AI, Cybersecurity and Public Policy
AI, Cybersecurity and Public Policy
AI, Cybersecurity and Public Policy
SCOPE OF PRESENTATION
4. Cybersecurity
5. Conclusion
WHAT IS DIGITAL TRANSFORMATION?
INTERNET-OF-THINGS (IOT)
BLOCK CHAIN
CLOUD COMPUTING
5G
DEPLOYMENT OF DIGITAL TECHNOLOGIES
• Commercial companies.
• Sectors :
• Banking and Finance
• Transport
• Logistics
• Health Care
• Education
• Energy
• Water
• Defence
• Government
SMART CITIES, SMART NATIONS
Cities, districts, provinces and nation states now want to
reap the benefits of digitalization for their communities.
A smart city uses information and communication Smart cities use IoT devices such as connected
technology (ICT) to improve operational efficiency, sensors, lights, and meters to collect and analyze
share information with the public and provide a better data. The cities then use this data to improve
quality of government service and citizen welfare. ... infrastructure, public utilities and services, and more.
The value lies in how this technology is used rather than
simply how much technology is available.
• Connected computers.
• Standard and protocols established.
• Pave the way for communications between computers.
• First application - email.
• Gradually other commercial applications were developed riding on the Internet.
• Who governs the Internet?
• Who runs the Internet? Who is co-ordinating the activities in cyberspace?
• Largely a system running on trust without any top-down co-ordination.
• Hence, there are risks associated with being on the Internet.
• Biggest risk facing important users such as government and companies is cybersecurity.
CHALLENGE OF DIGITALIZATION
• Countries and commercial companies want to harness the benefits of emerging digital technologies.
• The Covid-19 pandemic has made this an imperative – a must have and not good to have.
INTELLIGENCE
• Search engines, shopping, digital assistants, astronomy.
• Fraud detection to climate change.
• Governance.
• Legal Liability
DEPLOYME
Limited Risk Specific transparency obligations. For example user should
be aware that you are interacting with a machine.
NT (2020)
Minimal Risk Free use of AI applications like video games or spam filters.
Scope Covers all generations of AI applications. Burden on AI
providers in the EU irrespective of where the provider is
located.
Prohibitions Physical or psychological harm, Exploitative especially of
vulnerable groups, Social scoring for general purposes by
public authorities, Real-time biometric identification systems
in public.
EC AI REGULATIONS FOR HIGH RISK APPLICATIONS
• Take a human-over-the-loop approach : Engineers would only review the product batches that were
flagged out by the AI model as high risk
• Engineers able to prioritize their inspection, focus on high-risk product batches and make the final
judgement call on whether to release the batches for sale into the market.
• Team worked to ensure that the datasets used to train the AI model are as representative as possible
of the intended population in order to reduce inherent bias.
• Team walked together with engineers to ensure a common understanding of the datasets used to develop
the AI solution.
• Team also shared a detailed and modularized code with accompanying documentation in a final repository
for accountability purposes.
1. EXAMPLE OF AI DEPLOYMENTS – IBM MFG SOLNS
• Two key evaluation metrics are used to determine the performance of the AI
model:
• Time saved for IBM QA engineers — The prediction model was able to
identify products that had high risks of defects and reduce the average
time of 30 minutes spent by QA engineers to just few minutes.
• Better detection of product defects and assurance of quality products for sale
will lead to greater customer satisfaction and confidence.
2. EXAMPLE OF AI DEPLOYMENTS - RENALTEAM
• Collaborated with AI Singapore to develop an AI solution to help its trained nurses who carry out
dialysis treatment for patients.
• Aim is to predict hospitalization risk of the patients. Hospitalization means the patient has
advanced kidney failure.
• Team jointly agreed to adopt a human-in-the-loop decision-making approach, where the trained
nurses would make the final call on whether to proceed with the AI solution’s recommendation.
• RenalTeam’s nurses can use the AI model as a support tool for a second opinion.
• Final decision on whether a patient should be hospitalized still lies with the trained nurses.
2. EXAMPLE OF AI DEPLOYMENTS - RENALTEAM
• Patients’ data were anonymized before being used to train the AI
model.
• Over the period of one month, the nurses assessed their patients,
made their own predictions and recorded them down.
• At the end of the month, AISG used the same patients’ data and ran
them through the AI model.
Whereas security related to the protection recovery policies and activities, including
which includes systems security, network
security and application and information computer network operations, information
security.
assurance, law enforcement.
Cybersecurity Goals – “CIA”
Web-Based Attacks
System-Based Attack
1.Injection Attacks
1. Virus
2. DNS Spoofing
3. Session Hijacking 2. Worms
4. Phishing 3. Trojan Horse
5. Brute Force
4. Backdoors
6. Denial of Service
7. Dictionary Attacks 5. Bots
8. URL Interpretation
9. File Inclusion Attack
10. Man-in-the-Middle Attack
Examples of Cyber Attacks
Examples : SolarWinds cybersecurity breach in the
US
• As the Internet access becomes more pervasive, and more people spends more time on the
web, there number of attacker grows as well.
Cybersecurity Goals
Backups
CheckSums
Physical Protection
Data Correcting Codes
Computational Redundancies
• Expect intrusions – “Intrusion tolerance”. • Plan for technology or equipment failure or loss from
• Capacity to work under degraded conditions. adverse events, both natural and human-caused.
• Ability to recover quickly. • Evaluate potential risks in evaluating to move forward
• Adapt and learn. with the project.
• Identify the impact of and prepare for changes in the
enterprise environment.
Security-by-Design • Anticipate and reduce the effect of harmful results
occurred from adverse events.
• Security is placed at the front.
• Not a control function.
• Design against future attacks. Integrate Across All Processes
• Seeks to inspect security in.
• Pervasive.
• Embedded in all processes.
• Everyone’s responsibility.
Cybersecurity : Critical Infrastructures
• Critical infrastructures (CI) can be defined as :
• systems that are so vital to a nation that their incapacity or destruction would have
a debilitating effect on national security, the economy, or public health and safety.
• underlying sectors that run our modern-day civilization, ranging from agriculture to
food distribution to banking, health-care, transportation, water and power.
• each of these once stood apart but are now all bound together and linked into
cyberspace via information technology.
• And most countries have defined their own CI depending on their national context; in
most cases, these include both core Internet and, more widely, ICT infrastructures
(such as telecommunications networks), and transport, energy, and other key
infrastructures that are more and more relying on ICTs
Critical Information Infrastructure (CII)
11. Media
10. Telecommunications
Cybersecurity Policy
Strengthening International
Creating a Safer Cyberspace Partnerships
• working closely with agencies to combat • spanning international and regional
cybercrime, cooperation,
• enhance Singapore’s standing as a trusted hub, • capacity building, and
and • exchanges on issues such as norms and
• promote collective responsibility; legislation.
Critical Information Infrastructure (CII) – 3-Tiered Model
National level, CSA sets :
• cybersecurity policies and standards,
• ensure compliance, and
• coordinate incident response to cyber incidents.
Sectoral level, :
• CSA works closely with the sector leads of the 11 key CII sectors.
• Sector leads will work with their respective operators on policy formulation,
and to manage operational response and encourage reporting of incidents;
Ground level,
• the individual organisations are responsible for incident response and recovery.
Example : Sector Leads and Members
• Clear incentives.
Engagements – Regional, International
Engagements for Cybersecurity at ASEAN
• Hosts the annual Singapore International Cyber Week (SICW), started in 2016.
• A rules-based order would give all states, big or small, the confidence,
predictability and stability that is essential for economic progress, job
creation and technology adoption.
COMMITMENT TO A RULES-BASED ORDER
Q&A
Thank you.