:: ECONOMY :: ARTIFICIAL INTELLIGENCE AS A TOOL FOR COUNTERING CYBER THREATS :: ECONOMY :: ARTIFICIAL INTELLIGENCE AS A TOOL FOR COUNTERING CYBER THREATS
:: ECONOMY :: ARTIFICIAL INTELLIGENCE AS A TOOL FOR COUNTERING CYBER THREATS
 
UA  RU  EN
         

Світ наукових досліджень. Випуск 35

Термін подання матеріалів

20 листопада 2024

До початку конференції залишилось днів 0



  Головна
Нові вимоги до публікацій результатів кандидатських та докторських дисертацій
Редакційна колегія. ГО «Наукова спільнота»
Договір про співробітництво з Wyzsza Szkola Zarzadzania i Administracji w Opolu
Календар конференцій
Архів
  Наукові конференції
 
 Лінки
 Форум
Наукові конференції
Наукова спільнота - інтернет конференції
Світ наукових досліджень www.economy-confer.com.ua

 Голосування 
З яких джерел Ви дізнались про нашу конференцію:

соціальні мережі;
інформування електронною поштою;
пошукові інтернет-системи (Google, Yahoo, Meta, Yandex);
інтернет-каталоги конференцій (science-community.org, konferencii.ru, vsenauki.ru, інші);
наукові підрозділи ВУЗів;
порекомендували знайомі.
з СМС повідомлення на мобільний телефон.


Результати голосувань Докладніше

 Наша кнопка
www.economy-confer.com.ua - Економічні наукові інтернет-конференції

 Лічильники
Українська рейтингова система

ARTIFICIAL INTELLIGENCE AS A TOOL FOR COUNTERING CYBER THREATS

 
23.01.2024 12:33
Автор: Nazar Mihonko, student, Dnipro Univesity of Techology
[2. Інформаційні системи і технології;]

In today's digital world, where technologies are becoming increasingly complex and cyber threats increasingly sophisticated, the role of artificial intelligence (AI) in ensuring cybersecurity is becoming crucial. Artificial intelligence is being introduced into the field of cybersecurity not only to detect and prevent threats, but also to respond to them effectively. One important aspect is the automation of cybersecurity using artificial intelligence. Machine learning algorithms allow systems to automatically analyze large data sets, detect anomalies, and predict possible cyberattacks. This increases responsiveness and enables threats to be prevented before they cause harm. Machine learning technologies also facilitate the creation of intelligent systems capable of adapting to new types of threats. Systems equipped with artificial intelligence can learn based on new data and improve their effectiveness over time.

This is especially important in the context of increasingly complex and cunning cyberattacks emerging. In addition, artificial intelligence is used to create intelligent threat analysis and complex cyber task resolution systems. Such systems can process data in real time, detect abnormal user behavior, analyze network traffic, and uncover hidden threats [1].

Thus, artificial intelligence plays an increasingly greater role in countering modern cyber threats, ensuring the resilience of digital systems, and improving the level of cybersecurity. Its implementation makes it possible to build intelligent cyber defense systems that can quickly respond to threats, adapt to new conditions, and predict future attacks.

However, along with strengthening cyber defense, artificial intelligence is also becoming a tool for creating more sophisticated cyberattacks. Attackers can use machine learning technologies to develop intelligent and hard-to-detect threats. This underscores the need for continuous improvement of cybersecurity methods and adaptation to new challenges. One significant aspect of the discussion is the ethical issues associated with the use of artificial intelligence in cybersecurity. Issues of privacy, responsibility for decision-making, as well as the creation of standards and regulations in this field are becoming increasingly relevant.

In today's world, where technologies play a huge role in our daily lives, cybersecurity is becoming an increasingly important aspect. The threats of cyberspace are constantly evolving, and therefore it is necessary to develop innovative methods and tools to combat cybercrime. In this context, artificial intelligence (AI) plays an increasingly important role in ensuring cybersecurity. Artificial intelligence has the potential to transform modern methods of detecting and responding to cyber threats. Automatic incident detection, analysis of large amounts of data, prediction of potential vulnerabilities - all this is an area of AI application in cybersecurity [2]. This allows to identify and repel attacks faster than a person can.

Thus, although artificial intelligence opens up new opportunities for enhancing cybersecurity, it can also be used to create more sophisticated attacks. Effective protection requires innovation, flexibility, and an understanding of the ethical implications of implementing this technology. The role of artificial intelligence in ensuring cybersecurity will only grow, so it remains relevant to develop appropriate standards and policies.

Improving cybersecurity is critical in today's digital world. Here are some suggestions for improving cybersecurity in enterprises and institutions [3]:

a) employee training and awareness:

– regular cybersecurity training for employees to inform them about potential threats, phishing, and best practices for handling confidential information;

– it is recommended to develop a culture of caring about cybersecurity to encourage employees to promptly report suspicious activity;

b) reliable authentication measures:

– it is necessary to ensure the use of reliable and unique passwords for all accounts;

– it is recommended to implement multi-factor authentication (MFA) to add an extra layer of security;

c) network security:

– it is recommended to use firewalls to monitor and control incoming and outgoing network traffic;

– it is necessary to implement intrusion detection and prevention systems to identify potential threats and respond to them.

Artificial intelligence is also capable of enhancing authentication and authorization processes.

Therefore, there are many ways to improve an organization's cybersecurity level through personnel training, configuring authentication systems, and strengthening the network. The use of artificial intelligence also has great potential.

Facial and voice recognition technologies can provide a more reliable way to identify users. With artificial intelligence, it is possible to create systems capable of automatically recording unusual network activity and applying cybersecurity measures to prevent potential cyberattacks. In addition, artificial intelligence can be used to develop powerful anti-phishing and malware systems.

Machine learning algorithms are able to analyze thousands of emails, detecting suspicious and malicious links and files. Such intelligent systems improve filtering processes at early stages, helping to prevent numerous cyberattacks [4].

Artificial intelligence can also be used to create cyber monitoring systems that analyze network activity and detect suspicious actions. This makes it possible to anticipate potential cyber threats and take preventive measures. At the same time, despite the benefits, artificial intelligence also creates certain cybersecurity risks.

Therefore, it is important to develop equivalent artificial intelligence mechanisms to counter the growing cyber threats. The interaction between artificial intelligence and humans is becoming critical for cybersecurity in the digital age.

In conclusion, the role of artificial intelligence in the field of cybersecurity is fundamental and growing rapidly [5]. It can improve the detection and response to cyber threats, make authentication and authorization processes more reliable, and prevent phishing and malware. However, it is important to develop appropriate artificial intelligence mechanisms to combat increasing cyber threats.

The interaction between artificial intelligence and humans is becoming a key factor in ensuring cybersecurity in our digital society. Thus, the role of artificial intelligence in the field of cyber defense is inherent in the modern digital environment.

This innovative tool enhances protection against cyberattacks but also poses new challenges that require attention to security and ethics.

References:

1. Vyshnevskyi, B., & Levytska, K. (2020). Artificial intelligence as a threat to cybersecurity of state institutions. Collection of Scientific Works of the National Academy for Public Administration, 3, 107-114.

2. Sengupta, J. (2021). Towards AI-powered autonomous system for real-time cyberattack detection and countermeasure strategy formulation. Electronic Commerce Research, 21(4), 763-789.

3. Potii, O.V., & Potii, V.O. (2021). Modern methods and tools for protection against cyberattacks. Computer Systems and Network Technologies, 3, 70-82.

4. Tkachenko, V.A., Zhyvytsia, A.V., & Kuksenko, S.P. (2022). Methods and tools for data security based on artificial intelligence technologies. Collection of Scientific Works of Ivan Kozhedub Kharkiv National Air Force University, 4 (68), 120-128.

5. Kormych, B.A. (2018). Organizational and legal principles of cybersecurity policy in Ukraine. Information and Law, 1, 32–43.



Creative Commons Attribution Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License

допомогаЗнайшли помилку? Виділіть помилковий текст мишкою і натисніть Ctrl + Enter


 Інші наукові праці даної секції
МОЖЛИВОСТІ GODOT ENGINE ДЛЯ РОЗРОБКИ ІГОР
30.01.2024 10:57
ВИРІШЕННЯ ЗАДАЧ ТЕОРІЇ ГРАФІВ ЗАСОБАМИ PYTHON
26.01.2024 13:35
НАВЧАННЯ ЧАТ- БОТА НА ОСНОВІ ДАНИХ КОРИСТУВАЧІВ
25.01.2024 14:25
ВИКОРИСТАННЯ ХМАРНИХ ТЕХНОЛОГІЙ БІЗНЕСОМ ПІД ЧАС ВІЙНИ: СУЧАСНІ ВИКЛИКИ ТА ПЕРСПЕКТИВИ
24.01.2024 22:01
ВАЖЛИВІСТЬ ТЕХНОЛОГІЇ БЛОКЧЕЙН ДЛЯ РІЗНИХ СФЕР ЛЮДСЬКОЇ ДІЯЛЬНОСТІ
24.01.2024 20:48
ДОБІР АЛГОРИТМІВ ШИФРУВАННЯ ДЛЯ ПОБУДОВИ ПРОГРАМИ-ШИФРАТОРА ТЕКСТОВИХ ПОВІДОМЛЕНЬ
24.01.2024 19:16
AUTOMATION OF INFORMATION ACCOUNTING PROCESSES IN THE DEAN'S OFFICE CONTROL SYSTEM
24.01.2024 18:47
ДОПОВНЕНА РЕАЛЬНІСТЬ В СОЦІАЛЬНИХ МЕРЕЖАХ: ЯК AR ТЕХНОЛОГІЇ ЗМІНЮЮТЬ СПОСОБИ ВЗАЄМОДІЇ ТА МАРКЕТИНГ
22.01.2024 18:36
ДОДАТКОВІ ПОХИБКИ У ТЕНЗОРЕЗИСТОРНИХ ДАТЧИКАХ
22.01.2024 17:46
АНАЛІЗ ПРОБЛЕМ ПІДВИЩЕННЯ ЕФЕКТИВНОСТІ ЗБОРУ СПЕЦІАЛІЗОВАНИХ ДАНИХ В БЕЗСЕРВЕРНИХ СИСТЕМАХ
22.01.2024 16:42




© 2010-2024 Всі права застережені При використанні матеріалів сайту посилання на www.economy-confer.com.ua обов’язкове!
Час: 0.464 сек. / Mysql: 1570 (0.4 сек.)