Page 28 - The EDGE Spring 2024 WEB
P. 28

Cybersecurity Is a Classic Moving Target
          CONTINUED FROM PAGE 27




        Beyond this, schools house large amounts of sensitive  in  automated  content  generation,  for  example,  such
        student and faculty data. While other lines of defense  as essays and reports, or use AI to evade plagiarism
        are available, such as endpoint detection and response  detection. So how can schools incorporate AI to aid in
        (EDR)  tools,  firewalls,  intrusion  prevention  systems,  education while mitigating these risks? Here are just a
        and monitoring technologies, relying only on these can  few examples:
        leave gaps in an organization's cybersecurity. These
        tools, unlike a robust SOC, may not provide a holistic   • Allow the use of ChatGPT and other AI tools but
        view of the organization's security and may not be able    require students to acknowledge and document how
        to detect sophisticated or advanced threats.               they used them. For example, students could use
                                                                   ChatGPT to get feedback on their essay drafts and
        Catastrophic Cyber Risk                                    explain which of the tool’s suggestions they agreed
        Imagine waking up to a world where your internet-          with and didn’t.
        connected devices suddenly stop working. Your phone      • Create tasks that are a poor fit for AI capabilities,
        won’t make calls or send messages; there’s no Wi-Fi and    such as assignments about very recent news events,
        no TV. You’re left with no electronic communication        about the local community, or about a personal
        with the outside world.You soon discover that it isn’t     experience.
        just you; it’s your neighbors, too, and everyone else you   • Require students to complete assignments in class
        know.                                                      without the use of AI technology.
                                                                 • Create    project-based   learning   assignments
        This  scenario  highlights  potential  effects  of  a      that require hands-on participation, personal
        catastrophic  cyber  attack  (CAT).  A  CAT  refers  to  a   observation, and other forms of activity not easily
        highly damaging and widespread cyber incident that can     replicated by AI.4
        potentially disrupt critical services and infrastructure
        on  a  widespread  basis.  Unlike  more  familiar  risks,  It is important, too, to consider establishing and
        catastrophic cyber threats go beyond simple data  monitoring acceptable usage policies surrounding AI,
        breaches, potentially disrupting entire industries like  increasing the chances of its responsible integration in
        finance, health care, education, and government.       education.

        The insurance industry faces challenges in providing  Conclusion
        sufficient  coverage  for  these  large-  scale  events,  Cybersecurity  is  a  classic  moving  target,  with
        resulting in significant uncertainty. This highlights the  organizations often feeling like they’re playing catch-
        urgent need for next-level thinking and action, including  up.  Unfortunately,  thefuture  won’t  wait,  and  neither
        robust, coordinated contingency plans by potentially  will bad actors in the cyber world. The best way to
        affected entities to ensuretheir resilience and recovery  keep your school secure is to embrace that same ethic:
        in the event of an attack.                             constantly thinking about “the next thing” and making
                                                               sure you’ve taken all feasible steps to prepare for it.
        Artificial Intelligence (AI) Integration
        AI holds the potential to reshape learning experiences.
        However,  it  also  comes  with  risks.  One  notable   Wes Gates, Trust Cybersecurity Director, can be reached at:
        concern isstudent misuse. Individuals might  engage    wgates@the-trust.org



                                                                                                       |
        28                                                                               THE EDGE   SPRING 2024
   23   24   25   26   27   28   29   30   31   32   33