Skip main navigation

New offer! Get 30% off your first 2 months of Unlimited Monthly. Start your subscription for just £35.99 £24.99. New subscribers only T&Cs apply

Find out more

Artificial Intelligence (AI)

In this video, you learn about artificial intelligence (AI) as a significant trend in IdAM.
7.1
Identity and access management in artificial intelligence. So we see artificial intelligence used in some biometric services already. A Chinese businesswoman was accused of jaywalking after an artificial intelligence camera spotted her face on an advert for a bus. This is a camera based system, automated, using AI to match biometric templates. UEBA is a term coined by Gartner, User and Entity Behaviour Analytics. Big data platforms are increasingly using user behaviour analytics by the analysis of huge amounts of data. And this allows the detection of, or this supports, the detection of insider threats and advanced persistent threats. We start to see things like keyboard analytics in use as part of an authorization process. So you authenticate to a solution.
70
You have an authorization model in place. And some of these AI systems now can start to learn heuristically, over time, how you use a keyboard. And if you type in a different way, we will type slightly differently. If you type in a different way, it flags a concern. So this kind of adaptive pattern based approach, this pattern recognition, is increasing massively. Machine learning and artificial intelligence, very, very strong development areas at the moment. So these provide a form of ongoing authorization that is process based on anomaly detection. For these to be effective, they have to build a profile of behaviour first, either based on a standard user, or more commonly based on individual user patterns.
121.8
And you do have the potential for disruption through false positives, as we said, at the start, the identification of a poster rather than actually of the individual. So things like face recognition, and with internet of things and mobile voice recognition, and adaptive authentication, all of these become much more fluid as an authentication and an authorization model. We see over time this developing and providing a much more, much more dynamic approach for each of those services, authentication and authorization.

In this video, you learn about artificial intelligence (AI) as a significant trend in IdAM.

AI is already being used in some services, such as face recognition, and will likely continue to grow as a trend. From an IdAM perspective, AI can be used to process behavior that can help to detect system threats.

Reflect and share: Are you currently using AI in your context? If yes, how? If no, how would you envision using it? Share in the comments below.

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now