Technology is growing rapidly with new solutions for updates and improvements everyday, for both the good and bad. Technology can be used to create fewer complications in everyday lives and for businesses. Although it is possible for technology to be placed in the wrong hands, which can create major difficulties for an individual, and more.

For example: A certain individual is a part-time Admin worker in an office and at home. The Company they work for invested in and brought a new Lenovo Laptop for them to complete work tasks whilst at home. Sufficient research was completed by the Company’s IT Department for which they found it stated that this specific laptop was adequate for most work responsibilities, are very business orientated and will enhance work life. 3 months down the track of the individual’s use of the laptop, they begin checking their personal emails. They notice a new, odd email from an unknown source with an attached file and they click to open it. This then forces the Laptop to now run slow and completely shut down. This is one of the most common examples of how technology can be used maliciously and how easily a virus can infect a computer.

Law policies are implemented to control users from attacking others maliciously and Cyber Security analysts are responsible for preventing attacks, like these, from happening. No matter how careful you may be with avoiding threats and viruses, they cannot always be prevented without the necessary assistance being incorporated (Paul 2017, p 56). With the right support, you can help avoid attacks from happening, such as:

  • Stealing credentials – usernames and passwords
  • Stealing Corporate information and documents
  • Identity theft – finding out personal information and stealing it for use

To prevent malicious attacks, Security Software solutions are implemented to help avoid attackers from accessing confidential information. It is addressing a security issue we may experience on a computer. The cyber security solution is introducing Machine Leaning to software’s.

Machine Learning comes from Artificial Intelligence, which is based on the idea of computer systems minimising human interaction by recognising data and patterns, and making decisions to perform the necessary tasks for their findings. Machine Learning has the ability to understand and automatically apply mathematical calculations and controls to large amounts of technical data. The purpose of this is to minimalise human interaction to easily perform any duty habitually by testing different approaches to extract patterns and relationships (SAS 2018b). Machine Learning is the idea of building a brain.

Many cyber security companies are now applying Machine Learning to their software’s to reduce security issues and implement a better change in protection. Such as, Palo Alto Networks, a global cyber security company, has employed Machine Learning in their security software designs. They are an organisation that creates platforms and solutions to enable safety and prevention of cyber-attacks successfully (Palo Alto Networks 2018b). The have recently introduced the Magnifier Behaviorial Analytics solution to use unsupervised and unsupervised Machine Learning to “model network behaviour and improve threat detection” (Oltsik 2018).

The purpose of introducing Machine Learning is because it is becoming the future of technical design and a way to complete tasks. Many company’s have incorporated machine Learning address their security issues and to protect their employees and customers from malicious threats and attackers.