There is not enough cybersecurity workers and things are getting worse. According to one estimate, by the year 2021, an estimated 3.5 million cyber security jobs. And candidates who apply less than one in four qualified.
This is why many large companies to invest in long-term solutions such as the mobile training trucks apprenticeship programs. But Texas A&M University System has found a way to solve the labor shortage in the short term. Is the proposal the student security for beginners with an AI program.
The college security operations center deals with about a million attempts to hack the University’s system each month. While the center has some full-time employees, the majority of the security forces of students. Ten students are currently working along with Amnesty International program to detect, monitor and address threats.
This setting on both the training of students to roles in other companies as a cheap cyber security staff of the college. And unlike many other products, Texas A&M are having any trouble filling positions. “We didn’t function deployment,” says Daniel Basil-the executive director of security operations. “All of [the students] heard about through the side channels.”
Texas A&M University System | YouTube
When students come in today, they’re presented with the blackboard to view different areas of the University, indicating how many of the potential threats for each occurrence. Amnesty International has already pulled out the “events” and helps to prioritize them. Students then look at all the anomalies and check to see if it looks like suspicious activity. They do so by comparing them with the previous attacks, looking at things like IP addresses, analysis of data provided by the program. “We are trying our best to get all the agencies to zero contradictions”, says the student security analyst Jennifer Allen. “Then if we don’t do a second review to look at what people may have missed.”
Subscribe to clocking in
A daily look at the workplace in the future
By signing up you agree to receive email newsletters,
Notifications from MIT Technology Review. You can change your preferences at any time. View our
And while an extra look may look straight, won’t you say one of the happiest moments actually came during the second review. Identified a large amount of data that is transferred over the school network illegal BitTorrent activity.
Benjamin Cervantes, a senior specialist in the Department of technology, came to work in the Center for a year and a half ago hoping to get experience to prepare him cyber security role in the army. Before starting this work he was working in the auto repair shop to help pay the costs of the University. Now, instead of working on cars, it’s called a study using focus skills 20 to 30 hours per week to achieve a threats and violence on an AI program that can automate the process of dealing with them.
Security executives said the skills shortage was causing high rates of burnout and turnover.
But just to attract people to work in the field of cyber security is not all talk. A recent study found that nearly 40% of security executives said the skills shortage was causing high rates of burnout and turnover (see “cyber security is an insidious new threat: workforce stress”). “No matter how much income you have, you can not find people,” says Hitesh Sheth, CEO of Vectra, which makes the programme of Amnesty International at the University of uses. “People leave in 12 months because someone else will give them a 30% increase in salary.”
The introduction of the University of Texas A&M cyber security threat Center
This article first appeared in clocking in our newsletter covering the impact of emerging technology in the future. Register here—it’s free!
Recommended for you
- IBM $ 34 million to buy a red hat mega-bet on the coding revolution
- That a self-driving car killed the baby or grandma? Depends on where you are.
- Right-wing extremist social network called gap has been pulled offline after Pittsburgh shooting
- Finally a drug that keeps you young
- Designer children are not the future. They are already here.
The security operations center is not immune to the stress issue but attempts to combat it with the sheer amount of work. “We all look through thousands of threats,” says Cervantes. “It does get a little frustrating, but because there are a lot of [students], we can keep the numbers and do some side projects and measures to prevent that burnout.”
AI as a crutch to help even inexperienced students begin to assess threats quickly. Now the program only detects the anomaly and provide some context. But you cannot act based on the findings, making the human the need to deal with the threats. “Looking ahead, I think we’ll get to the point where they become predictive, in the sense very early stages of the attack, and to contain the attack,” says Sheth.
But the increased adoption of artificial intelligence in order to mitigate the attacks can be a dangerous gamble can hackers learn to circumvent security algorithms and try to pollute the training data. Therefore, automation is not the only solution. Humans have an important role to play also. They are in need.
Want to go ad free? No ad blockers necessary.
It becomes already inside from the inside? Log.