To contact Cabling Installation & Maintenance:

About Cabling Installation & Maintenance:

Bringing practical business and technical intelligence to today's structured cabling professionals.

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on:

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

CyTaka CEO Unveils Artificial Intelligence Technologies that Could Help Train Hackers in the Field of Cyber

--News Direct--

Doron Amir, CEO of CyTaka (the World Cyber Championship), unveiled the next thing in cyber technology: a machine that integrates artificial intelligence (AI) that will enable creating simulations of new cyber attacks and could be used to train cyber professionals:

"In the near future, we might see cyberattacks against which we have no defense"

Doron Amir: "I have a great suggestion for Elon Musk: The space infrastructures he is building might very well be better suited for cooling quantum computers rather than for space tourism".

Doron Amir CEO CyTaka. Photographer Yossi Aloni

There is no doubt that the machines will beat the humans. The only way to control the situation is with a game changer such as the quantum computer, which could definitely be a crucial instrument in defense and thwarting cyberattacks.

Amir cautions: "The age of machines is underway. We must expedite the race to quantum computing, otherwise the machines might rise up against their creators. This could happen as today's computers are not protected in a way that can cope with machines equipped with AI.

"If quantum computing is not functional in the next few years, we will see AI-based cyberattacks against which we will not be able to defend ourselves using existing technology in the civilian and business markets. Such cyberattacks could make much more damage than anything we now know, including the harming human life due to the use of smart technology in our vehicles, aviation and health industries."

Fluid and Crystalized Intelligence in AI.

Amir recounts that a couple of years ago, when his company started to develop a machine that could simulate cyberattacks for the purpose of training cyber professionals, they discovered that their work was cut out for them, and that it was more complex than they initially thought.

"The first version showed us by the results that the machine behaved with crystalized intelligence (it could only cope with problems it had previously encountered or that were similar to patterns it was already familiar with). Actually, the new generation of Cyber Security needs to understand and be ready to handle new cyber security cases which never happened before. This is why we developed the fluid intelligence module to our machine.

(Giving us the ability to cope with new problems)," explains Amir. "Unlike humans, who lose their fluid intelligence as they grow older, the machine has no biological limitations, and therefore, its fluid intelligence gets better over time, as its computing power continues to increase."

‘Moore’s Intelligence’ is a term that Amir coined based on Moore's Law. According to Amir, there is direct correlation between computational power and fluid intelligence in the world of AI.

"In order to simulate fluid intelligence, we engaged young people whose fluid intelligence is at its peak, who work in the fields of software, information security and cyber. The idea was to identify people who have a proven record in dealing with new security problems. We met these hackers at the cyber championships held around the world, where we witnessed the very best minds solving cyber challenges using various methodologies and tactics. After studying these methodologies and tactics, we found they were different from one hacker to the next and that hackers from different countries cope with the same cyber challenges differently, both in terms of offense and defense.

"As we could not find a fluid intelligence cyber module, we created our own module by gathering data and techniques from all around the world. We held cyber competitions in Israel, USA and of course, the World Cyber Championship was held in United Arab Emirates (UAE), which allowed us to host cyber professionals from countries that do not have diplomatic relations with Israel."

Amir says that the main challenge in the final round of the World Cyber Championship produced by CyTaka in Dubai, was to hack a drone located in Israel, manipulate it to take a photograph from the air of a secret code positioned in a hidden place, and then to send this code back to the Competition Judges on the main stage in GISEC Global in Dubai. The event was held in partnership with the Cyber Security Council (UAE) together with the respectful H.E. Dr. Mohamed Al Kuwaiti (Head of Cyber Security UAE Govt).

Only after an hour, (when the allotted time and the time extensions were over) a professional hacker from Tunisia completed the mission. "In comparison, our machine managed to solve the challenge in under 7 minutes," says Amir enthusiastically.

Doron Amir CEO CyTaka. Photographer: Yossi Aloni

‘Terminator’ Comes to Life

"Today, competitors in our cyber championships can use our machine to practice before the competition starts. In the near future, we will hold cyber competitions where not only machines compete against human hackers, but against other machines."

Amir notes that there is room for concern, as there is no doubt that the machines will beat the humans. He says that the only way to control the situation is with a game changer like the quantum computer, which could definitely be a crucial instrument in defense and thwarting cyberattacks.

"The quantum computer already exists in terms of feasibility, and one can travel to Singapore for a demonstration (if you get invited to see this wonder). One of the problems today putting the computer to use in the industry is the tremendous amount of energy required to cool the system to -273° Celsius (the absolute zero -273.15° C).

"The solution to the extreme temperature requirements might be found in the ability to use the space platform, where the required temperature can occur naturally."

"I have a great suggestion for Elon Musk” says Amir. “The space infrastructure he is building might very well be better suited for cooling quantum computers rather than for space tourism."

https://www.cytaka.com/

CyTaka is lead by Doron Amir (Israeli Cyber entrepreneur) promoting a global activity in the world for building bridges between various nations, with an emphasis on encouraging high-tech education and employment in a wide range of sectors globally.​Together with simulations of cyber cases and defense, we give the opportunity for programmers and cyber experts to prove information security skills no matter where they come from or where they were born.

Contact Details

LAPIDOT Srategy & Communications LTD

MERAV LAPIDOT

+972 54-288-8808

merav@goldfinger-lapidot.com

Company Website

https://www.cytaka.com/

View source version on newsdirect.com: https://newsdirect.com/news/cytaka-ceo-unveils-artificial-intelligence-technologies-that-could-help-train-hackers-in-the-field-of-cyber-337135688

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.