Introduction
Many organizations in the current world use internet-connected systems which are prone to attacks by cybercriminals. Cybersecurity is the protection of data, software, and hardware from cyberattacks, therefore, restricting unauthorized people from accessing sensitive information. With emerging technologies like machine learning and artificial intelligence, the organization can enhance cybersecurity and protect its internet-connected systems. The organization transmits a considerable amount of data through online systems, and an external interface can be attacked and sensitive information extracted as a result. Personal and financial information can cause adverse implications on the firm and can be a security threat. Incorporating machine learning and artificial intelligence into the organization's computer systems can assist in the detection of cyber-attacks and data theft on time, thus preventing the attackers from taking advantage of the system's vulnerabilities. With AI in cybersecurity, the organization will reduce pressure on its human workforce, and intrusions can be detected on time.
Bhatele, K. R., Shrivastava, H., & Kumari, N. (2019). The Role of Artificial Intelligence in Cyber Security. In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (pp. 170-192). IGI Global.
In this article, Bhatele, Shrivastava, & Kumari (2019) explain that in the current digital era, cybersecurity is a major concern. The authors acknowledge that issues like data breaches and identity theft are affecting many organizations. According to the authors, the challenges of inventing and implementing the right technology to curb cyber-attacks are endless, and organizations need to find alternative ways. Bhatele et al. (2019) explain that the increasing cases of cyber-attacks and crimes have made a significant contribution to the development of artificial intelligence/machine learning in many organizations. According to the authors, AI is creating a revolution in various sectors like healthcare and robotics. The authors discuss different AI techniques that are promising and which have a possibility of curbing cyber-attacks. The facts presented in this article will assist me in my justification to select AI as the emerging technology to be used in the enhancement of cybersecurity in my organization. The article is a vital material to my research since it gives detailed information regarding the role of AI in protecting sensitive data.
Darraj, E., Sample, C., & Justice, C. (2019, July). Artificial Intelligence Cybersecurity Framework: Preparing for the Here and now with AI. In European Conference on Cyber Warfare and Security (pp. 132-XIII). Academic Conferences International Limited.
According to Darraj, Sample, & Justice (2019), a cybersecurity framework is essential in securing of all artificial intelligence systems. The authors describe the two most commonly used AI models, which are AI-Development Cycle and AI-Development/secs/ops models. Both of these models are critical in the securing of artificial intelligence systems and the code, and they ensure that the algorithm is viable. The article explains how cybersecurity professionals can use the new AI technology to have a deeper understanding of the detection of threats and the functionality of machine learning. This source is reliable since the authors have critically analyzed data regarding data systems and algorithms. I find this source useful, and I will use to assess the AI models explained to understand how they detect threats.
Dilek, S., Cakir, H., & Aydin, M. (2015). Applications of artificial intelligence techniques to combating cybercrimes: A review. arXiv preprint arXiv:1502.03552.
In this article, Dilek, Cakir, & Aydin (2015) explain that the advancement of information technology in many sectors in the business world has resulted in the inappropriate use of cyberspace by criminals. The authors cite that internet-connected systems are highly vulnerable to intrusion by unauthorized persons. Dilek et al. (2015) explain that human intervention and human devices cannot protect the internet-connect system sufficiently; therefore, more sophisticated technology is required. The article explains that the new system must be robust, flexible, and must detect a wide variety of threats while at the same time, make real-time and intelligent decisions. According to the authors, artificial intelligence computing methods and machine learning techniques are increasingly playing a significant role in crime detection and the enhancement of cybersecurity. I will use data from the survey included in the article to support the emerging technology and to show how different techniques are effective tools for preventing cyberattacks.
Harel, Y., Gal, I. B., & Elovici, Y. (2017). Cybersecurity and the role of intelligent systems in addressing its challenges. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 49.
Harel, Gal, & Elovici (2017) explain that the rapid growth in information systems and computer technologies has led to the significant increase of unprecedented risks. According to the authors, the contribution of intelligent systems in internet-connected systems is significant. The article explains that substantial research has been done by experts to address the inclusion of Artificial intelligence and machine learning in cyber-security. The authors explain that there are two opposing directions related to AI's contribution to cybersecurity. The first direction is the focus on the AI-controlled systems as vulnerable elements for cyberattacks, for instance, in smart vehicles. Secondly, artificial intelligence is used as a tool for the detection of threats. One of the techniques explained by the authors that is crucial in fighting cyberattacks is the detection of unauthorized IoT devices which are commonly used in many organizations today. Harel, Gal, & Elovici (2017) cite that the intelligent system can detect all the IoT devices that are not listed in the white list of that organization. This article is useful for my research, and it will assist me in explaining how deep learning is critical in artificial intelligence and preventing cyberattacks. However, the authors have not provided sufficient data in the case study discussed in the article, which is a limitation.
Iyer, S. S., & Rajagopal, S. (2020). Applications of Machine Learning in Cyber Security Domain. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security (pp. 64-82). IGI Global.
Iyer & Rajagopal (2020) explain that with the global advancement of technology, there is increased knowledge revolution and transformation. The increase in online transactions has led to cybercrime. According to the authors, robots and other machines are increasingly replacing human beings, hence leading to artificial intelligence. Iyer & Rajagopal (2020) cite that examples of artificial intelligence tools that are being used to curb cyberattacks include image processing and robotics. The article explains that machine learning and artificial intelligence is being used to detect malware in businesses to protect sensitive information. The information from this source is reliable since the authors have comprehensively classified the role of artificial intelligence and machine learning in cybersecurity. The authors have also provided information from different sources that have contributed to the information on machine learning and cybersecurity. I will use this source to explain the different algorithms used by various approaches regarding the issue of cybersecurity.
Leenen, L., & Meyer, T. (2019). Artificial Intelligence and Big Data Analytics in Support of Cyber Defense. In Developments in Information Security and Cybernetic Wars (pp. 42-63). IGI Global.
In this article, Leenen & Meyer (2019) explain that artificial intelligence uses vast datasets to discover patterns and then give warnings and threats, and then make intelligent decisions. The article explains the mechanisms by which AI and big data analytics co-relate and work to detect threats in computer systems. According to the authors, data analytics detects patterns and data trends, while artificial intelligence generates algorithms that can learn and make intelligent decisions. The article explains that many automated systems in various organizations are based on semantic rules that are not complex enough. This article is useful in my research since it is comprehensive and gives detailed information about how organizations use the capabilities of data processing and AI simultaneously. The information from this article is reliable since real-time data has been used to describe the role of AI and data analytics in fighting cybercrimes. The authors also caution that cybercriminals could also use AI technology to their advantage and steal sensitive data.
Patil, P. (2016). Artificial intelligence in cybersecurity. International Journal of Research in Computer Applications and Robotics, 4(5), 1-5.
In this article, Patil (2016), some security issues can only be resolved through the integration of artificial intelligence into computer systems. According to the author, over the years, there has been an increase in the intelligence of malware and cyberweapons that are increasingly becoming dangerous. The author explains that expert systems are the most used AI tools which use illustration forms in their functionalities. Expert systems are used for simulation. Patil (2016) explains that these expert systems give a variety of safety measures and give the right procedure for the usage of restricted resources. The other tool illustrated in the article is intelligence agents who are also crucial in threat detection. The article will be useful in my research since it explains the different tools in artificial intelligence that can be used in threat-detection. I find this information reliable since the source is a peer-reviewed journal, and the information provided is comprehensive too. The author has also given the challenges associated with AI in cybersecurity. For instance, cybercriminals may also be ahead with certain computing levels.
Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race.
In this article, Taddeo, M., & Floridi, L. (2018) cite that more than four thousand malware was detected in the United States every day, and the damage made is significant. According to the authors, as threats increase, the defense mechanisms must also escalate. AI is meant to revolutionize the field of cybersecurity to deal with threats and attacks in a faster way. The authors cite the common uses of artificial intelligence as the verification of codes and detection of vulnerabilities. One of the strategies that are being used by firms is Antigena that uses machine learning to detect bugs in a computer network system. Once the tool identifies a threat, communication is shut down in that system, and an alert is given. The authors explain that artificial intelligence uses algorithms to identify the source of the threat and neutralize it. I found this article useful since it gives comprehensive data regarding the number of cyberattacks that happen in various states and how the organizations are dealing with the matter. I will use this article to explain the various tools that AI uses in threat detection.
Veiga, A. P. (2018). Applications of artificial intelligence to network security. arXiv preprint arXiv:1803.09992.
In this article, Veiga (2018) most organizations that are using artificial intelligence for data security are mostly restricted to machine learning. The author explains that machine learning contains tools and techniques like mathematical optimizations, data mining,...
Cite this page
Organizations: Enhancing Cybersecurity With ML & AI - Annotated Bibliography. (2023, Feb 14). Retrieved from https://proessays.net/essays/organizations-enhancing-cybersecurity-with-ml-ai-annotated-bibliography
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Biometric Gait Authentication for Smart Phone on Hand Paper Example
- Research Paper on Numerical Strategies
- Using Cell Phones & Traffic Accidents: A Deadly Combination - Essay Sample
- Data Storage and Processing in the 21st Century: A Guide - Research Paper
- Conflict: Interparty Disagreements in Organizations/Groups - Essay Sample
- Essay Example on Technology Innovation: Business Production and Management
- Paper Example on Conditional Response