Page 331 - Cyber Defense eMagazine September 2025
P. 331
within their technical project. Human can absorb a lot of that through experience, making those who can
provide decision how some level of protection will be estimated and graded to get a pivotal role in such
a protocol. Transitioning expert’s knowledge from human to machine is extremely difficult task that will
not necessarily mean machines could develop thinking process as humans can. AI field is currently in its
booming epoch as such solutions once being trained to resolve some complicated problems can do so
faster than any human. With growth and progress of emerging technologies everything might appear as
much easier, unleashing a plenty of opportunities to communities, economies and industries across the
world.
Industrial assets are mainly vulnerable to physical threats, brining on surface a need for good video
monitoring security. This means any such facilities should be covered and protected in a physical manner,
suggesting significance of surveillance and security practitioners on that place. Capturing all or majority
of physical angles and corners with video monitoring setups is a crucial challenge in assuring such a
space. This matters in sense of prevention, online monitoring and incident response – very similarly as
in case of virtual safety and security. Today many properties, assets and large infrastructures are
protected using IP cameras that are quite inexpensive and dependent on web signal connectivity, making
them also sensitive to cyber-attacks. Accordingly, these networks also have a prefix “cyber” and their
functionality and operability strongly require stable internet connection, truly being critical infrastructure
in ongoing connotation. Security staff working on such a set must take into consideration even those
conditions, carefully completing risk assessment sheet and determining all strengths and weaknesses of
that complex. It’s very hard developing criteria of thinking, judging and marking all risky elements, putting
all those requirements into helpfully created spreadsheets that must be examined in truly rational fashion.
In order to deal with such risk assessment sheet security practitioners are supposed to pass through
vetted training and even that is not sufficient as they also need to deserve some experience, making their
skill better trusted. Senior security practitioner knowledge is literally priceless, opening up many outlets
to machine intelligence designers to make next-generation systems that can handle something
complicated in time-effective manner.
For instance, some of AI-powered solutions can mimic or even demonstrate skill humans have, but they
cannot cope with their own thoughts and other cognitive behavior capabilities as they are not yet at such
scale of their development. Practical experience with AI indicates it’s needed to imagine, explain and
make good problem-solving of some environment, safeguarding great orienteering of all elements of that
surrounding. In other words, if navigating in such a space is maximized that technical solution will deal
with higher IQ to such sets of tasks, streamlining that system to go beyond intelligent or even smart.
Cyber Defense eMagazine – September 2025 Edition 331
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.