You are on page 1of 8

ARTIFICIAL

INTELLIGENCE IN
Cyber Security
NAME- RITESH RAJENDRA DHUMAL ROLL NO-101
MANOJ DILIP KALAMBE ROLL NO-110
DIV- B
SUB- CYBER SECURITY
Artificial Intelligence

ARTIFICIAL INTELLIGENCE OR AI IS THE INTELLIGENCE SHOWN BY MACHINES. WHEN


ANY MACHINE BECOMES AWARE OF ITS SURROUNDINGS AND DOES SOMETHING
KEEPING THAT IN MIND IN ORDER TO ACHIEVE SOMETHING. USUALLY THE TERM
ARTIFICIAL INTELLIGENCE IS USED WHEN A MACHINE BEHAVES LIKE A HUMAN IN
ACTIVITIES SUCH AS PROBLEM SOLVING OR LEARNING, WHICH IS ALSO KNOWN AS
MACHINE LEARNING. AI IS A SCIENCE AND TECHNOLOGY BASED ON DISCIPLINES
SUCH AS: COMPUTER SCIENCE, ENGINEERING, PSYCHOLOGY ETC.
 THE MAIN GOAL OF ARTIFICIAL INTELLIGENCE IS TO CREATE A TECHNOLOGY THAT
ALLOWS COMPUTERS AND MACHINES TO FUNCTION IN AN INTELLIGENT MANNER.
THE ENTIRE PROBLEM HAS BEEN BROKEN DOWN INTO THE FOLLOWING SUB-
PROBLEMS.
 LEARNING
 NATURAL LANGUAGE PROCESSING
 REASONING AND PROBLEM SOLVING
 PLANNING
 CREATIVITY
Cyber Security

CYBER-SECURITY IS THE PRACTICE OF DEFENDING COMPUTERS, SERVERS,MOBILE


DEVICES, ELECTRONIC SYSTEMS, NETWORKS, AND DATA FROM MALICIOUS ATTACKS.
IT'S ALSO KNOWN AS INFORMATION TECHNOLOGY SECURITY OR ELECTRONIC
INFORMATION SECURITY. THE TERM APPLIES IN A VARIETY OF CONTEXTS, FROM
BUSINESS TO MOBILE COMPUTING, AND CAN BE DIVIDED INTO A FEW COMMON
CATEGORIES.
 NETWORK SECURITY IS THE PRACTICE OF SECURING A COMPUTER NETWORK
FROM INTRUDERS, WHETHER TARGETED ATTACKERS OR OPPORTUNISTIC
MALWARE.
 INFORMATION SECURITY PROTECTS THE INTEGRITY AND PRIVACY OF DATA, BOTH
IN STORAGE AND IN TRANSIT.DISASTER RECOVERY AND BUSINESS CONTINUITY
DEFINE HOW AN ORGANIZATION RESPONDS TO A CYBER-SECURITY INCIDENT OR
ANYOTHER EVENT THAT CAUSES THE LOSS OF OPERATIONS OR DATA.
 DISASTER RECOVERY POLICIES DICTATE HOW THE ORGANIZATION RESTORES ITS
OPERATIONS AND INFORMATION TO RETURN TO THE SAME OPERATING CAPACITY
AS BEFORE THE EVENT. BUSINESS CONTINUITY IS THE PLAN THE ORGANIZATION
FALLS BACK ON WHILE TRYING TO OPERATE WITHOUT CERTAIN RESOURCES.
Artificial Intelligence for Cyber
security
 The next generation of cyber security products are increasingly
incorporating Artificial Intelligence (AI) and Machine Learning (ML)
technologies. By training Al software on large datasets of cyber
security, network, and even physical information, cyber security
solutions providers aim to detect and block abnormal behavior.
 There are different approaches to using Al for cyber security, and it
is important first to determine which is appropriate for the
organization. Some software applications analyze raw network data
to spot an irregularity, while others focus on user/asset/entity
behavior to detect patterns that deviate from normal. The types of
data streams, how they are collected, and the level of effort
needed by analysts all vary by approach.
 Cyber security solutions utilizing Al and ML can greatly reduce the
amount of time needed for threat detection and incident response,
often being able to alert IT staff of anomalous behavior in real time.
These technologies also help reduce and prioritize traditional security
alerts, increasing the efficacy of existing investments and human
analysts.
 Attackers are also using Al and ML to better understand their targets
and launch attacks. Al increases the ability of defenders to identi
identify attacks, but it may also help hackers learn about a target's
vulnerabilities.
Which types of artificial intelligence
applications are being used in
cyber security solutions?
It is up to human imagination. For the sake of clarity, following
application categories can be examined:
 Spam Filter Applications (spam assassin)
 Network Intrusion Detection and Prevention
 Fraud detection
 Credit scoring and next-best offers
 Botnet Detection
 Secure User Authentication
 Cyber security Ratings
 Hacking Incident Forecasting
Advantages of Artificial Intelligence

 Organizations face millions of threats each day making is impossible for


security researcher to analyze and categorize them. This task can be
done by using Machine Learning in an efficient way.
 By finding a way to work towards unsupervised and supervised machine
learning will enable us to fully utilize our current knowledge of threats
and vectors. Once those are combined with the ability to detect new
attacks and discover new vulnerabilities, our systems will be able to
protect us from threats is a much better and efficient way.
 Another benefit of using Al based machines is that, in theory, these
systems would work in a more calculated approach and in a more
accurate way resulting in eliminating human error. Additionally, these
systems could work simultaneously on various tasks, monitoring and
protecting a vast number of devices and systems. They can therefore
mitigate large scale attacks
Disadvantages of Artificial
Intelligence
 The biggest disadvantage of any Al based system is that we cannot
predict what it'll do. If fallen into the wrong hands, the result could
be fatal and a whole different level can could do more damage
than good.
 A super-intelligent Al will be really good at completing goals, but, if
those goals aren't aligned with ours, we'll have a problem. Al in
security systems had foregone the utilization of valuable analyst skills
and therefore didn't benefit from human feedback.
 Even though the initial concerns about the development on Al in
cyber security may revolve around concerns about eliminating the
much needed human expertise, intuition and judgment, the real
disadvantage of artificial intelligence is its unpredictability.

You might also like