Page 331 - Cyber Defense eMagazine September 2025
P. 331

within their technical project. Human can absorb a lot of that through experience, making those who can
            provide decision how some level of protection will be estimated and graded to get a pivotal role in such
            a protocol. Transitioning expert’s knowledge from human to machine is extremely difficult task that will
            not necessarily mean machines could develop thinking process as humans can. AI field is currently in its
            booming epoch as such solutions once being trained to resolve some complicated problems can do so
            faster than any human. With growth and progress of emerging technologies everything might appear as
            much easier, unleashing a plenty of opportunities to communities, economies and industries across the
            world.

            Industrial assets are mainly vulnerable to physical threats, brining on surface a need for good video
            monitoring security. This means any such facilities should be covered and protected in a physical manner,
            suggesting significance of surveillance and security practitioners on that place. Capturing all or majority
            of physical angles and corners with video monitoring setups is a crucial challenge in assuring such a
            space. This matters in sense of prevention, online monitoring and incident response – very similarly as
            in  case  of  virtual  safety  and  security.  Today  many  properties,  assets  and  large  infrastructures  are
            protected using IP cameras that are quite inexpensive and dependent on web signal connectivity, making
            them also sensitive to cyber-attacks. Accordingly, these networks also have a prefix “cyber” and their
            functionality and operability strongly require stable internet connection, truly being critical infrastructure
            in ongoing connotation. Security staff working on such a set must take into consideration even those
            conditions, carefully completing risk assessment sheet and determining all strengths and weaknesses of
            that complex. It’s very hard developing criteria of thinking, judging and marking all risky elements, putting
            all those requirements into helpfully created spreadsheets that must be examined in truly rational fashion.
            In order to deal with such risk assessment sheet security practitioners are supposed to pass through
            vetted training and even that is not sufficient as they also need to deserve some experience, making their
            skill better trusted. Senior security practitioner knowledge is literally priceless, opening up many outlets
            to  machine  intelligence  designers  to  make  next-generation  systems  that  can  handle  something
            complicated in time-effective manner.

            For instance, some of AI-powered solutions can mimic or even demonstrate skill humans have, but they
            cannot cope with their own thoughts and other cognitive behavior capabilities as they are not yet at such
            scale of their development. Practical experience with AI indicates it’s needed to imagine, explain and
            make good problem-solving of some environment, safeguarding great orienteering of all elements of that
            surrounding. In other words, if navigating in such a space is maximized that technical solution will deal
            with higher IQ to such sets of tasks, streamlining that system to go beyond intelligent or even smart.


















            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          331
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   326   327   328   329   330   331   332   333   334   335   336