SlideShare une entreprise Scribd logo
1  sur  19
Cyber Security
IN ARTIFICIAL INTELLIGENCE
Artificial Intelligence
ARTIFICIAL INTELLIGENCE OR AI IS THE INTELLIGENCE SHOWN BY
MACHINES. WHEN ANY MACHINE BECOMES AWARE OF ITS SURROUNDINGS
AND DOES SOMETHING KEEPING THAT IN MIND IN ORDER TO ACHIEVE
SOMETHING. USUALLY THE TERM ARTIFICIAL INTELLIGENCE IS USED WHEN A
MACHINE BEHAVES LIKE A HUMAN IN ACTIVITIES SUCH AS PROBLEM
SOLVING OR LEARNING, WHICH IS ALSO KNOWN AS MACHINE LEARNING. AI
IS A SCIENCE AND TECHNOLOGY BASED ON DISCIPLINES SUCH AS:
COMPUTER SCIENCE, ENGINEERING, PSYCHOLOGY ETC.
THE MAIN GOAL OF ARTIFICIAL INTELLIGENCE IS TO CREATE A TECHNOLO GY
THAT ALLOWS COMPUTERS AND MACHINES TO FUNCTION IN AN
INTELLIGENT MANNER. THE ENTIRE PROBLEM HAS BEEN BROKEN DOWN
INTO THE FOLLOWING SUB-PROBLEMS
· LEARNING
· NATURAL LANGUAGE PROCESSING
· REASONING AND PROBLEM SOLVING
· PLANNING
· CREATIVITY
Cyber Security
CYBER-SECURITY IS THE PRACTICE OF DEFENDING COMPUTERS, SERVERS,
MOBILE DEVICES, ELECTRONIC SYSTEMS, NETWORKS, AND DATA FROM
MALICIOUS ATTACKS. IT'S ALSO KNOWN AS INFORMATION TECHNOLOGY
SECURITY OR ELECTRONIC INFORMATION SECURITY. THE TERM APPLIES IN
A VARIETY OF CONTEXTS, FROM BUSINESS TO MOBILE COMPUTING, AND
CAN BE DIVIDED INTO A FEW COMMON CATEGORIES.
• NETWORK SECURITY IS THE PRACTICE OF SECURING A COMPUTER
NETWORK FROM INTRUDERS, WHETHER TARGETED ATTACKERS OR
OPPORTUNISTIC MALWARE.
• INFORMATION SECURITY PROTECTS THE INTEGRITY AND PRIVACY OF
DATA, BOTH IN STORAGE AND IN TRANSIT.
• DISASTER RECOVERY AND BUSINESS CONTINUITY DEFINE HOW AN
ORGANIZATION RESPONDS TO A CYBER-SECURITY INCIDENT OR ANY
OTHER EVENT THAT CAUSES THE LOSS OF OPERATIONS OR DATA.
DISASTER RECOVERY POLICIES DICTATE HOW THE ORGANIZATION
RESTORES ITS OPERATIONS AND INFORMATION TO RETURN TO THE
SAME OPERATING CAPACITY AS BEFORE THE EVENT. BUSINESS
CONTINUITY IS THE PLAN THE ORGANIZATION FALLS BACK ON WHILE
TRYING TO OPERATE WITHOUT CERTAIN RESOURCES.
The scale of the cyber threat
The U.S. government spends $19 billion per year on cyber-security but warns that
cyber-attacks continue to evolve at a rapid pace.To combat the proliferation of
malicious code and aid in early detection, the National Institute of Standards and
Technology (NIST)recommends continuous, real-time monitoring of all electronic
resources.
• The threats countered by cyber-security are three-fold:
• 1. Cybercrime includes single actors or groups targeting systems for financial
gain or to cause disruption.
• 2. Cyber attack often involves politically motivated information gathering.
• 3. Cyber terror is intended to undermine electronic systems to cause panic or
fear.
Common methods attackers use to control computers or networks include viruses,
worms, spyware,Trojans, and Ransom ware.Viruses and worms can self-replicate
and damage files or systems, while spyware andTrojans are often used for
surreptitious data collection. Ransom ware waits for an opportunity to encrypt all
the user’s information and demands payment to return access to the user.
Malicious code often spreads via an unsolicited email attachment or a legitimate-
looking download that actually carries a malware payload.
Cyber-security threats affect all industries, regardless of size.The industries that
reported the most cyber attacks in recent years are healthcare, manufacturing,
finance, and government. Some of these sectors are more appealing to
cybercriminals because they collect financial and medical data, but all businesses
that use networks can be targeted for customer data, corporate espionage, or
customer attacks.
Artificial Intelligence for Cyber security
• The next generation of cyber security products are increasingly incorporating
Artificial Intelligence (AI) and Machine Learning (ML) technologies. By training
AI software on large datasets of cyber security, network, and even physical
information, cyber security solutions providers aim to detect and block
abnormal behavior.
• There are different approaches to using AI for cyber security, and it is
important first to determine which is appropriate for the organization. Some
software applications analyze raw network data to spot an irregularity, while
others focus on user/asset/entity behavior to detect patterns that deviate from
normal.The types of data streams, how they are collected, and the level of
effort needed by analysts all vary by approach.
Artificial Intelligence for Cyber security
• Cyber security solutions utilizing AI and ML can greatly reduce the amount of
time needed for threat detection and incident response, often being able to
alert IT staff of anomalous behavior in real time.These technologies also help
reduce and prioritize traditional security alerts, increasing the efficacy of
existing investments and human analysts.
• Attackers are also using AI and ML to better understand their targets and
launch attacks. AI increases the ability of defenders to identify attacks, but it
may also help hackers learn about a target’s vulnerabilities.
Which types of artificial intelligence
applications are being used in cyber security
solutions?
It is up to human imagination. For the sake of clarity, following application categories
can be examined:
• Spam Filter Applications (spam assassin)
• Network Intrusion Detection and Prevention
• Fraud detection
• Credit scoring and next-best offers
• Botnet Detection
• Secure User Authentication
• Cyber security Ratings
• Hacking Incident Forecasting
How can an artificial intelligence application
that does malware analysis be used?
It’s possible to detect a software whether is a Malware or a normal software with
artificial intelligence. In order to develop an artificial intelligence application that
does malware detection the first thing to do is to determine some distinctive
features. In addition of some harmless software and some malware to those
features, the system is trained.
Here are some features to use in analyzation of a software:
• Accessed APIs.
• Accessed fields on the disk.
• Accessed environmental products (camera, keyboard etc.)
How can an artificial intelligence application
that does malware analysis be used?
• Consumed processor power.
• Consumed bandwidth.
• Amount of data transmitted over the internet.
By using the distinguished features, the system is built. Once you give a test
software to the system, it tries to detect whether the software is a malware or
not by analyzing these distinguished features.
Is artificial intelligence(AI) used to detect cyber
attacks, how is its success rate?
Of courseAI can be used to detect cyber attacks.There are plenty of academic
researches about detecting cyber attacks using artificial intelligence. The
success rate of those researches varies between 85% and 99%.
In the last few years, in addition to academic researches, some products have
been improved to detect cyber attacks with the help of artificial intelligence like
DarkTrace. DarkTrace claims to have more than 99% of success rate and it also
has a very low rate of false positives.
Are there any companies that develop cyber
security applications using artificial
intelligence?
There are lots of companies that develop cyber security applications by using
artificial intelligence. The companies that started early focusing on this domain
started worthing more in a very short time. Here are the example.
Dark trace, the company that was founded in 2013, developed a product that
does anomaly detection on a network with machine learning.The company is
now worth 825 million$. CYLANCE, the company that was founded in 2012,
developed a product to prevent advanced level of cyber threats.The company is
worth 1 billion $ now.
Examples of the machine learning algorithms
which are being used to develop cyber security
applications
Spam assassin, for instance, is a project that is an open source code and it does
spam mail filtering. Spam assassin makes a feature list in order to control if an
email is a spam mail or not. Extracted features from an analyzed email is
processed with Naive Bayes algorithm.The most common algorithms in cyber
attack systems are, Random Forest, DecisionTree, SupportVector Machines etc.
In the last few years, the most commonly used machine learning algorithm is
without a doubt, Deep Learning algorithm. Deep learning is a machine learning
algorithm that uses artificial neural networks. Nowadays, most of the companies
that do artificial intelligence researchers use this method.
Is it possible to detect cyber attacks before
they happen?
In order for a cyber attack to be successful, there are some steps to follow
successfully.These steps are called “Cyber Kill Chain”. Attackers might leave
some traces in some of these steps or they can access information about the
targeted company that was leaked before, while they’re in information
acquisition phase. We can see similar situations like this one. Preventing these
kind of situations is only possible if you observe your company constantly with
the eyes of an attacker. In addition to that, knowing what the attackers can find
when they do their research about your company beforehand, and as a result,
taking precautions prevents these situations.
Norm shield Cyber Risk Scorecard, scans most of the information about your
company, that can be accessed via internet.
Some of the information that can be accessed about your company are:
• Posts that target your company in dark forums or social media.
• Leaked information about your company’s customers and employees. (e-mail,
passwords, credit card information etc.)
• Phish website, mobile and desktop applications about your company.
If you know your virtual existence well and can manage it, you can reduce the
risk of being affected from a cyber attack. Cyber Risk Scorecard, gives you the
possibility to access information about your company from various sources and
lets you manage that data which results to taking precautions.
Advantages of Artificial Intelligence
• Organizations face millions of threats each day making is impossible for
security researcher to analyze and categorize them.This task can be done by
using Machine Learning in an efficient way.
• By finding a way to work towards unsupervised and supervised machine
learning will enable us to fully utilize our current knowledge of threats and
vectors. Once those are combined with the ability to detect new attacks and
discover new vulnerabilities, our systems will be able to protect us from threats
is a much better and efficient way.
• Another benefit of using AI based machines is that, in theory, these systems
would work in a more calculated approach and in a more accurate way
resulting in eliminating human error. Additionally, these systems could work
simultaneously on various tasks, monitoring and protecting a vast number of
devices and systems.They can therefore mitigate large scale attacks
Disadvantages of Artificial Intelligence
• The biggest disadvantage of any AI based system is that we cannot predict
what it’ll do. If fallen into the wrong hands, the result could be fatal and a
whole different level can could do more damage than good.
• A super-intelligent AI will be really good at completing goals, but, if those
goals aren’t aligned with ours, we’ll have a problem. AI in security systems had
foregone the utilization of valuable analyst skills and therefore didn’t benefit
from human feedback.
• Even though the initial concerns about the development on AI in cyber security
may revolve around concerns about eliminating the much needed human
expertise, intuition and judgment, the real disadvantage of artificial
intelligence is its unpredictability.
ThankYou

Contenu connexe

Tendances

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Top 10 Applications Of Artificial Intelligence | Edureka
Top 10 Applications Of Artificial Intelligence | EdurekaTop 10 Applications Of Artificial Intelligence | Edureka
Top 10 Applications Of Artificial Intelligence | EdurekaEdureka!
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An OverviewGiri Dharan
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentationsweety seth
 
The Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceThe Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceErling Hesselberg
 
Future of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxFuture of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxGreg Makowski
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityPratap Dangeti
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsZoneFox
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceSai Nath
 
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022Bernard Marr
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 

Tendances (20)

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Top 10 Applications Of Artificial Intelligence | Edureka
Top 10 Applications Of Artificial Intelligence | EdurekaTop 10 Applications Of Artificial Intelligence | Edureka
Top 10 Applications Of Artificial Intelligence | Edureka
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An Overview
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
AI in security
AI in securityAI in security
AI in security
 
The Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceThe Top Trends in Artificial Intelligence
The Top Trends in Artificial Intelligence
 
Future of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxFuture of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptx
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Machine Learning and Artificial Intelligence
Machine Learning and Artificial IntelligenceMachine Learning and Artificial Intelligence
Machine Learning and Artificial Intelligence
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 

Similaire à Cyber security with ai

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 

Similaire à Cyber security with ai (20)

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
How AI can help with cybersecurity
How AI can help with cybersecurityHow AI can help with cybersecurity
How AI can help with cybersecurity
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 

Plus de Burhan Ahmed

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communicationBurhan Ahmed
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductBurhan Ahmed
 
Software house organization
Software house organizationSoftware house organization
Software house organizationBurhan Ahmed
 
Social interaction
Social interactionSocial interaction
Social interactionBurhan Ahmed
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activitiesBurhan Ahmed
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devicesBurhan Ahmed
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applicationsBurhan Ahmed
 
Operator overloading
Operator overloadingOperator overloading
Operator overloadingBurhan Ahmed
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job designBurhan Ahmed
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyBurhan Ahmed
 

Plus de Burhan Ahmed (20)

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Virtual function
Virtual functionVirtual function
Virtual function
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Trees
TreesTrees
Trees
 
Topology
TopologyTopology
Topology
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
 
Software house organization
Software house organizationSoftware house organization
Software house organization
 
Social interaction
Social interactionSocial interaction
Social interaction
 
Role model
Role modelRole model
Role model
 
Rights and duties
Rights and dutiesRights and duties
Rights and duties
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activities
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devices
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
 
Normalization
NormalizationNormalization
Normalization
 
Managing strategy
Managing strategyManaging strategy
Managing strategy
 
Letter writing
Letter writingLetter writing
Letter writing
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job design
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 

Dernier

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 

Dernier (20)

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 

Cyber security with ai

  • 1.
  • 3. Artificial Intelligence ARTIFICIAL INTELLIGENCE OR AI IS THE INTELLIGENCE SHOWN BY MACHINES. WHEN ANY MACHINE BECOMES AWARE OF ITS SURROUNDINGS AND DOES SOMETHING KEEPING THAT IN MIND IN ORDER TO ACHIEVE SOMETHING. USUALLY THE TERM ARTIFICIAL INTELLIGENCE IS USED WHEN A MACHINE BEHAVES LIKE A HUMAN IN ACTIVITIES SUCH AS PROBLEM SOLVING OR LEARNING, WHICH IS ALSO KNOWN AS MACHINE LEARNING. AI IS A SCIENCE AND TECHNOLOGY BASED ON DISCIPLINES SUCH AS: COMPUTER SCIENCE, ENGINEERING, PSYCHOLOGY ETC. THE MAIN GOAL OF ARTIFICIAL INTELLIGENCE IS TO CREATE A TECHNOLO GY THAT ALLOWS COMPUTERS AND MACHINES TO FUNCTION IN AN INTELLIGENT MANNER. THE ENTIRE PROBLEM HAS BEEN BROKEN DOWN INTO THE FOLLOWING SUB-PROBLEMS · LEARNING · NATURAL LANGUAGE PROCESSING · REASONING AND PROBLEM SOLVING · PLANNING · CREATIVITY
  • 4. Cyber Security CYBER-SECURITY IS THE PRACTICE OF DEFENDING COMPUTERS, SERVERS, MOBILE DEVICES, ELECTRONIC SYSTEMS, NETWORKS, AND DATA FROM MALICIOUS ATTACKS. IT'S ALSO KNOWN AS INFORMATION TECHNOLOGY SECURITY OR ELECTRONIC INFORMATION SECURITY. THE TERM APPLIES IN A VARIETY OF CONTEXTS, FROM BUSINESS TO MOBILE COMPUTING, AND CAN BE DIVIDED INTO A FEW COMMON CATEGORIES. • NETWORK SECURITY IS THE PRACTICE OF SECURING A COMPUTER NETWORK FROM INTRUDERS, WHETHER TARGETED ATTACKERS OR OPPORTUNISTIC MALWARE. • INFORMATION SECURITY PROTECTS THE INTEGRITY AND PRIVACY OF DATA, BOTH IN STORAGE AND IN TRANSIT. • DISASTER RECOVERY AND BUSINESS CONTINUITY DEFINE HOW AN ORGANIZATION RESPONDS TO A CYBER-SECURITY INCIDENT OR ANY OTHER EVENT THAT CAUSES THE LOSS OF OPERATIONS OR DATA. DISASTER RECOVERY POLICIES DICTATE HOW THE ORGANIZATION RESTORES ITS OPERATIONS AND INFORMATION TO RETURN TO THE SAME OPERATING CAPACITY AS BEFORE THE EVENT. BUSINESS CONTINUITY IS THE PLAN THE ORGANIZATION FALLS BACK ON WHILE TRYING TO OPERATE WITHOUT CERTAIN RESOURCES.
  • 5. The scale of the cyber threat The U.S. government spends $19 billion per year on cyber-security but warns that cyber-attacks continue to evolve at a rapid pace.To combat the proliferation of malicious code and aid in early detection, the National Institute of Standards and Technology (NIST)recommends continuous, real-time monitoring of all electronic resources. • The threats countered by cyber-security are three-fold: • 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. • 2. Cyber attack often involves politically motivated information gathering. • 3. Cyber terror is intended to undermine electronic systems to cause panic or fear.
  • 6. Common methods attackers use to control computers or networks include viruses, worms, spyware,Trojans, and Ransom ware.Viruses and worms can self-replicate and damage files or systems, while spyware andTrojans are often used for surreptitious data collection. Ransom ware waits for an opportunity to encrypt all the user’s information and demands payment to return access to the user. Malicious code often spreads via an unsolicited email attachment or a legitimate- looking download that actually carries a malware payload. Cyber-security threats affect all industries, regardless of size.The industries that reported the most cyber attacks in recent years are healthcare, manufacturing, finance, and government. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.
  • 7. Artificial Intelligence for Cyber security • The next generation of cyber security products are increasingly incorporating Artificial Intelligence (AI) and Machine Learning (ML) technologies. By training AI software on large datasets of cyber security, network, and even physical information, cyber security solutions providers aim to detect and block abnormal behavior. • There are different approaches to using AI for cyber security, and it is important first to determine which is appropriate for the organization. Some software applications analyze raw network data to spot an irregularity, while others focus on user/asset/entity behavior to detect patterns that deviate from normal.The types of data streams, how they are collected, and the level of effort needed by analysts all vary by approach.
  • 8. Artificial Intelligence for Cyber security • Cyber security solutions utilizing AI and ML can greatly reduce the amount of time needed for threat detection and incident response, often being able to alert IT staff of anomalous behavior in real time.These technologies also help reduce and prioritize traditional security alerts, increasing the efficacy of existing investments and human analysts. • Attackers are also using AI and ML to better understand their targets and launch attacks. AI increases the ability of defenders to identify attacks, but it may also help hackers learn about a target’s vulnerabilities.
  • 9. Which types of artificial intelligence applications are being used in cyber security solutions? It is up to human imagination. For the sake of clarity, following application categories can be examined: • Spam Filter Applications (spam assassin) • Network Intrusion Detection and Prevention • Fraud detection • Credit scoring and next-best offers • Botnet Detection • Secure User Authentication • Cyber security Ratings • Hacking Incident Forecasting
  • 10. How can an artificial intelligence application that does malware analysis be used? It’s possible to detect a software whether is a Malware or a normal software with artificial intelligence. In order to develop an artificial intelligence application that does malware detection the first thing to do is to determine some distinctive features. In addition of some harmless software and some malware to those features, the system is trained. Here are some features to use in analyzation of a software: • Accessed APIs. • Accessed fields on the disk. • Accessed environmental products (camera, keyboard etc.)
  • 11. How can an artificial intelligence application that does malware analysis be used? • Consumed processor power. • Consumed bandwidth. • Amount of data transmitted over the internet. By using the distinguished features, the system is built. Once you give a test software to the system, it tries to detect whether the software is a malware or not by analyzing these distinguished features.
  • 12. Is artificial intelligence(AI) used to detect cyber attacks, how is its success rate? Of courseAI can be used to detect cyber attacks.There are plenty of academic researches about detecting cyber attacks using artificial intelligence. The success rate of those researches varies between 85% and 99%. In the last few years, in addition to academic researches, some products have been improved to detect cyber attacks with the help of artificial intelligence like DarkTrace. DarkTrace claims to have more than 99% of success rate and it also has a very low rate of false positives.
  • 13. Are there any companies that develop cyber security applications using artificial intelligence? There are lots of companies that develop cyber security applications by using artificial intelligence. The companies that started early focusing on this domain started worthing more in a very short time. Here are the example. Dark trace, the company that was founded in 2013, developed a product that does anomaly detection on a network with machine learning.The company is now worth 825 million$. CYLANCE, the company that was founded in 2012, developed a product to prevent advanced level of cyber threats.The company is worth 1 billion $ now.
  • 14. Examples of the machine learning algorithms which are being used to develop cyber security applications Spam assassin, for instance, is a project that is an open source code and it does spam mail filtering. Spam assassin makes a feature list in order to control if an email is a spam mail or not. Extracted features from an analyzed email is processed with Naive Bayes algorithm.The most common algorithms in cyber attack systems are, Random Forest, DecisionTree, SupportVector Machines etc. In the last few years, the most commonly used machine learning algorithm is without a doubt, Deep Learning algorithm. Deep learning is a machine learning algorithm that uses artificial neural networks. Nowadays, most of the companies that do artificial intelligence researchers use this method.
  • 15. Is it possible to detect cyber attacks before they happen? In order for a cyber attack to be successful, there are some steps to follow successfully.These steps are called “Cyber Kill Chain”. Attackers might leave some traces in some of these steps or they can access information about the targeted company that was leaked before, while they’re in information acquisition phase. We can see similar situations like this one. Preventing these kind of situations is only possible if you observe your company constantly with the eyes of an attacker. In addition to that, knowing what the attackers can find when they do their research about your company beforehand, and as a result, taking precautions prevents these situations.
  • 16. Norm shield Cyber Risk Scorecard, scans most of the information about your company, that can be accessed via internet. Some of the information that can be accessed about your company are: • Posts that target your company in dark forums or social media. • Leaked information about your company’s customers and employees. (e-mail, passwords, credit card information etc.) • Phish website, mobile and desktop applications about your company. If you know your virtual existence well and can manage it, you can reduce the risk of being affected from a cyber attack. Cyber Risk Scorecard, gives you the possibility to access information about your company from various sources and lets you manage that data which results to taking precautions.
  • 17. Advantages of Artificial Intelligence • Organizations face millions of threats each day making is impossible for security researcher to analyze and categorize them.This task can be done by using Machine Learning in an efficient way. • By finding a way to work towards unsupervised and supervised machine learning will enable us to fully utilize our current knowledge of threats and vectors. Once those are combined with the ability to detect new attacks and discover new vulnerabilities, our systems will be able to protect us from threats is a much better and efficient way. • Another benefit of using AI based machines is that, in theory, these systems would work in a more calculated approach and in a more accurate way resulting in eliminating human error. Additionally, these systems could work simultaneously on various tasks, monitoring and protecting a vast number of devices and systems.They can therefore mitigate large scale attacks
  • 18. Disadvantages of Artificial Intelligence • The biggest disadvantage of any AI based system is that we cannot predict what it’ll do. If fallen into the wrong hands, the result could be fatal and a whole different level can could do more damage than good. • A super-intelligent AI will be really good at completing goals, but, if those goals aren’t aligned with ours, we’ll have a problem. AI in security systems had foregone the utilization of valuable analyst skills and therefore didn’t benefit from human feedback. • Even though the initial concerns about the development on AI in cyber security may revolve around concerns about eliminating the much needed human expertise, intuition and judgment, the real disadvantage of artificial intelligence is its unpredictability.