take to enhance safety

1. The implementation of Multi-Factor Authentication (MFA): MFA adds an extra layer of security, requiring users to provide multiple forms of identification to access their accounts. This can help prevent unauthorised access, even where a hacker has compromised a user’s password.

2. Educating users about security do’s and don’ts: Continuous awareness training about cybersecurity best practices, such as avoiding suspicious links, updating software regularly, and being wary of unsolicited emails or messages, can help prevent people from falling victim to cyberattacks.

3. Leveraging advanced machine learning algorithms: Advanced machine learning algorithms can be used to detect and prevent attacks that leverage OpenAI and ChatGPT. These algorithms can identify patterns and anomalies that traditional security measures might miss.

4. Implementing network segmentation: Network segmentation involves dividing a network into smaller, isolated segments, which can help isolate the spread of an attack if one segment is compromised.

5. Developing ethical frameworks for the use of AI: Developing ethical frameworks and regulations can help ensure that ChatGPT is used for positive purposes and not for malicious activities.

6. Increasing monitoring and analysis of data: Regular monitoring and analysis of data can help identify potential cybersecurity threats early, and prevent attacks from unfolding.

7. Establishing automated response systems: Detect and respond to attacks quickly, minimising damage.

8. Updating security software regularly: Ensuring that security software is up to date can help protect against the latest cybersecurity threats.

Safeguard against misuse

By leveraging the power of AI technology, businesses and individuals can drive innovation and improve productivity and business outcomes with powerful new solutions. However, it is important to balance the potential benefits of AI technology with the potential risks, and ensure that AI is used ethically and responsibly. By taking a proactive approach to AI governance, we can help minimise the potential risks associated with AI technology and maximise the benefits for business and humanity. As AI technology evolves, so too must our cybersecurity strategies.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing brownfield plants back to life
Schneider Electric South Africa IT in Manufacturing
Today’s brownfield plants are typically characterised by outdated equipment and processes, and face challenges ranging from inefficient operations to safety hazards. However, all is not lost, as these plants stand to gain a lot from digitalisation and automation.

Read more...
Bringing brownfield plants back to life
Schneider Electric South Africa IT in Manufacturing
Today’s brownfield plants are typically characterised by outdated equipment and processes, and face challenges ranging from inefficient operations to safety hazards. However, all is not lost as these plants stand to gain a lot from digitalisation.

Read more...
Testing next-generation automotive e-drives
Siemens South Africa IT in Manufacturing
Emotors, an independent e-drive manufacturer, has taken advantage of test solutions from the Siemens Xcelerator portfolio of industry software to aid in the development and constant improvement of its e-drive systems for hybrids, plug-ins and full electric vehicles.

Read more...
Simplifying AI training
Beckhoff Automation IT in Manufacturing
The TwinCAT Machine Learning Creator from Beckhoff is aimed at automation and process experts and adds the automated creation of AI models to the TwinCAT 3 workflow.

Read more...
Closed-loop production chain for metal additive manufacturing
Siemens South Africa IT in Manufacturing
AMAZEMET has adopted solutions from the Siemens Xcelerator portfolio of industry software to help build its etal additive manufacturing materials and supporting post-processing equipment.

Read more...
Exploring the role of AI in digitisation
IT in Manufacturing
Artificial Intelligence (AI) is providing companies with the advanced technology necessary to navigate their digitisation journeys more easily. But more than that, AI is transforming IT infrastructure, enhancing business operations, and reshaping job roles, all while decision makers stay cognisant of the ethical considerations. By understanding the opportunities and challenges presented by AI in digitisation, we can harness its power to help organisations move towards a more agile, intelligent, and competitive future.

Read more...
AI can speed up rollout of renewable energy solutions
IT in Manufacturing
Artificial Intelligence (AI) is taking over in every industry and sector, and has the potential to drive an efficiency and productivity revolution. In the renewable energy sector, AI modelling could assist with optimising power plant design, ensuring that various renewables sources are effectively integrated and load balanced, provide optimised and continuous monitoring, and much more.

Read more...
Control architecture leads to faster, easier product development for refrigeration
Opto Africa Automation Editor's Choice IT in Manufacturing
What’s the secret to providing superior service and staying competitive in a changing market? You might learn something from ALTA Refrigeration’s experience. Over ten years, it transformed itself from a custom engineering services company into a scalable industrial equipment manufacturer, using an edge-oriented control architecture to manage a growing installed base.

Read more...
Comprehensive protection of the network against attacks
Phoenix Contact IT in Manufacturing
In recent years, the generation of data to create ever better transparency and control of production has become a decisive competitive factor. IIoT has also contributed to more manufacturing systems being connected to IT or cloud systems. This places higher demands on access security, which Phoenix Contact meets with the Secure Edge Box.

Read more...
Embracing security as a core component of your technology
IT in Manufacturing
ABI Research recently undertook a comprehensive study to learn more about the product security assurance landscape from the perspective of enterprise customers, surveying 302 enterprise customers, and conducting in-depth interviews to complement the qualitative survey.

Read more...