Mobile App Developer Progress Report

Position: Mobile app developer

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Skills

English-Business level speaking, reading, and writing.

Hindi-Basic speaking.

Python programming language

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

College level Microsoft office

EXPERIENCE

  • Assistant Manager, Oct 2020 – Aug 2021  ·
  • Provide customer service by greeting and assisting customers, and responding to customer inquiries and complaints.  ·
  • Hire, train, and evaluate personal in sales or marketing establishments, promoting or firing workers when appropriate.  ·
  • Confer with company officials to develop methods and procedures to increase sales, expand markets, and promote business.  ·
  • Plan and coordinate advertising campaigns and sales promotions, and prepare merchandise displays and advertising copy.
  • 1
    Cybersecurity and Artificial Intelligence
    Student’s Name
    Institutional Affiliation
    Course
    Professor’s Name
    Date
    2
    Abstract
    The paper’s primary purpose is to provide a concrete analysis of cybersecurity and
    artificial intelligence. It adopts the approach of elucidating all the existing cyber threats within
    the environment and institution the dangers that expose the computers and other electronic
    devices within the business and work environment. The types of cyber threats have been
    critically analyzed within the study, with a strict emphasis on the company’s impact. Some
    cyberthreats include malware, emotet, the man in the middle, denial of service, phishing, and
    many others. The paper then advances to the domains of cyber security that exist and the effect
    that the subject business enterprises towards. Classification of the existing cybersecurity threats
    has been exhibited and analyzed in a wide range. The impact of cybersecurity attacks has also
    been studied in the paper, with the main focus being on the business enterprises and the nation’s
    security. Artificial intelligence is also a significant element that has been widely analyzed in the
    paper, with a substantial focus on how it improves cybersecurity. The report concludes by
    providing an overview of the drawbacks of artificial intelligence within cybersecurity.
    3
    Cybersecurity and Artificial Intelligence
    Cybersecurity is the conduct of protecting critical systems and sensitive information from
    diverse digital and technological attacks. It is designated and composed of various measures
    implemented to regulate and prevent threats emerging on the established network systems and
    applications. Cybersecurity deals with diverse threats directed towards the systems of companies
    and other institutions across the globe. The practices embraced in cybersecurity entail the
    system’s complexity, which can be assembled based on diverse technologies. The cyber threats
    existing in the modern world have been increasing due to advanced technology within the globe.
    The measures to combat the threats should be initiated through cybersecurity techniques that
    focus on eliminating any cyber threats (Baranchk et al., 2018). Effective measures of control
    within the cybersecurity aspect towards eliminating the threats are Artificial Intelligence (AI)
    and machine learning. Artificial Intelligence is the ability of machines or computers to perform
    tasks usually conducted by human beings as they need intelligence and discernment to
    substantiate between discrete components. The paper provides a critical analysis of the nature of
    cybersecurity and artificial intelligence towards eliminating cyber threats.
    Types of Cybersecurity Threats
    There are diverse cyber threats that have been directed towards the modern technology of
    computers and other components that are software-related. The type of a cyber-attack depends on
    the nature of the computer and the type of software applications that are present on the
    designated computer. The threats are directed to a significant company due to specific and
    distinct intentions that are specific to the cybercriminals. The following are some of the cyber
    threats exhibited in the advanced technological era.
    Malware
    4
    It is the aspect of malicious software and contains variants that are dangerous to the
    computer system of a particular company as it possesses security loopholes. Malware consists of
    diverse variants: computer viruses, worms, and spyware. These variants are dangerous to the
    network system as they provide complete unauthorized access of strangers to a given network
    system within a company database or a personal device. The variants may also expose the whole
    system to extensive damage, which may be difficult to avoid. The current malware attacks that
    have been reported to cause harm to computer systems are lifeless and entail a unique design that
    escapes standard detection methods (Morris et al., 2021). The standard methods that have been
    put in place to establish tracks of the malware variants include antivirus tools, which scan and
    detect any malicious file attachments within the computer system. The current malware attacks
    have been designated to evade the standard detection methods, thus making it hard for
    companies to establish protection against cyber threats. The different types of malware include:
    Worms
    These are variants of the malware that are spread through the software vulnerabilities that
    exist within the computer system and may entail phishing attacks that are dangerous to the
    computer system’s health. When the worm infects the computer system, it commences increasing
    the infection to the whole computer. The worms that have infected the computer can result in the
    modification and deletion of files on the computers, injection of the malicious software,
    replication of themselves, and depletion of the system resources. And installation of the
    backdoor for hackers, thus posing a significant threat to the entire software system.
    Viruses
    Viruses are malware attacks that require an existing infected system in operation or a
    program to work effectively. The spread of viruses in the computer system follows their
    5
    attachment on an executable file or a document written in word format. Most of the viruses
    spread through websites, file sharing, and downloading email attachments. Once the virus
    contracts the computer system, it replicates vigorously, thus terminating the whole system. The
    replication of viruses on the computer is higher and occurs faster than the worms.
    Bots and Botnets
    A bot is a computer system that has been infected by malware and can be controlled
    remotely by hackers without the owner’s consent. It can be utilized by the designated hackers to
    launch more attacks (Nasir et al., 2021). The botnets assist the hackers with launching malicious
    activities like DDoS attacks, Keylogging, and spreading other types of malware.
    Trojan Horses
    It entails malicious programs that adopt the nature and operational function of the
    legitimate application. The trojan horse looks trustworthy, and users may download it,
    contemplating a legitimate application. The hackers may utilize the trojan horses to delete
    personal information of people and data on the computer, spy on an individual’s device, and gain
    access to the network of a designated individual.
    Emotet Malware
    It is one of the most dangerous malware that accelerates the cyber threats that most
    advanced technological systems face on the planet. The designated malware is majorly spread
    through the spam emails sent to the computer system from unknown senders. In the current
    world, they come in advertisements, thus prompting the destruction of most computers. Its
    infection in the computer may emerge through a malicious script, macro-enabled document files,
    or a link. The remote emails contain a similar branding design that resembles the legitimate
    email. Once the user clicks on the link, the designated device becomes affected by the malware,
    6
    thus affecting the entire computer system. The infection of the designated program aims to gain
    access to private data and sensitive information and data of people. The program deceives the
    basic antivirus programs which aim to protect the computer. Ince the antivirus has been
    deceived, the infection occurs to the computer smoothly, thus resulting in diverse complications.
    Denial of Service
    It is a cyber-attack directed to the computer network and meant to shut down the entire
    operation of the machine, thus making it inaccessible to its users. The attack is initiated by
    flooding the target system with excess traffic and sending data that ultimately stimulates the
    system’s crush. Most of these attacks target high profile individuals and companies that make
    more money and profits in the standard environmental setting (Razaque et al., 2021). The main
    aim of these kinds of attackers is to gain profit substantially. The most common flood attacks
    within the computer systems include buffer overflow threats, ICMP floods, and SYN floods. The
    flood attacks utilize a different dimension when launching an attack on the users within the
    computer system. The DoS attacks overwhelm the system of the designated or target company
    networks through a simple network management protocol (SNMP). The management protocol is
    utilized in modems, printers, routers, and servers, thus posing as the strategic point the hackers
    can target when launching the attack.
    Man in the Middle
    It is a cyber-attack that adopts a different perception scale and operational efficiency to
    the users. It occurs when the cybercriminal exhibits an interception and relays messages between
    two diverse parties to gain access and steal data that is crucial or sensitive to one of the parties
    involved in the act. When the incident occurs, the blame is left for one party when the hacker
    vanishes without any significant trace. Incidences of this kind occur when the users engage and
    7
    use unprotected Wi-Fi connections. In this case, it is easier for the hacker to intercept and bypass
    the data between the designated guest and the device network. It poses a significant risk to the
    privacy of data belonging to specific individuals within the society.
    Phishing
    It is one of the most common cybersecurity threats that have been on the verge of
    increasing in the modern world. It entails social engineering where users are tricked into
    providing their own PII and sensitive information. It utilizes the aspect of scamming the
    designated users through emails and text messages that appear legitimate from authentic
    companies requesting sensitive information. Some of the sensitive information requested in
    phishing include credit card data and login information regarding the user’s bank accounts
    (Tschider 2018). Most of the current cyber-attacks have been occurring in phishing, where users
    have been subjected to a wide range of scamming within society.
    SQL Injection Attack
    It is a cybersecurity vulnerability that allows the hacker to interfere with the application’s
    queries within its database. The attack occurs through the combination of data and codes in the
    dynamic SQL statement and error revelation. It results in various prompts like insufficient input
    validation, which calls up to the user to initiate additional information that might be dangerous to
    the operations of the designated computer system. It is a web-based attack that targets users
    across all the software systems. The execution of input data is affected by predefined SQL
    commands within the computer system.
    Password Attacks
    These are some of the most common cyber threats that have been exhibited in the modern
    technological world, thus resulting in the loss of privacy to information of individuals within the
    8
    designated accounts. The designated attacks entail diverse methods to authenticate into
    password-protected user accounts maliciously. The most common user attack methods used to
    obtain the passwords of individuals include brute-forcing, dictionary attacks, password spraying,
    and credential stuffing which results in the projection and access to password-protected accounts
    on the computer systems across the organization or the company.
    Cybersecurity Domains (Types)
    There are diverse cybersecurity domains that have been established based on the nature
    of the threats posed to specific systems across the globe. Strong cybersecurity technique utilizes
    a wide range of domains that can aid in the protection against cybersecurity threats. Some of the
    domains of cybersecurity include:
    Critical Infrastructure Security
    The security of the infrastructure is the main element of concern within the computer
    systems and networks that have been established in the environment. Infrastructure security
    entails the designated practices that aim to protect the existing computer systems, networks,
    other critical assets that the community depends on for national security, economic development
    and health (Reeves et al., 2021). The public safety of the citizens within any given nation is the
    priority. This can be enhanced by developing complex infrastructure that is elemental to the
    operations of the computer and the security mechanisms put in place. The cybersecurity
    framework stipulated by the national institute of standards and technology aims to provide
    support to the existing organizations in the area of cybersecurity. The approach mechanism is
    critical to the viability of the infrastructure and the denominations of the threats exposed to the
    computer systems and networks.
    9
    The security infrastructure should be extremely high to ensure that there is maximum
    protection against cybercriminals. Protection of the systems and networks should be given a
    higher priority when it comes to cyber threats since they are the ones that pose significant
    vulnerabilities within the environment. The operations of the designated networks in a
    continuous manner are necessary for the success and viability of the economy; thus, maximum
    effort should be exerted to ensure that there is protection against cyber criminals (Zeadally et al.,
    2020).
    Cybersecurity is a significant element that triggers the increase in the aspect of critical
    infrastructure for security since its implications and effects directly affect the economy of any
    given nation through sabotaging the operations of specific companies, which are highly
    productive and efficient for the operations of the nation. The effect of hackers may be realized
    when doctor-patient confidentiality is lost by exposing the medical records to the public. This
    will intentionally affect the health sector’s operations and the citizens’ public safety within any
    given nation.
    Application Security
    It is the domain of cybersecurity that entails helping the protection of applications that
    operate on the premises and within the cloud. The security of the applications should be
    developed and built inside the designated applications at specific stages. The security measures
    implemented in place will ensure safety for the data present in the applications and protect
    against any loopholes that can initiate backdoors within the software applications, resulting in
    possible hacking and stealing of crucial data. The installation of the security measures within the
    applications should be conducted to ensure the proper handling of information and authentication
    of the designated users. This will provide an easy way to protect information from cyber
    10
    criminals across the globe. Application security will enhance the aspect of maximum security to
    the vulnerabilities in the computer system, which can present an opportunity for the hackers to
    perform their actions towards the company data (Wiafe et al., 2020). It is crucial and essential
    that organizations and companies ensure that company data is secured first by increasing the
    security of applications on the computer network within the premises.
    Network Security
    Security of the network within any given company is also a crucial element that presents
    many possibilities for hackers to gain access to the server and database of the organization or a
    company. The designated companies need to initiate the protection of the network with highlevel security. A secure network ensures that there are significant or no threats to the company
    data and information that is sensitive to the general public. Network security entails the security
    measures that aim to protect the computer network from intruders. The intruders are the
    significant elements in the cybercriminal war and should be barred from the computer network
    sophisticatedly by solid security controls.
    The types of networks that should be protected and secured include: wired and wireless
    connections to the computers within the organization. The protection of the networks prevents
    the attack from certain malware and cyber threats that are substantial within the capacity of the
    hackers. Network security is one of the critical elements of cybersecurity and artificial
    intelligence as it is the initial link between the cybercriminals and the central computer system of
    the target system. A secure network will enhance minimal or no cyber-attacks within the target
    organization.
    Cloud Security
    11
    It is one of the essential storage sites for the company data within the organization. Cloud
    security is essential for protecting the dense data and information that is crucial and sensitive to
    the company operations. The nature of cloud security can be enhanced by encrypting the data
    stored at the cloud for the designated company. The data should also be encrypted as it travels or
    moves from one site to another and during the primary use as it can also open up a loophole or
    vulnerability for the hackers to enter into the computer system to initiate an attack on the
    company and to steal the information that is present. The aspect of stealing the information
    results in the loss of integrity and trust in the company, thus resulting in significant losses,
    affecting the integrity of the designated company.
    The nature of cloud security implemented and adopted for the data present should
    enhance maximum privacy and strict regulatory mechanisms essential for controlling access and
    utilization of data present on the cloud storage (Taddeo et al. 2019). Efficient cybersecurity will
    first enhance the safety of company data on the cloud by first initiating the maximum security of
    the cloud through encryption. This will deny the intruders and other cybercriminals access to
    company data, thus conferring protection to the company’s sensitive information.
    Information Security
    Information security is one of the primary components of the cybersecurity domains
    which aim to protect the integrity of information within the company. Information is the main
    reason why the issues and incidences f cyber threats emerge within society. Conferring security
    to the designated information will enhance maximum protection and eligibility of the company
    towards maximum data security. The designated security measures can be enhanced through
    implementing strict data protection measures like general data protection regulation (GDPR).
    The policy will confer maximum security of the designated data and sensitive information from
    12
    the public and unauthorized access by intruders. It will expose any unauthorized attempts into
    the data system by using unknown USB devices. It will open up the loophole in which the
    company data can be detected upon any security breach. This will result in maximum protection
    of the company’s data within the designated region hence resulting in extreme cybersecurity
    measures within the designated organization.
    End-User Education
    Data security is the primary option in the cybersecurity domain which can be
    implemented by providing primary education to the users. The users of the computer systems
    within the target organization are the main entry points for the hackers into the company systems
    and initiation of the hacking practice. Organizations need to enhance user education on the
    existing cyber threats within the organization that can affect the organization’s integrity. The
    education can be enhanced through building and establishing awareness across the entire
    organization. The USB ports used by the designated users within the company are used for the
    entry and installation of malware within the company. User education is more important within
    the company as it initiates protection within the target company as the employees are the major
    components that result in the entry of cybersecurity.
    Classification of Cyber Threats
    There are diverse threats that emerge due to the cyber security implications. The nature of
    the cyber threats is strict and emerges based on the attack aspect and the dimension in which it
    was launched. The dimensions of the attacks are diverse, and they include: direct, veiled,
    indirect, and conditional. The categorization of the cyber security threats occurs on a
    dimensional basis depending on the nature of attacks that have been directed to the target
    13
    company or individual. The following are some of the designated categories in which the attacks
    are launched in cyber-crime.
    Direct Attack
    Direct cyber-attacks involve physical access to a computer within the target company or
    organization. It further advances to the aspect of performing various tasks and installing diverse
    equipment that compromises the security of the computer and the company’s entire system.
    Direct attacks are mostly castrated by the employees and staff members within the target
    organization either knowingly or unknowingly, depending on the nature of the scenario they
    have been caught in by the perpetrators and the cybercriminals. The attackers can initiate an
    installation of a software program that opens up a vulnerability on the designated network
    system, thus increasing the vulnerability of attacks (Salih et al., 2021). Some of the elements
    installed during a direct cyber-attack include worms, viruses and other portable devices. The
    organisation or the group’s data and sensitive information are significantly exposed to a
    considerable risk when a direct cyber-attack has been initiated against the company.
    Indirect Attacks
    Indirect cyber attacks are the ones that involve a launch of the cyber attack towards a
    designated company or organization using a third-party individual to implement the final strategy
    against the company network systems. The attack originates from a third-party computer and
    becomes more difficult to track back from the attacker’s source. It is difficult to establish a
    substantial trace of the attack’s origin within the environment due to the transition from one
    region to another and from one device to another, thus making it more dangerous to the
    organizational information and company data. The nature in which the indirect cyber-attacks are
    implemented is extreme and fatal towards the organization’s health. The companies should make
    14
    sure network systems and computer software systems that are stable and secure to eliminate the
    instances of an indirect attack.
    Effects of Cybersecurity Threats
    Cyber security threats pose a significant impact on society and the viability of the
    existing companies within the highly competitive market. The nature in which the threats are
    executed is fatal and dangerous to the healthy status of the organization. The cybercriminal
    impact on society and the organizations in the current society is hostile and diminishing. The
    following are some of the effects that cyberattack expose society and people.
    Violation of Privacy for Individuals and Security Breach of Data
    Privacy is an essential element that should be treated with dignity within society by any
    individual. Some secrets are better off when kept private rather than being exposed to the public
    as they can bear more damage than good when released to the public. Cyber attacks breach the
    privacy of individuals within society, thus exposing their personal information. The exposure of
    this kind of information might be dangerous to the safety of the designated individual as other
    criminals and people if conflict might find them quickly and kill them. The cyber-attacks have
    exposed the life of individuals to higher risk due to exposure of personal information that is
    sensitive and elemental towards the safety of the designated person (Sagar et al., 2019). People
    of a high profile are always a target to most criminals within the society due to the aspect of
    profit gains in terms of money that they can get once they have the stipulated individual in their
    own hands.
    Cyber attacks also implicate the security of sensitive information and data of companies
    across the globe due to the aspect of distinct exposure of information that is not meant for the
    public. Once the sensitive information of a particular company has been implicated, it is hard for
    15
    the consumers across the market to trust and have confidentiality within the same company. The
    designated company thus loses consumers and a significant market share due to the information
    released. This costs the company its operations and the profit margin, thus resulting in the
    collapse of the economy. The collapse of the high profit-making companies is directly associated
    with the economy of any given nation as they produce a higher revenue that is substantial to the
    Gross Domestic Product of the nation.
    The aspect of hacking initiates identity theft of most people within the target system, thus
    compromising their security and the aspect of performance within the company as their
    reputation might be destroyed by the kind of information released (Sagar et al., 2019). Cyberattacks also expose financial fraud that the organization’s management has buried for a long time.
    The exposure of such information may be helpful to the public for the aspect of transparency.
    Still, it may cost the designated company operating license and criminal allegations, leading to
    the cessation of operations until further notice.
    It results in Financial Loss.
    The cyberattacks that have been directed towards financial institutions result in the loss
    of finances at a higher rate due to the aspect of the security breach. When the cybercriminals
    have hacked the institution, it becomes easy for them to initiate financial transactions that they
    may perceive to be suitable for them, thus resulting in significant losses for the designated
    institutions. When the finances have been lost in the hands of the designated institution, the
    customers to the designated institution demand their sole payment, which makes it hard for the
    designated institution to resume operations in a usual manner. The loss of finances through
    cybercrime has been one of the significant issues in society, and the underlying impacts have
    diverse complications to the designated consumers. The cyberattacks that aim to drain finances
    16
    mainly target institutions like banks and other firms like cooperatives. Once the attack has been
    initiated, the operations of the designated company or organization decline significantly.
    Theft of the Intellectual Property
    Intellectual property is one of the most crucial elements and assets that any country and
    company hold for innovation and competitive ability within the highly competitive market. The
    nature of the intellectual property and the storage phase is distinct and crucial to the operational
    nature due to its impact once converted into tangible material. Intellectual property is one of the
    greatest assets to any holder of the designated property. Theft of the designated property can cost
    the original owner a lot of money and influence the competitors within the same field.
    Cyber-attacks have initiated the aspect of stealing intellectual property from countries
    databases and the high-profile companies that are competitive (Sagar et al., 2019). The aspect of
    robbing companies and people of their ideas, inventions and creative expressions through cyberattacks has inflicted a lot of pain and damage on the designated individuals due to substantial
    losses that can be regarded as life-threatening. Theft of intellectual property is a criminal offence
    as it significantly impacts the target company.
    Loss of Consumer Confidence
    The confidence of consumers in the designated companies that have exhibited a cyber
    attack lose confidence and trust in the designated companies management and products. Cyber
    attacks threaten the company’s best interests, thus resulting in the decline of operational status
    and performance within the highly competitive market. Companies and other organizations
    across the globe must exhibit the aspect of and incidence of cyber-attack. This is because the
    target companies will significantly lose many consumers and other loyal customers due to the
    nature of the attack that has been infiltrated on it. When the attacks have been exhibited on the
    17
    target companies, the consumers cease their operations to purchase and support the brand. This,
    in turn, affects the company’s operations and its ability to discern the completion status within
    the current market. Cyber attacks lead to the loss of consumer confidence in the products
    produced as a result of the underlying factors and the information released to the general public.
    Artificial Intelligence
    Artificial Intelligence is the ability of machines or computers to perform tasks usually
    conducted by human beings as they need intelligence and discernment to substantiate between
    discrete components. Artificial Intelligence is integrated with cybersecurity practices to increase
    the protection of computer systems against cybercriminals. Artificial intelligence is an effective
    method that is utilized together with other elements. It utilizes human capacity when integrating
    and making decisions concerning any suspicions.
    Types of Artificial Intelligence
    The basic types of artificial intelligence merge based on decisions and data needed to be
    made in a particular scenario. Some types of artificial intelligence include reactive, Limited
    memory, theory of mind, and self-made.
    Reactive Artificial Intelligence
    It is the most basic type of artificial intelligence designated and programmed to provide a
    predictable output depending on the designated input that it receives. The reactive machines and
    computer systems respond to identical situations exactly every time an input is initiated. The
    reactive artificial intelligence cannot learn the actions and conceive the past and future. The
    integration of reactive artificial intelligence with cybersecurity initiates safety at maximum
    security. An example of reactive artificial intelligence that can be integrated into cybersecurity to
    improve the security of computer systems includes deep blue. This chase-playing IBM
    18
    supercomputer is bested as a world champion Garry Kasparov (Petho et al., 2021). Artificial
    intelligence can be utilized together with cyber security measures to initiate tracking and
    safeguarding the safety of computer systems across the globe. Reactive artificial intelligence is
    an enormous step essential to the development of modern technology, which is essential to
    security and safety. The technological advancement in artificial intelligence is crucial to the
    security of computer systems.
    Limited Memory AI
    It is a form of artificial intelligence that learns from the past and establishes experimental
    knowledge by observing the actions of data. It lays down the track of all the unwanted elements
    and triggers an alarm once the same element has been activated. The limited memory artificial
    intelligence utilizes the historical aspect and data by observing data associated with preprogrammed data to generate predictions and perform specific tasks. The nature of the AI is
    complex and can be utilized by the designated cybersecurity measures to protect data and
    information belonging to specific individuals and target companies.
    Theory of Mind Artificial Intelligence
    It utilizes the aspect of thinking and perception of the human mind implemented in a
    robot. The designated robot thinks like human beings; thus, they can exhibit a suspicious event
    and incident that can be dangerous and fatal to society. The nature of operations in this kind of
    artificial intelligence uses ideas and everyday thinking to discern good from the bad. It can be
    used in combination with cybersecurity to initiate the aspect of protecting computer systems and
    data belonging to specific individuals (Narayanan et al., 2018). The machines and computers
    with this kind of intelligence utilize an acquired decision-making capability identical to human
    19
    beings. The machines can understand and recall emotions, which can be adjusted depending on
    the designated emotions.
    Self-Awareness Artificial Intelligence
    It is the most advanced artificial intelligence that utilizes a higher perception form. It
    makes the computers and machines aware of the emotions they exhibit in real-life scenarios. The
    machines are also aware of the emotions of the objects and people around them, thus making
    them more suitable for combating cybersecurity threats within the environment.
    How Artificial Intelligence Improves Cybersecurity
    Artificial intelligence improves the aspect of cybersecurity through diverse ways that are
    highly consequential towards the basic operations and safety of data within the current advanced
    technological systems. Artificial intelligence improves the ability of the network systems and
    computer systems to exhibit the knowledge of understanding the threats that are posed to cyber
    security and the risks exposed by consuming a lot of data artefacts. Artificial intelligence
    improves the aspect of cybersecurity through the following measures.
    Threat Hunting
    The ancient security companies utilized traditional methods when implementing the
    aspect of threat identification. The cyber security threats are diverse and embrace the aspect of
    intellectual capacity and high intelligence to understand and detect them before they occur. The
    current phase of artificial intelligence has been designed for hunting for the threats that exist
    within the current society through diverse methods. It embraces the aspect of a unique data set
    that is attempted or intruded through an automated system that runs parallel to the central system.
    The designated automated system looks and searches for any threats that are posed against the
    aspect of cyber security (Kuzlu et al., 2021).
    20
    It has been designed to detect any anomaly within the system, thus improving the security
    and safety of data and sensitive information. Threat hunting within the software systems utilizes
    artificial intelligence to enhance and deploy system-wide search actors to detect any intruders
    and suspicion that can alter or open up a way for the designated path. The threat hunting
    techniques that utilize artificial intelligence within the cybersecurity measures include structured
    hunting, intelligence-driven, target driven, technique-driven, and volumetric analysis. The
    designated threat hunting methods utilize artificial intelligence through a wide diversity scale and
    approach.
    Vulnerability Management
    It entails identifying, evaluating, treating, and reporting the existing security
    vulnerabilities within the current system. The aspect of security vulnerabilities is detected
    through the use of artificial intelligence. The AI implements the effective detection of the threats
    before they develop into something tangible or substantial. The vulnerability detection technique
    is implemented alongside other security measures, which are substantial and compelling towards
    identifying and eliminating threats within the designated region. It is essential to protect sensitive
    data and information for diverse companies. It reduces the aspect of attack surface once the
    vulnerabilities have been identified before the major hitch on the system.
    Data Centres
    Artificial intelligence improves the data centres within diverse servers and databases
    within organizations and companies due to the sophistication of the network and computer
    system. The systems are diverse and depend on intelligence to monitor the transfer and
    transmission of data. AI has initiated the aspect of eliminating any vulnerabilities and
    weaknesses on the system, thus improving the security status of the designated system. The
    21
    designated system must implement and utilize artificial intelligence when installing the data
    centres.
    The data centres are the entry point for transition within the information delivery to the
    target individual. The data centre provides a central position within which the IT operations of an
    organization are concentrated, and data transmission occurs from this point. It is essential to
    utilize the aspect of artificial intelligence when installing the data centres to enhance the aspect
    of tracking the information from entry to exit to identify any significant threats that might be
    underlying within the region.
    Network Security Policies
    The existing network policies within the designated cybersecurity status should be
    integrated with artificial intelligence to improve the safety and security of information. The
    security policies within the network system of any organization should embrace the aspect of
    artificial intelligence to improve the privacy and protection of the designated information against
    hackers and other respected individuals within the society (Buchanan 2020). The policies should
    stipulate on the improvements conducted on cybersecurity to increase information safety and
    other related aspects in the highly sophisticated environment. Individuals need to ensure that
    artificial intelligence is part and parcel of the network system. The topography of the network
    system should be established to initiate the desirable security protocols and is of high status to
    improve the aspect of data protection within the environment. Artificial intelligence
    incorporation with cybersecurity through network security increases the perception of ideas and
    the nature of the system, thus making it hard for the hackers and cybercriminals to infiltrate
    intruding into other people’s data and sensitive information.
    Advantages of the Artificial Intelligence in Cybersecurity
    22
    Artificial intelligence plays a crucial role in cybersecurity measures and the prevention of
    cybercrime within society. The nature of operations proves to be substantial and critical towards
    the wellbeing and execution of instructions. The AI has various advantages within the software
    system and, more specifically, cybersecurity measures. It has resulted in minimal human errors
    that lead to hacking and access of intruders within the system. The intelligence has enhanced
    operations automation, which is crucial to data and sensitive information safety. Reducing
    human errors plays a crucial role in eliminating any significance that can perpetuate
    cybercriminals within society (Taddeo et al., 2019). Artificial intelligence has also initiated faster
    decisions within computer systems and network systems by automating tasks and threat hunting.
    The significant individual has initiated critical decisions through artificial intelligence. It
    is crucial for the computer systems in the current market to implement and install automated
    artificial intelligence, which will confer protection to the computer systems at all times. Artificial
    intelligence also takes significant risks compared to human beings, as stipulated and indicated
    through the different types of AI put in place to execute tasks. It makes critical decisions and
    takes significant risks based on the information and data that has been provided previously. This
    makes it easy for the computer system to eliminate and prevent risks before they happen in realtime, thus securing the data and sensitive information that belongs to the designated company.
    Drawbacks of Artificial Intelligence in Cybersecurity
    Artificial intelligence poses significant risks and implications to network security if
    utilized in the wrong format or accord, thus resulting in risky status. Some of its limitations to
    established network systems include the cost of creation and unemployment. There has been a
    higher rate of speculations on the cost of installing artificial intelligence within the company
    server and database. Most companies and organizations across the globe cannot afford the
    23
    installation and implementation of artificial intelligence, thus making it hard for them to utilize
    the new mechanisms to protect their data (Soni 2020). The effective utilization of artificial
    intelligence within most companies has also resulted in the loss of employment due to the aspect
    of replacement of human labour within the institutions.
    The Drawbacks that the use of artificial intelligence posses within the designated
    companies emerge on various instances, including resources, data sets, and neural freezing. In
    terms of resources, the designated companies need to invest more in the resources that are at
    their predisposal to improve the effective use of AI and protection against any hacker. Capital is
    a significant resource when it comes to the installation of artificial intelligence within the
    designated companies. The data sets that the AI utilizes exhibit a high level of technology since
    they are trained to embrace learning along the process. The security teams within the designated
    companies and organizations have to acquire a lot of learning data sets to initiate the installation
    process. The data sets have to identify malicious codes and malware codes to detect any
    deviations within the company’s system. The hackers can also utilize the aspect of learning data
    sets to improve the status of their malware. Neural freezing entails testing a vast amount of data
    to detect any vulnerabilities. It leverages artificial intelligence to test large amounts of random
    inputs quickly.
    Conclusion
    Integrating cybersecurity and artificial intelligence increases the aspect and nature of
    security within the electronic devices and computers around the business environment. The
    integration of the two elements has facilitated the early detection of any threats that a system
    faces before the actual attack occurs. This has improved the efficiency and effectiveness of the
    systems within the environment. There are diverse cybersecurity threats exposed to the
    24
    organization or business entity within the highly competitive market. The nature of the attacks is
    effective and efficient depending on the type of network system that the company or the
    organization has. Cybersecurity threats result in tremendous effects that can affect the operation
    of the economy and national security of the nation. The operational phase of artificial
    intelligence within cybersecurity also possesses significant drawbacks that hackers and other
    cybercriminals can protect themselves against detection.
    25
    References
    Baranchuk, A., Refaat, M. M., Patton, K. K., Chung, M. K., Krishnan, K., Kutyifa, V., … &
    American College of Cardiology’s Electrophysiology Section Leadership. (2018).
    Cybersecurity for cardiac implantable electronic devices: What should you know?. Journal of
    the American College of Cardiology, 71(11), 1284-1288.
    https://www.jacc.org/doi/abs/10.1016/j.jacc.2018.01.023
    Buchanan, B. (2020). A National Security Research Agenda for Cybersecurity and Artificial
    Intelligence. Center for Security and Emerging Technology Issue Brief, 7.
    https://cset.georgetown.edu/wp-content/uploads/CSET-A-National-Security-Research-Agendafor-Cybersecurity-and-Artificial-Intelligence.pdf
    Kuzlu, M., Fair, C., & Guler, O. (2021). Role of artificial intelligence in the Internet of Things
    (IoT) cybersecurity. Discover the Internet of Things, 1(1), 1-14.
    https://link.springer.com/article/10.1007/s43926-020-00001-4
    Morris, D., Madzudzo, G., & Garcia-Perez, A. (2020). Cybersecurity threats in the auto industry:
    Tensions in the knowledge environment. Technological Forecasting and Social Change, 157,
    120102.
    https://www.sciencedirect.com/science/article/abs/pii/S0040162520309288
    Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018, October). Early
    detection of cybersecurity threats using collaborative cognition. In 2018 IEEE 4th
    international conference on collaboration and internet computing (CIC) (pp. 354-363). IEEE.
    https://ieeexplore.ieee.org/abstract/document/8537852/
    26
    Nasir, A., Jan, N., Gumaei, A., Khan, S. U., & Albogamy, F. R. (2021). Cybersecurity against
    the loopholes in industrial control systems using interval-valued complex intuitionistic fuzzy
    relations. Applied Sciences, 11(16), 7668.
    https://www.mdpi.com/2076-3417/11/16/7668
    Pethő, Z., Török, Á., & Szalay, Z. (2021). A survey of new orientations in the field of vehicular
    cybersecurity, applying artificial intelligence-based methods. Transactions on Emerging
    Telecommunications Technologies, 32(10), e4325.
    https://onlinelibrary.wiley.com/doi/full/10.1002/ett.4325
    Razaque, A., Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., … & Zhao, C.
    (2021). Avoid cybersecurity threats with the deployment of a web-based blockchain-enabled
    cybersecurity awareness system. Applied Sciences, 11(17), 7880.
    https://www.mdpi.com/2076-3417/11/17/7880
    Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With
    Cybersecurity: How to Tackle Cyber Fatigue. SAGE Open, 11(1), 21582440211000049.
    https://journals.sagepub.com/doi/full/10.1177/21582440211000049
    Sagar, B. S., Niranjan, S., Kashyap, N., & Sachin, D. N. (2019, March). Providing Cyber
    Security using Artificial Intelligence–A survey. In 2019 3rd International Conference on
    Computing Methodologies and Communication (ICCMC) (pp. 717-720). IEEE.
    https://ieeexplore.ieee.org/abstract/document/8819719
    Salih, A., Zeebaree, S. T., Ameen, S., Alkhyyat, A., & Shukur, H. M. (2021, February). A survey
    on the role of artificial intelligence, machine learning and deep learning for cybersecurity
    attack detection. In 2021 7th International Engineering Conference “Research & Innovation
    amid Global Pandemic”(IEC) (pp. 61-66). IEEE.
    27
    https://ieeexplore.ieee.org/abstract/document/9476132
    Soni, V. D. (2020). Challenges and Solution for Artificial Intelligence in Cybersecurity of the
    USA. Available at SSRN 3624487.
    https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3624487
    Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in
    cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557-560.
    https://www.nature.com/articles/s42256-019-0109-1
    Tschider, C. A. (2018). Deus ex machina: Regulating cybersecurity and artificial intelligence for
    future patients. Savannah L. Rev., 5, 177.
    https://heinonline.org/HOL/LandingPage?handle=hein.journals/savanlr5&div=9&id=&page=
    Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020).
    Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8,
    146598-146612.
    https://ieeexplore.ieee.org/abstract/document/9152956
    Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence
    capabilities to improve cybersecurity. Ieee Access, 8, 23817-23837.
    https://ieeexplore.ieee.org/abstract/document/8963730
    28

    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER