{"id":7606,"date":"2020-05-18T11:10:59","date_gmt":"2020-05-18T11:10:59","guid":{"rendered":"https:\/\/www.kolabtree.com\/blog\/?p=7606"},"modified":"2020-05-18T11:11:49","modified_gmt":"2020-05-18T11:11:49","slug":"employing-ai-for-cybersecurity-benefits-and-challenges","status":"publish","type":"post","link":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/","title":{"rendered":"L'utilisation de l'IA pour la cybers\u00e9curit\u00e9 : Avantages et d\u00e9fis"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Dans le domaine de la technologie, la s\u00e9curit\u00e9 est une question qui est rest\u00e9e sensible et insaisissable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Les experts en s\u00e9curit\u00e9 ont progressivement identifi\u00e9 les zones qu'ils consid\u00e8rent comme pr\u00e9sentant un risque plus \u00e9lev\u00e9, index\u00e9 les sph\u00e8res d'une menace plus importante, y compris la cartographie des sections qu'ils per\u00e7oivent comme potentiellement vuln\u00e9rables. L'objectif \u00e9tant de maintenir efficacement un programme de s\u00e9curit\u00e9 robuste et g\u00e9rable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From both technical and non-technical approach cybersecurity remains an uncharted sea of personal and organizational area of concern. The entry of advanced technologies have birthed the realm of <a href=\"https:\/\/www.kolabtree.com\/blog\/fr\/ensuring-reproducibility-in-ai-driven-research-how-freelance-experts-can-help-in-biotech-and-healthcare\/\">intelligence artificielle<\/a> and cybersecurity. Exploring diverse tenets of cybersecurity, the entry of AI is timely, productive and also a threat in itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Des protocoles de s\u00e9curit\u00e9 appropri\u00e9s et satisfaisants doivent r\u00e9pondre aux exigences fondamentales de dissuasion, \u00eatre simples \u00e0 mettre en \u0153uvre, difficiles \u00e0 infiltrer et maintenir un niveau de confidentialit\u00e9 maximal. Cependant, avec l'\u00e9volution de l'IA et l'int\u00e9gration du big data, la cybers\u00e9curit\u00e9 d\u00e9rive vers un niveau technique complexe. Le d\u00e9fi est cependant de savoir si elle sera durable \u00e0 l'avenir. Comment contribuera-t-elle \u00e0 dissuader les criminels ? Sera-t-elle utilis\u00e9e pour exploiter les vuln\u00e9rabilit\u00e9s des applications existantes ou des infrastructures centrales ?<strong> L'intelligence artificielle repose largement sur les donn\u00e9es, mais la disponibilit\u00e9 des donn\u00e9es ne signifie pas que les solutions d'IA sont in\u00e9vitables.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Une agr\u00e9gation de technologies d'IA telles que le traitement du langage naturel, l'apprentissage automatique, l'apprentissage profond et les r\u00e8gles m\u00e9tier aura un impact significatif sur toutes les proc\u00e9dures du cycle de vie du d\u00e9veloppement de solutions de s\u00e9curit\u00e9, en aidant les concepteurs de s\u00e9curit\u00e9 \u00e0 cr\u00e9er de meilleures ou de moins bonnes solutions. Comme dans d'autres r\u00e9gions de la technologie, l'IA va perturber la fa\u00e7on dont les solutions de cybers\u00e9curit\u00e9 sont d\u00e9velopp\u00e9es et consomm\u00e9es.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L'arriv\u00e9e des technologies d'IA sera-t-elle utile aux op\u00e9rations de cybers\u00e9curit\u00e9 ? La r\u00e9ponse est oui et non, oui dans la mesure o\u00f9 peu de criminels ont une expertise en IA. La combinaison des technologies d'IA est utilis\u00e9e pour construire des algorithmes d'apprentissage automatique, une s\u00e9curit\u00e9 complexe et une base de connaissances avanc\u00e9e. Diff\u00e9rentes organisations utilisent une combinaison d'infrastructures de s\u00e9curit\u00e9 anciennes et modernes, et il est difficile de passer \u00e0 travers ce m\u00e9lange. Non, avec les technologies \u00e9mergentes, l'IA en cybers\u00e9curit\u00e9 n\u00e9cessitera un investissement massif en temps et en ressources, des algorithmes durables doivent \u00eatre d\u00e9velopp\u00e9s pour g\u00e9rer les applications \u00e9mergentes et le paysage changeant des menaces de s\u00e9curit\u00e9. Il sera difficile de d\u00e9velopper des solutions d'IA compl\u00e8tes dans le domaine de la cybers\u00e9curit\u00e9, la disparit\u00e9 et l'incoh\u00e9rence des donn\u00e9es dans la formation des ensembles de donn\u00e9es, la composition des algorithmes et les tests \u00e9tant des domaines critiques.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La promesse d'une IA fiable dans le domaine de la cybers\u00e9curit\u00e9 est encore loin d'\u00eatre r\u00e9alis\u00e9e efficacement. Les technologies de l'IA doivent encore acqu\u00e9rir pleinement le domaine de l'intelligence humaine. \u00c0 mesure que de nouveaux protocoles de cybers\u00e9curit\u00e9 sont \u00e9labor\u00e9s et que de nouvelles applications et infrastructures sont d\u00e9ploy\u00e9es, l'IA mute en g\u00e9n\u00e9rant des solutions incoh\u00e9rentes et peu fiables.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La cybers\u00e9curit\u00e9 conna\u00eet une croissance rapide et le besoin de meilleures solutions n'a jamais \u00e9t\u00e9 aussi grand. Les technologies et les applications de nouvelle g\u00e9n\u00e9ration, qui peuvent se comporter davantage comme des humains, apparaissent progressivement. Par cons\u00e9quent, une meilleure compr\u00e9hension de ces technologies est n\u00e9cessaire, que ce soit dans le cycle de vie du d\u00e9veloppement logiciel ou dans les solutions de s\u00e9curit\u00e9 pour les applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Si l'on consid\u00e8re que l'apprentissage automatique profond et les r\u00e9seaux neuronaux sont la base d'une IA plus forte, leur application et leur combinaison avec les technologies d'IA existantes telles que la repr\u00e9sentation des connaissances, le traitement automatique des langues, les moteurs de raisonnement, la vision et les technologies vocales renforceront l'IA. Pour d\u00e9velopper et maintenir une infrastructure d'IA, les organisations ont besoin d'une grande quantit\u00e9 de ressources telles que la m\u00e9moire, les donn\u00e9es appropri\u00e9es et la puissance de calcul. De m\u00eame, les solutions d'IA sont form\u00e9es \u00e0 partir de diff\u00e9rents ensembles de donn\u00e9es d'apprentissage, d'ensembles de donn\u00e9es assortis de codes non malveillants et malveillants, et d'autres anomalies. L'acquisition de tous ces ensembles de donn\u00e9es fiables et pr\u00e9cises est co\u00fbteuse et prend beaucoup de temps, ce que toutes les organisations ne peuvent se permettre. En outre, les pirates peuvent \u00e9galement d\u00e9ployer leur IA pour tester et am\u00e9liorer leurs logiciels malveillants afin de battre tout syst\u00e8me d'IA existant. En r\u00e9alit\u00e9, un logiciel malveillant \u00e0 l'\u00e9preuve de l'IA peut \u00eatre extr\u00eamement d\u00e9vastateur car il peut \u00eatre entra\u00een\u00e9 \u00e0 partir des outils de s\u00e9curit\u00e9 IA existants et cr\u00e9er des attaques plus pr\u00e9coces pour p\u00e9n\u00e9trer les solutions de cybers\u00e9curit\u00e9 conventionnelles, y compris les solutions renforc\u00e9es par l'IA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Un autre d\u00e9fi notable de l'IA est qu'avec les bonnes comp\u00e9tences, il est facile de cloner et de reproduire l'algorithme de l'IA. Par rapport \u00e0 la s\u00e9curit\u00e9 conventionnelle, il n'est pas simple de recr\u00e9er du dur, mais toute personne disposant des connaissances n\u00e9cessaires peut acc\u00e9der \u00e0 n'importe quel logiciel<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c0 cet \u00e9gard, l'utilisation de l'IA pour la cybers\u00e9curit\u00e9 est encore insaisissable, la port\u00e9e des technologies de l'IA reste difficile \u00e0 atteindre. Les diff\u00e9rentes approches employ\u00e9es n'offrent aucune garantie de fiabilit\u00e9. Les solutions d'IA peuvent \u00eatre sans d\u00e9fense en raison d'entr\u00e9es avari\u00e9es qui g\u00e9n\u00e8rent des r\u00e9sultats erron\u00e9s de l'apprentissage, de l'exploitation de failles, de syst\u00e8mes de planification, d'attaques par empoisonnement ou de classifications par les syst\u00e8mes d'apprentissage automatique. Ainsi, les technologies d'IA telles que les techniques d'apprentissage profond peuvent \u00eatre tromp\u00e9es par de petits niveaux de bruit d'entr\u00e9e con\u00e7us par un antagoniste. Ces dynamiques illustrent le fait que l'IA n\u00e9cessite davantage de protection que l'organisation elle-m\u00eame. Elle pr\u00e9sente davantage de vuln\u00e9rabilit\u00e9s qui diff\u00e8rent grandement des vuln\u00e9rabilit\u00e9s des solutions de cybers\u00e9curit\u00e9 conventionnelles telles que les d\u00e9bordements de m\u00e9moire tampon.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Dans le domaine de la technologie, la s\u00e9curit\u00e9 est une question qui est rest\u00e9e sensible et insaisissable. Les experts en s\u00e9curit\u00e9 ont progressivement identifi\u00e9 les zones qu'ils consid\u00e8rent comme les plus risqu\u00e9es, index\u00e9 les sph\u00e8res de menace plus \u00e9lev\u00e9e, y compris la cartographie des sections qu'ils per\u00e7oivent comme potentiellement vuln\u00e9rables. L'objectif \u00e9tant de maintenir efficacement un programme de s\u00e9curit\u00e9 robuste et g\u00e9rable.<\/p>\n<div class=\"read-more\"><a href=\"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/\" title=\"Lire la suite\">Lire la suite<\/a><\/div>","protected":false},"author":12,"featured_media":7609,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[434],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v20.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Employing AI for Cybersecurity: Benefits and Challenges - The Kolabtree Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employing AI for Cybersecurity: Benefits and Challenges\" \/>\n<meta property=\"og:description\" content=\"Within the domains of technology, security is one issue that has remained sensitive and elusive. Security experts have progressively identified areas that they consider of greater risk,\u00a0 indexed spheres of a higher threat, including mapping sections that they perceive to be potentially vulnerable. The aim being to sustain a robust and manageable security program effectively.Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/\" \/>\n<meta property=\"og:site_name\" content=\"The Kolabtree Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/kolabtree\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T11:10:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-18T11:11:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kolabtree.com\/blog\/wp-content\/uploads\/2020\/05\/ai-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ramya Sriram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@kolabtree\" \/>\n<meta name=\"twitter:site\" content=\"@kolabtree\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ramya Sriram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employing AI for Cybersecurity: Benefits and Challenges - The Kolabtree Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/","og_locale":"fr_FR","og_type":"article","og_title":"Employing AI for Cybersecurity: Benefits and Challenges","og_description":"Within the domains of technology, security is one issue that has remained sensitive and elusive. Security experts have progressively identified areas that they consider of greater risk,\u00a0 indexed spheres of a higher threat, including mapping sections that they perceive to be potentially vulnerable. The aim being to sustain a robust and manageable security program effectively.Read More","og_url":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/","og_site_name":"The Kolabtree Blog","article_publisher":"https:\/\/www.facebook.com\/kolabtree","article_published_time":"2020-05-18T11:10:59+00:00","article_modified_time":"2020-05-18T11:11:49+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.kolabtree.com\/blog\/wp-content\/uploads\/2020\/05\/ai-cybersecurity.png","type":"image\/png"}],"author":"Ramya Sriram","twitter_card":"summary_large_image","twitter_creator":"@kolabtree","twitter_site":"@kolabtree","twitter_misc":{"\u00c9crit par":"Ramya Sriram","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/#article","isPartOf":{"@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/"},"author":{"name":"Ramya Sriram","@id":"https:\/\/www.kolabtree.com\/blog\/#\/schema\/person\/81992f5863a1b06d132a47822e7b4400"},"headline":"Employing AI for Cybersecurity: Benefits and Challenges","datePublished":"2020-05-18T11:10:59+00:00","dateModified":"2020-05-18T11:11:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/"},"wordCount":792,"commentCount":0,"publisher":{"@id":"https:\/\/www.kolabtree.com\/blog\/#organization"},"articleSection":["Artificial Intelligence"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/","url":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/","name":"Employing AI for Cybersecurity: Benefits and Challenges - The Kolabtree Blog","isPartOf":{"@id":"https:\/\/www.kolabtree.com\/blog\/#website"},"datePublished":"2020-05-18T11:10:59+00:00","dateModified":"2020-05-18T11:11:49+00:00","breadcrumb":{"@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kolabtree.com\/blog\/fr\/employing-ai-for-cybersecurity-benefits-and-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kolabtree.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Employing AI for Cybersecurity: Benefits and Challenges"}]},{"@type":"WebSite","@id":"https:\/\/www.kolabtree.com\/blog\/#website","url":"https:\/\/www.kolabtree.com\/blog\/","name":"The Kolabtree Blog","description":"Expert Views on Science, Innovation and Product Development","publisher":{"@id":"https:\/\/www.kolabtree.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kolabtree.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.kolabtree.com\/blog\/#organization","name":"Kolabtree","url":"https:\/\/www.kolabtree.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.kolabtree.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Kolabtree"},"image":{"@id":"https:\/\/www.kolabtree.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/kolabtree","https:\/\/twitter.com\/kolabtree","https:\/\/instagram.com\/kolabtree","https:\/\/www.linkedin.com\/company\/kolabtree","https:\/\/en.m.wikipedia.org\/wiki\/Kolabtree"]},{"@type":"Person","@id":"https:\/\/www.kolabtree.com\/blog\/#\/schema\/person\/81992f5863a1b06d132a47822e7b4400","name":"Ramya Sriram","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.kolabtree.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8100b45c960ebbbbe420e8b3f250515f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8100b45c960ebbbbe420e8b3f250515f?s=96&d=mm&r=g","caption":"Ramya Sriram"},"description":"Ramya Sriram manages digital content and communications at Kolabtree (kolabtree.com), the world's largest freelancing platform for scientists. She has over a decade of experience in publishing, advertising and digital content creation.","url":"https:\/\/www.kolabtree.com\/blog\/fr\/author\/ramyas\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/posts\/7606"}],"collection":[{"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/comments?post=7606"}],"version-history":[{"count":2,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/posts\/7606\/revisions"}],"predecessor-version":[{"id":7611,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/posts\/7606\/revisions\/7611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/media\/7609"}],"wp:attachment":[{"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/media?parent=7606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/categories?post=7606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kolabtree.com\/blog\/fr\/wp-json\/wp\/v2\/tags?post=7606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}