Position: Mobile app developer
Skills
English-Business level speaking, reading, and writing.
Hindi-Basic speaking.
Python programming language
College level Microsoft office
EXPERIENCE
1
Cybersecurity and Artificial Intelligence
Student’s Name
Institutional Affiliation
Course
Professor’s Name
Date
2
Abstract
The paper’s primary purpose is to provide a concrete analysis of cybersecurity and
artificial intelligence. It adopts the approach of elucidating all the existing cyber threats within
the environment and institution the dangers that expose the computers and other electronic
devices within the business and work environment. The types of cyber threats have been
critically analyzed within the study, with a strict emphasis on the company’s impact. Some
cyberthreats include malware, emotet, the man in the middle, denial of service, phishing, and
many others. The paper then advances to the domains of cyber security that exist and the effect
that the subject business enterprises towards. Classification of the existing cybersecurity threats
has been exhibited and analyzed in a wide range. The impact of cybersecurity attacks has also
been studied in the paper, with the main focus being on the business enterprises and the nation’s
security. Artificial intelligence is also a significant element that has been widely analyzed in the
paper, with a substantial focus on how it improves cybersecurity. The report concludes by
providing an overview of the drawbacks of artificial intelligence within cybersecurity.
3
Cybersecurity and Artificial Intelligence
Cybersecurity is the conduct of protecting critical systems and sensitive information from
diverse digital and technological attacks. It is designated and composed of various measures
implemented to regulate and prevent threats emerging on the established network systems and
applications. Cybersecurity deals with diverse threats directed towards the systems of companies
and other institutions across the globe. The practices embraced in cybersecurity entail the
system’s complexity, which can be assembled based on diverse technologies. The cyber threats
existing in the modern world have been increasing due to advanced technology within the globe.
The measures to combat the threats should be initiated through cybersecurity techniques that
focus on eliminating any cyber threats (Baranchk et al., 2018). Effective measures of control
within the cybersecurity aspect towards eliminating the threats are Artificial Intelligence (AI)
and machine learning. Artificial Intelligence is the ability of machines or computers to perform
tasks usually conducted by human beings as they need intelligence and discernment to
substantiate between discrete components. The paper provides a critical analysis of the nature of
cybersecurity and artificial intelligence towards eliminating cyber threats.
Types of Cybersecurity Threats
There are diverse cyber threats that have been directed towards the modern technology of
computers and other components that are software-related. The type of a cyber-attack depends on
the nature of the computer and the type of software applications that are present on the
designated computer. The threats are directed to a significant company due to specific and
distinct intentions that are specific to the cybercriminals. The following are some of the cyber
threats exhibited in the advanced technological era.
Malware
4
It is the aspect of malicious software and contains variants that are dangerous to the
computer system of a particular company as it possesses security loopholes. Malware consists of
diverse variants: computer viruses, worms, and spyware. These variants are dangerous to the
network system as they provide complete unauthorized access of strangers to a given network
system within a company database or a personal device. The variants may also expose the whole
system to extensive damage, which may be difficult to avoid. The current malware attacks that
have been reported to cause harm to computer systems are lifeless and entail a unique design that
escapes standard detection methods (Morris et al., 2021). The standard methods that have been
put in place to establish tracks of the malware variants include antivirus tools, which scan and
detect any malicious file attachments within the computer system. The current malware attacks
have been designated to evade the standard detection methods, thus making it hard for
companies to establish protection against cyber threats. The different types of malware include:
Worms
These are variants of the malware that are spread through the software vulnerabilities that
exist within the computer system and may entail phishing attacks that are dangerous to the
computer system’s health. When the worm infects the computer system, it commences increasing
the infection to the whole computer. The worms that have infected the computer can result in the
modification and deletion of files on the computers, injection of the malicious software,
replication of themselves, and depletion of the system resources. And installation of the
backdoor for hackers, thus posing a significant threat to the entire software system.
Viruses
Viruses are malware attacks that require an existing infected system in operation or a
program to work effectively. The spread of viruses in the computer system follows their
5
attachment on an executable file or a document written in word format. Most of the viruses
spread through websites, file sharing, and downloading email attachments. Once the virus
contracts the computer system, it replicates vigorously, thus terminating the whole system. The
replication of viruses on the computer is higher and occurs faster than the worms.
Bots and Botnets
A bot is a computer system that has been infected by malware and can be controlled
remotely by hackers without the owner’s consent. It can be utilized by the designated hackers to
launch more attacks (Nasir et al., 2021). The botnets assist the hackers with launching malicious
activities like DDoS attacks, Keylogging, and spreading other types of malware.
Trojan Horses
It entails malicious programs that adopt the nature and operational function of the
legitimate application. The trojan horse looks trustworthy, and users may download it,
contemplating a legitimate application. The hackers may utilize the trojan horses to delete
personal information of people and data on the computer, spy on an individual’s device, and gain
access to the network of a designated individual.
Emotet Malware
It is one of the most dangerous malware that accelerates the cyber threats that most
advanced technological systems face on the planet. The designated malware is majorly spread
through the spam emails sent to the computer system from unknown senders. In the current
world, they come in advertisements, thus prompting the destruction of most computers. Its
infection in the computer may emerge through a malicious script, macro-enabled document files,
or a link. The remote emails contain a similar branding design that resembles the legitimate
email. Once the user clicks on the link, the designated device becomes affected by the malware,
6
thus affecting the entire computer system. The infection of the designated program aims to gain
access to private data and sensitive information and data of people. The program deceives the
basic antivirus programs which aim to protect the computer. Ince the antivirus has been
deceived, the infection occurs to the computer smoothly, thus resulting in diverse complications.
Denial of Service
It is a cyber-attack directed to the computer network and meant to shut down the entire
operation of the machine, thus making it inaccessible to its users. The attack is initiated by
flooding the target system with excess traffic and sending data that ultimately stimulates the
system’s crush. Most of these attacks target high profile individuals and companies that make
more money and profits in the standard environmental setting (Razaque et al., 2021). The main
aim of these kinds of attackers is to gain profit substantially. The most common flood attacks
within the computer systems include buffer overflow threats, ICMP floods, and SYN floods. The
flood attacks utilize a different dimension when launching an attack on the users within the
computer system. The DoS attacks overwhelm the system of the designated or target company
networks through a simple network management protocol (SNMP). The management protocol is
utilized in modems, printers, routers, and servers, thus posing as the strategic point the hackers
can target when launching the attack.
Man in the Middle
It is a cyber-attack that adopts a different perception scale and operational efficiency to
the users. It occurs when the cybercriminal exhibits an interception and relays messages between
two diverse parties to gain access and steal data that is crucial or sensitive to one of the parties
involved in the act. When the incident occurs, the blame is left for one party when the hacker
vanishes without any significant trace. Incidences of this kind occur when the users engage and
7
use unprotected Wi-Fi connections. In this case, it is easier for the hacker to intercept and bypass
the data between the designated guest and the device network. It poses a significant risk to the
privacy of data belonging to specific individuals within the society.
Phishing
It is one of the most common cybersecurity threats that have been on the verge of
increasing in the modern world. It entails social engineering where users are tricked into
providing their own PII and sensitive information. It utilizes the aspect of scamming the
designated users through emails and text messages that appear legitimate from authentic
companies requesting sensitive information. Some of the sensitive information requested in
phishing include credit card data and login information regarding the user’s bank accounts
(Tschider 2018). Most of the current cyber-attacks have been occurring in phishing, where users
have been subjected to a wide range of scamming within society.
SQL Injection Attack
It is a cybersecurity vulnerability that allows the hacker to interfere with the application’s
queries within its database. The attack occurs through the combination of data and codes in the
dynamic SQL statement and error revelation. It results in various prompts like insufficient input
validation, which calls up to the user to initiate additional information that might be dangerous to
the operations of the designated computer system. It is a web-based attack that targets users
across all the software systems. The execution of input data is affected by predefined SQL
commands within the computer system.
Password Attacks
These are some of the most common cyber threats that have been exhibited in the modern
technological world, thus resulting in the loss of privacy to information of individuals within the
8
designated accounts. The designated attacks entail diverse methods to authenticate into
password-protected user accounts maliciously. The most common user attack methods used to
obtain the passwords of individuals include brute-forcing, dictionary attacks, password spraying,
and credential stuffing which results in the projection and access to password-protected accounts
on the computer systems across the organization or the company.
Cybersecurity Domains (Types)
There are diverse cybersecurity domains that have been established based on the nature
of the threats posed to specific systems across the globe. Strong cybersecurity technique utilizes
a wide range of domains that can aid in the protection against cybersecurity threats. Some of the
domains of cybersecurity include:
Critical Infrastructure Security
The security of the infrastructure is the main element of concern within the computer
systems and networks that have been established in the environment. Infrastructure security
entails the designated practices that aim to protect the existing computer systems, networks,
other critical assets that the community depends on for national security, economic development
and health (Reeves et al., 2021). The public safety of the citizens within any given nation is the
priority. This can be enhanced by developing complex infrastructure that is elemental to the
operations of the computer and the security mechanisms put in place. The cybersecurity
framework stipulated by the national institute of standards and technology aims to provide
support to the existing organizations in the area of cybersecurity. The approach mechanism is
critical to the viability of the infrastructure and the denominations of the threats exposed to the
computer systems and networks.
9
The security infrastructure should be extremely high to ensure that there is maximum
protection against cybercriminals. Protection of the systems and networks should be given a
higher priority when it comes to cyber threats since they are the ones that pose significant
vulnerabilities within the environment. The operations of the designated networks in a
continuous manner are necessary for the success and viability of the economy; thus, maximum
effort should be exerted to ensure that there is protection against cyber criminals (Zeadally et al.,
2020).
Cybersecurity is a significant element that triggers the increase in the aspect of critical
infrastructure for security since its implications and effects directly affect the economy of any
given nation through sabotaging the operations of specific companies, which are highly
productive and efficient for the operations of the nation. The effect of hackers may be realized
when doctor-patient confidentiality is lost by exposing the medical records to the public. This
will intentionally affect the health sector’s operations and the citizens’ public safety within any
given nation.
Application Security
It is the domain of cybersecurity that entails helping the protection of applications that
operate on the premises and within the cloud. The security of the applications should be
developed and built inside the designated applications at specific stages. The security measures
implemented in place will ensure safety for the data present in the applications and protect
against any loopholes that can initiate backdoors within the software applications, resulting in
possible hacking and stealing of crucial data. The installation of the security measures within the
applications should be conducted to ensure the proper handling of information and authentication
of the designated users. This will provide an easy way to protect information from cyber
10
criminals across the globe. Application security will enhance the aspect of maximum security to
the vulnerabilities in the computer system, which can present an opportunity for the hackers to
perform their actions towards the company data (Wiafe et al., 2020). It is crucial and essential
that organizations and companies ensure that company data is secured first by increasing the
security of applications on the computer network within the premises.
Network Security
Security of the network within any given company is also a crucial element that presents
many possibilities for hackers to gain access to the server and database of the organization or a
company. The designated companies need to initiate the protection of the network with highlevel security. A secure network ensures that there are significant or no threats to the company
data and information that is sensitive to the general public. Network security entails the security
measures that aim to protect the computer network from intruders. The intruders are the
significant elements in the cybercriminal war and should be barred from the computer network
sophisticatedly by solid security controls.
The types of networks that should be protected and secured include: wired and wireless
connections to the computers within the organization. The protection of the networks prevents
the attack from certain malware and cyber threats that are substantial within the capacity of the
hackers. Network security is one of the critical elements of cybersecurity and artificial
intelligence as it is the initial link between the cybercriminals and the central computer system of
the target system. A secure network will enhance minimal or no cyber-attacks within the target
organization.
Cloud Security
11
It is one of the essential storage sites for the company data within the organization. Cloud
security is essential for protecting the dense data and information that is crucial and sensitive to
the company operations. The nature of cloud security can be enhanced by encrypting the data
stored at the cloud for the designated company. The data should also be encrypted as it travels or
moves from one site to another and during the primary use as it can also open up a loophole or
vulnerability for the hackers to enter into the computer system to initiate an attack on the
company and to steal the information that is present. The aspect of stealing the information
results in the loss of integrity and trust in the company, thus resulting in significant losses,
affecting the integrity of the designated company.
The nature of cloud security implemented and adopted for the data present should
enhance maximum privacy and strict regulatory mechanisms essential for controlling access and
utilization of data present on the cloud storage (Taddeo et al. 2019). Efficient cybersecurity will
first enhance the safety of company data on the cloud by first initiating the maximum security of
the cloud through encryption. This will deny the intruders and other cybercriminals access to
company data, thus conferring protection to the company’s sensitive information.
Information Security
Information security is one of the primary components of the cybersecurity domains
which aim to protect the integrity of information within the company. Information is the main
reason why the issues and incidences f cyber threats emerge within society. Conferring security
to the designated information will enhance maximum protection and eligibility of the company
towards maximum data security. The designated security measures can be enhanced through
implementing strict data protection measures like general data protection regulation (GDPR).
The policy will confer maximum security of the designated data and sensitive information from
12
the public and unauthorized access by intruders. It will expose any unauthorized attempts into
the data system by using unknown USB devices. It will open up the loophole in which the
company data can be detected upon any security breach. This will result in maximum protection
of the company’s data within the designated region hence resulting in extreme cybersecurity
measures within the designated organization.
End-User Education
Data security is the primary option in the cybersecurity domain which can be
implemented by providing primary education to the users. The users of the computer systems
within the target organization are the main entry points for the hackers into the company systems
and initiation of the hacking practice. Organizations need to enhance user education on the
existing cyber threats within the organization that can affect the organization’s integrity. The
education can be enhanced through building and establishing awareness across the entire
organization. The USB ports used by the designated users within the company are used for the
entry and installation of malware within the company. User education is more important within
the company as it initiates protection within the target company as the employees are the major
components that result in the entry of cybersecurity.
Classification of Cyber Threats
There are diverse threats that emerge due to the cyber security implications. The nature of
the cyber threats is strict and emerges based on the attack aspect and the dimension in which it
was launched. The dimensions of the attacks are diverse, and they include: direct, veiled,
indirect, and conditional. The categorization of the cyber security threats occurs on a
dimensional basis depending on the nature of attacks that have been directed to the target
13
company or individual. The following are some of the designated categories in which the attacks
are launched in cyber-crime.
Direct Attack
Direct cyber-attacks involve physical access to a computer within the target company or
organization. It further advances to the aspect of performing various tasks and installing diverse
equipment that compromises the security of the computer and the company’s entire system.
Direct attacks are mostly castrated by the employees and staff members within the target
organization either knowingly or unknowingly, depending on the nature of the scenario they
have been caught in by the perpetrators and the cybercriminals. The attackers can initiate an
installation of a software program that opens up a vulnerability on the designated network
system, thus increasing the vulnerability of attacks (Salih et al., 2021). Some of the elements
installed during a direct cyber-attack include worms, viruses and other portable devices. The
organisation or the group’s data and sensitive information are significantly exposed to a
considerable risk when a direct cyber-attack has been initiated against the company.
Indirect Attacks
Indirect cyber attacks are the ones that involve a launch of the cyber attack towards a
designated company or organization using a third-party individual to implement the final strategy
against the company network systems. The attack originates from a third-party computer and
becomes more difficult to track back from the attacker’s source. It is difficult to establish a
substantial trace of the attack’s origin within the environment due to the transition from one
region to another and from one device to another, thus making it more dangerous to the
organizational information and company data. The nature in which the indirect cyber-attacks are
implemented is extreme and fatal towards the organization’s health. The companies should make
14
sure network systems and computer software systems that are stable and secure to eliminate the
instances of an indirect attack.
Effects of Cybersecurity Threats
Cyber security threats pose a significant impact on society and the viability of the
existing companies within the highly competitive market. The nature in which the threats are
executed is fatal and dangerous to the healthy status of the organization. The cybercriminal
impact on society and the organizations in the current society is hostile and diminishing. The
following are some of the effects that cyberattack expose society and people.
Violation of Privacy for Individuals and Security Breach of Data
Privacy is an essential element that should be treated with dignity within society by any
individual. Some secrets are better off when kept private rather than being exposed to the public
as they can bear more damage than good when released to the public. Cyber attacks breach the
privacy of individuals within society, thus exposing their personal information. The exposure of
this kind of information might be dangerous to the safety of the designated individual as other
criminals and people if conflict might find them quickly and kill them. The cyber-attacks have
exposed the life of individuals to higher risk due to exposure of personal information that is
sensitive and elemental towards the safety of the designated person (Sagar et al., 2019). People
of a high profile are always a target to most criminals within the society due to the aspect of
profit gains in terms of money that they can get once they have the stipulated individual in their
own hands.
Cyber attacks also implicate the security of sensitive information and data of companies
across the globe due to the aspect of distinct exposure of information that is not meant for the
public. Once the sensitive information of a particular company has been implicated, it is hard for
15
the consumers across the market to trust and have confidentiality within the same company. The
designated company thus loses consumers and a significant market share due to the information
released. This costs the company its operations and the profit margin, thus resulting in the
collapse of the economy. The collapse of the high profit-making companies is directly associated
with the economy of any given nation as they produce a higher revenue that is substantial to the
Gross Domestic Product of the nation.
The aspect of hacking initiates identity theft of most people within the target system, thus
compromising their security and the aspect of performance within the company as their
reputation might be destroyed by the kind of information released (Sagar et al., 2019). Cyberattacks also expose financial fraud that the organization’s management has buried for a long time.
The exposure of such information may be helpful to the public for the aspect of transparency.
Still, it may cost the designated company operating license and criminal allegations, leading to
the cessation of operations until further notice.
It results in Financial Loss.
The cyberattacks that have been directed towards financial institutions result in the loss
of finances at a higher rate due to the aspect of the security breach. When the cybercriminals
have hacked the institution, it becomes easy for them to initiate financial transactions that they
may perceive to be suitable for them, thus resulting in significant losses for the designated
institutions. When the finances have been lost in the hands of the designated institution, the
customers to the designated institution demand their sole payment, which makes it hard for the
designated institution to resume operations in a usual manner. The loss of finances through
cybercrime has been one of the significant issues in society, and the underlying impacts have
diverse complications to the designated consumers. The cyberattacks that aim to drain finances
16
mainly target institutions like banks and other firms like cooperatives. Once the attack has been
initiated, the operations of the designated company or organization decline significantly.
Theft of the Intellectual Property
Intellectual property is one of the most crucial elements and assets that any country and
company hold for innovation and competitive ability within the highly competitive market. The
nature of the intellectual property and the storage phase is distinct and crucial to the operational
nature due to its impact once converted into tangible material. Intellectual property is one of the
greatest assets to any holder of the designated property. Theft of the designated property can cost
the original owner a lot of money and influence the competitors within the same field.
Cyber-attacks have initiated the aspect of stealing intellectual property from countries
databases and the high-profile companies that are competitive (Sagar et al., 2019). The aspect of
robbing companies and people of their ideas, inventions and creative expressions through cyberattacks has inflicted a lot of pain and damage on the designated individuals due to substantial
losses that can be regarded as life-threatening. Theft of intellectual property is a criminal offence
as it significantly impacts the target company.
Loss of Consumer Confidence
The confidence of consumers in the designated companies that have exhibited a cyber
attack lose confidence and trust in the designated companies management and products. Cyber
attacks threaten the company’s best interests, thus resulting in the decline of operational status
and performance within the highly competitive market. Companies and other organizations
across the globe must exhibit the aspect of and incidence of cyber-attack. This is because the
target companies will significantly lose many consumers and other loyal customers due to the
nature of the attack that has been infiltrated on it. When the attacks have been exhibited on the
17
target companies, the consumers cease their operations to purchase and support the brand. This,
in turn, affects the company’s operations and its ability to discern the completion status within
the current market. Cyber attacks lead to the loss of consumer confidence in the products
produced as a result of the underlying factors and the information released to the general public.
Artificial Intelligence
Artificial Intelligence is the ability of machines or computers to perform tasks usually
conducted by human beings as they need intelligence and discernment to substantiate between
discrete components. Artificial Intelligence is integrated with cybersecurity practices to increase
the protection of computer systems against cybercriminals. Artificial intelligence is an effective
method that is utilized together with other elements. It utilizes human capacity when integrating
and making decisions concerning any suspicions.
Types of Artificial Intelligence
The basic types of artificial intelligence merge based on decisions and data needed to be
made in a particular scenario. Some types of artificial intelligence include reactive, Limited
memory, theory of mind, and self-made.
Reactive Artificial Intelligence
It is the most basic type of artificial intelligence designated and programmed to provide a
predictable output depending on the designated input that it receives. The reactive machines and
computer systems respond to identical situations exactly every time an input is initiated. The
reactive artificial intelligence cannot learn the actions and conceive the past and future. The
integration of reactive artificial intelligence with cybersecurity initiates safety at maximum
security. An example of reactive artificial intelligence that can be integrated into cybersecurity to
improve the security of computer systems includes deep blue. This chase-playing IBM
18
supercomputer is bested as a world champion Garry Kasparov (Petho et al., 2021). Artificial
intelligence can be utilized together with cyber security measures to initiate tracking and
safeguarding the safety of computer systems across the globe. Reactive artificial intelligence is
an enormous step essential to the development of modern technology, which is essential to
security and safety. The technological advancement in artificial intelligence is crucial to the
security of computer systems.
Limited Memory AI
It is a form of artificial intelligence that learns from the past and establishes experimental
knowledge by observing the actions of data. It lays down the track of all the unwanted elements
and triggers an alarm once the same element has been activated. The limited memory artificial
intelligence utilizes the historical aspect and data by observing data associated with preprogrammed data to generate predictions and perform specific tasks. The nature of the AI is
complex and can be utilized by the designated cybersecurity measures to protect data and
information belonging to specific individuals and target companies.
Theory of Mind Artificial Intelligence
It utilizes the aspect of thinking and perception of the human mind implemented in a
robot. The designated robot thinks like human beings; thus, they can exhibit a suspicious event
and incident that can be dangerous and fatal to society. The nature of operations in this kind of
artificial intelligence uses ideas and everyday thinking to discern good from the bad. It can be
used in combination with cybersecurity to initiate the aspect of protecting computer systems and
data belonging to specific individuals (Narayanan et al., 2018). The machines and computers
with this kind of intelligence utilize an acquired decision-making capability identical to human
19
beings. The machines can understand and recall emotions, which can be adjusted depending on
the designated emotions.
Self-Awareness Artificial Intelligence
It is the most advanced artificial intelligence that utilizes a higher perception form. It
makes the computers and machines aware of the emotions they exhibit in real-life scenarios. The
machines are also aware of the emotions of the objects and people around them, thus making
them more suitable for combating cybersecurity threats within the environment.
How Artificial Intelligence Improves Cybersecurity
Artificial intelligence improves the aspect of cybersecurity through diverse ways that are
highly consequential towards the basic operations and safety of data within the current advanced
technological systems. Artificial intelligence improves the ability of the network systems and
computer systems to exhibit the knowledge of understanding the threats that are posed to cyber
security and the risks exposed by consuming a lot of data artefacts. Artificial intelligence
improves the aspect of cybersecurity through the following measures.
Threat Hunting
The ancient security companies utilized traditional methods when implementing the
aspect of threat identification. The cyber security threats are diverse and embrace the aspect of
intellectual capacity and high intelligence to understand and detect them before they occur. The
current phase of artificial intelligence has been designed for hunting for the threats that exist
within the current society through diverse methods. It embraces the aspect of a unique data set
that is attempted or intruded through an automated system that runs parallel to the central system.
The designated automated system looks and searches for any threats that are posed against the
aspect of cyber security (Kuzlu et al., 2021).
20
It has been designed to detect any anomaly within the system, thus improving the security
and safety of data and sensitive information. Threat hunting within the software systems utilizes
artificial intelligence to enhance and deploy system-wide search actors to detect any intruders
and suspicion that can alter or open up a way for the designated path. The threat hunting
techniques that utilize artificial intelligence within the cybersecurity measures include structured
hunting, intelligence-driven, target driven, technique-driven, and volumetric analysis. The
designated threat hunting methods utilize artificial intelligence through a wide diversity scale and
approach.
Vulnerability Management
It entails identifying, evaluating, treating, and reporting the existing security
vulnerabilities within the current system. The aspect of security vulnerabilities is detected
through the use of artificial intelligence. The AI implements the effective detection of the threats
before they develop into something tangible or substantial. The vulnerability detection technique
is implemented alongside other security measures, which are substantial and compelling towards
identifying and eliminating threats within the designated region. It is essential to protect sensitive
data and information for diverse companies. It reduces the aspect of attack surface once the
vulnerabilities have been identified before the major hitch on the system.
Data Centres
Artificial intelligence improves the data centres within diverse servers and databases
within organizations and companies due to the sophistication of the network and computer
system. The systems are diverse and depend on intelligence to monitor the transfer and
transmission of data. AI has initiated the aspect of eliminating any vulnerabilities and
weaknesses on the system, thus improving the security status of the designated system. The
21
designated system must implement and utilize artificial intelligence when installing the data
centres.
The data centres are the entry point for transition within the information delivery to the
target individual. The data centre provides a central position within which the IT operations of an
organization are concentrated, and data transmission occurs from this point. It is essential to
utilize the aspect of artificial intelligence when installing the data centres to enhance the aspect
of tracking the information from entry to exit to identify any significant threats that might be
underlying within the region.
Network Security Policies
The existing network policies within the designated cybersecurity status should be
integrated with artificial intelligence to improve the safety and security of information. The
security policies within the network system of any organization should embrace the aspect of
artificial intelligence to improve the privacy and protection of the designated information against
hackers and other respected individuals within the society (Buchanan 2020). The policies should
stipulate on the improvements conducted on cybersecurity to increase information safety and
other related aspects in the highly sophisticated environment. Individuals need to ensure that
artificial intelligence is part and parcel of the network system. The topography of the network
system should be established to initiate the desirable security protocols and is of high status to
improve the aspect of data protection within the environment. Artificial intelligence
incorporation with cybersecurity through network security increases the perception of ideas and
the nature of the system, thus making it hard for the hackers and cybercriminals to infiltrate
intruding into other people’s data and sensitive information.
Advantages of the Artificial Intelligence in Cybersecurity
22
Artificial intelligence plays a crucial role in cybersecurity measures and the prevention of
cybercrime within society. The nature of operations proves to be substantial and critical towards
the wellbeing and execution of instructions. The AI has various advantages within the software
system and, more specifically, cybersecurity measures. It has resulted in minimal human errors
that lead to hacking and access of intruders within the system. The intelligence has enhanced
operations automation, which is crucial to data and sensitive information safety. Reducing
human errors plays a crucial role in eliminating any significance that can perpetuate
cybercriminals within society (Taddeo et al., 2019). Artificial intelligence has also initiated faster
decisions within computer systems and network systems by automating tasks and threat hunting.
The significant individual has initiated critical decisions through artificial intelligence. It
is crucial for the computer systems in the current market to implement and install automated
artificial intelligence, which will confer protection to the computer systems at all times. Artificial
intelligence also takes significant risks compared to human beings, as stipulated and indicated
through the different types of AI put in place to execute tasks. It makes critical decisions and
takes significant risks based on the information and data that has been provided previously. This
makes it easy for the computer system to eliminate and prevent risks before they happen in realtime, thus securing the data and sensitive information that belongs to the designated company.
Drawbacks of Artificial Intelligence in Cybersecurity
Artificial intelligence poses significant risks and implications to network security if
utilized in the wrong format or accord, thus resulting in risky status. Some of its limitations to
established network systems include the cost of creation and unemployment. There has been a
higher rate of speculations on the cost of installing artificial intelligence within the company
server and database. Most companies and organizations across the globe cannot afford the
23
installation and implementation of artificial intelligence, thus making it hard for them to utilize
the new mechanisms to protect their data (Soni 2020). The effective utilization of artificial
intelligence within most companies has also resulted in the loss of employment due to the aspect
of replacement of human labour within the institutions.
The Drawbacks that the use of artificial intelligence posses within the designated
companies emerge on various instances, including resources, data sets, and neural freezing. In
terms of resources, the designated companies need to invest more in the resources that are at
their predisposal to improve the effective use of AI and protection against any hacker. Capital is
a significant resource when it comes to the installation of artificial intelligence within the
designated companies. The data sets that the AI utilizes exhibit a high level of technology since
they are trained to embrace learning along the process. The security teams within the designated
companies and organizations have to acquire a lot of learning data sets to initiate the installation
process. The data sets have to identify malicious codes and malware codes to detect any
deviations within the company’s system. The hackers can also utilize the aspect of learning data
sets to improve the status of their malware. Neural freezing entails testing a vast amount of data
to detect any vulnerabilities. It leverages artificial intelligence to test large amounts of random
inputs quickly.
Conclusion
Integrating cybersecurity and artificial intelligence increases the aspect and nature of
security within the electronic devices and computers around the business environment. The
integration of the two elements has facilitated the early detection of any threats that a system
faces before the actual attack occurs. This has improved the efficiency and effectiveness of the
systems within the environment. There are diverse cybersecurity threats exposed to the
24
organization or business entity within the highly competitive market. The nature of the attacks is
effective and efficient depending on the type of network system that the company or the
organization has. Cybersecurity threats result in tremendous effects that can affect the operation
of the economy and national security of the nation. The operational phase of artificial
intelligence within cybersecurity also possesses significant drawbacks that hackers and other
cybercriminals can protect themselves against detection.
25
References
Baranchuk, A., Refaat, M. M., Patton, K. K., Chung, M. K., Krishnan, K., Kutyifa, V., … &
American College of Cardiology’s Electrophysiology Section Leadership. (2018).
Cybersecurity for cardiac implantable electronic devices: What should you know?. Journal of
the American College of Cardiology, 71(11), 1284-1288.
https://www.jacc.org/doi/abs/10.1016/j.jacc.2018.01.023
Buchanan, B. (2020). A National Security Research Agenda for Cybersecurity and Artificial
Intelligence. Center for Security and Emerging Technology Issue Brief, 7.
https://cset.georgetown.edu/wp-content/uploads/CSET-A-National-Security-Research-Agendafor-Cybersecurity-and-Artificial-Intelligence.pdf
Kuzlu, M., Fair, C., & Guler, O. (2021). Role of artificial intelligence in the Internet of Things
(IoT) cybersecurity. Discover the Internet of Things, 1(1), 1-14.
https://link.springer.com/article/10.1007/s43926-020-00001-4
Morris, D., Madzudzo, G., & Garcia-Perez, A. (2020). Cybersecurity threats in the auto industry:
Tensions in the knowledge environment. Technological Forecasting and Social Change, 157,
120102.
https://www.sciencedirect.com/science/article/abs/pii/S0040162520309288
Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018, October). Early
detection of cybersecurity threats using collaborative cognition. In 2018 IEEE 4th
international conference on collaboration and internet computing (CIC) (pp. 354-363). IEEE.
https://ieeexplore.ieee.org/abstract/document/8537852/
26
Nasir, A., Jan, N., Gumaei, A., Khan, S. U., & Albogamy, F. R. (2021). Cybersecurity against
the loopholes in industrial control systems using interval-valued complex intuitionistic fuzzy
relations. Applied Sciences, 11(16), 7668.
https://www.mdpi.com/2076-3417/11/16/7668
Pethő, Z., Török, Á., & Szalay, Z. (2021). A survey of new orientations in the field of vehicular
cybersecurity, applying artificial intelligence-based methods. Transactions on Emerging
Telecommunications Technologies, 32(10), e4325.
https://onlinelibrary.wiley.com/doi/full/10.1002/ett.4325
Razaque, A., Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., … & Zhao, C.
(2021). Avoid cybersecurity threats with the deployment of a web-based blockchain-enabled
cybersecurity awareness system. Applied Sciences, 11(17), 7880.
https://www.mdpi.com/2076-3417/11/17/7880
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With
Cybersecurity: How to Tackle Cyber Fatigue. SAGE Open, 11(1), 21582440211000049.
https://journals.sagepub.com/doi/full/10.1177/21582440211000049
Sagar, B. S., Niranjan, S., Kashyap, N., & Sachin, D. N. (2019, March). Providing Cyber
Security using Artificial Intelligence–A survey. In 2019 3rd International Conference on
Computing Methodologies and Communication (ICCMC) (pp. 717-720). IEEE.
https://ieeexplore.ieee.org/abstract/document/8819719
Salih, A., Zeebaree, S. T., Ameen, S., Alkhyyat, A., & Shukur, H. M. (2021, February). A survey
on the role of artificial intelligence, machine learning and deep learning for cybersecurity
attack detection. In 2021 7th International Engineering Conference “Research & Innovation
amid Global Pandemic”(IEC) (pp. 61-66). IEEE.
27
https://ieeexplore.ieee.org/abstract/document/9476132
Soni, V. D. (2020). Challenges and Solution for Artificial Intelligence in Cybersecurity of the
USA. Available at SSRN 3624487.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3624487
Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in
cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557-560.
https://www.nature.com/articles/s42256-019-0109-1
Tschider, C. A. (2018). Deus ex machina: Regulating cybersecurity and artificial intelligence for
future patients. Savannah L. Rev., 5, 177.
https://heinonline.org/HOL/LandingPage?handle=hein.journals/savanlr5&div=9&id=&page=
Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020).
Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8,
146598-146612.
https://ieeexplore.ieee.org/abstract/document/9152956
Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence
capabilities to improve cybersecurity. Ieee Access, 8, 23817-23837.
https://ieeexplore.ieee.org/abstract/document/8963730
28