Assignment 4 (1) .Edited
Assignment 4 (1) .Edited
Table of Contents
1. Introduction.............................................................................................................................2
2. Demonstration of background and previous work..................................................................2
3. Motivation for undertaking the research.................................................................................2
4. Literature Review....................................................................................................................2
5. Extended Review and Findings..............................................................................................3
6. The research fits the existing body of knowledge and theory related to the disciplinary area
………………………………………………………………………………………………………...3
7. Problem statement.................................................................................................................4
8. Contexts of the study..............................................................................................................4
9. Purpose of the Study..............................................................................................................4
10. Methodology.......................................................................................................................5
11. Description of the data collection method and analysis......................................................5
12. Selection of research context.............................................................................................5
13. Analysis of the methods applied based on the Research Perspective...............................6
14. Data and context analysis...................................................................................................6
15. Findings and contribution of the information.......................................................................6
16. Convincing arguments........................................................................................................7
17. Conclusion..........................................................................................................................7
18. Limitations and delimitations...............................................................................................8
19. Significance of study...........................................................................................................8
20. Suggestions........................................................................................................................8
References..................................................................................................................................10
2
1. Introduction
Nature of Project
● Looks into how AI is changing cybersecurity.
● Evaluates data in real-time to find dangers and improve defense strategies.
● Look at the prospects, problems, and characteristics of AI in corporate cybersecurity
defense.
By improving defense strategies, examining AI's predictive capabilities, and analyzing real-time
data to identify threats, the study explores how AI is changing cybersecurity. It looks at the
prospects, problems, and characteristics of AI in business cybersecurity defense systems.
Previous studies have demonstrated the use of AI in cybersecurity and corporate defense through
machine learning algorithms. Using previously conducted data, this study investigates the
relationship between AI and cybersecurity and its effects on industry defense.
4. Literature Review
The context for the research
3
As per established research, AI can help in mitigating various cyber threats which are the result
of corporations' ever-increasing likeliness to attacks as a result of their reliance on modern digital
infrastructure. AI works by improving cybersecurity through its ability to foresee risks and spot
irregularities. This research examines AI's potential for creating cutting-edge defense tactics.
6. The research fits the existing body of knowledge and theory related to the disciplinary
area
"Machine learning theory" demonstrates how it can behave like humans and get better
with time (Karpunina et al., 2020).
Capacity to build responsive systems for cyber threat identification and response with the
use of "complex system theory" (Crawford, 2020).
The "machine learning theory" lays forth the fundamentals of how AI may learn from data
without explicit programming and eventually behave like humans. "Complex system theory"
4
7. Problem statement
Improving cybersecurity through facts like better risk identification, behavior analysis,
and real-time data analysis (Al-Suqri and Gillani, 2022).
This paper investigates how it is transforming cybersecurity in several industries.
The study takes a critical look at how this unprecedented technology is transforming corporate
cybersecurity protection. Research questions examine the forces behind this transformation, the
importance of cybersecurity that has been revolutionized, problems with AI in defense, and
methods for overcoming related difficulties.
5
10. Methodology
Demonstration of the research methodology
The study is supported by the "Positive Social Science (PSS)" methodology (Ansari et
al., 2022).
The benefits of enhanced cybersecurity in the modern business environment are
demonstrated.
Examination of obstacles and mitigating factors related to transformational AI technology
(Drew, 2016).
Analysis of secondary data sheds light on how AI is being implemented by businesses.
The "Positive Social Science (PSS)" technique facilitates the gathering of data demonstrating
AI's effect on lower business risks. There is an examination of barriers to and mitigating
variables surrounding disruptive AI technology, and secondary data analysis sheds light on how
businesses are implementing AI into their daily operations.
To obtain reliable information, researchers use secondary data collected from reliable sources
such as EBSCO and Google Scholar. The "qualitative data analysis" approach highlights trends
and highlights how AI improves business defense networks.
and suggests using tactical AI to reduce risks. It addresses broader socioeconomic effects in an
effort to provide a thorough grasp of AI's contribution to the development of cybersecurity.
The paper underscores and evaluates this tech’s contribution to cybersecurity by promotion and
upgradation of proactive protection and threat prediction through various ways like effective
analysis of historical data (Shanmugavadivu & Nagarajan, 2023). AI simulation models can even
assist in resource allocation and strategic decision-making (Arockiasamy, 2023).
The research reveals this technology’s dual role in cybersecurity and at the same time
emphasizes the need for changeable defense methods. It also goes on to recommend new
unconventional methods like deception methods and adversarial machine learning in order to
combat evolving threats.
Cyberattacks using AI convert and utilize various online platforms by improving detection skills
and working on automating threat identification. The deployment of this tech in security is
hindered by limited resources and neural fuzzing difficulty. Overcoming hackers is essential to
bringing technology together. It's critical to look into how AI might improve cybersecurity
measures and meet human requirements.
17. Conclusion
Give extended research and different models a priority in order to improve industry
defense strategies.
Stress the need to use it responsibly and accountably, fusing moral and ethical principles
with modern tech.
Assure global collab and holistic approach in regulatory standards to provide an all-
encompassing defense.
One main argument that arises is giving extended research and new developing models a priority
in order to improve industry protection. Stress the use of AI responsibly while including moral
8
frameworks. Assure global cooperation in the development of regulatory standards for all-
encompassing security threat prevention.
The development of AI as a defense tool for industry comes with limitations, like increased
cyber threats and rapidly out-of-date findings. Additional difficulties arise from ethical
conundrums such as biases and transparency. To effectively explore the cybersecurity
implications of AI, addressing these requires interdisciplinary collaboration, rigorous adherence
to research protocols, and ongoing adaptation.
20. Suggestions
Future studies should encourage collaboration between lawmakers, technologists, and business
executives to combat hazardous AI applications in cyberspace. It is essential to promote the
cross-border sharing of cybersecurity knowledge and data and to reward private-sector
collaboration. Important first steps toward improving security and performance include creating
certification standards for AI defensive systems and giving AI dependability top priority in
standards and certification procedures.
10
References
Alhayani, B., Mohammed, H.J., Chaloob, I.Z. and Ahmed, J.S., 2021. The effectiveness of
artificial intelligence techniques against cyber security risks apply to the IT industry. Materials
Today: Proceedings, 531.
https://www.academia.edu/download/66000244/1_s2.0_S2214785321016722_main.pdf
Al-Suqri, M.N. and Gillani, M., 2022. A comparative analysis of information and artificial
intelligence toward national security. IEEE Access, 10, pp.64420-64434.
https://ieeexplore.ieee.org/abstract/document/9797706
Ansari, M.F., Dash, B., Sharma, P. and Yathiraju, N., 2022. The impact and limitations of
artificial intelligence in cybersecurity: a literature review. International Journal of Advanced
Research in Computer and Communication Engineering.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4323317
Arockiasamy, K., 2023. The Role of Artificial Intelligence in Cyber Security. In AI Tools for
Protecting and Preventing Sophisticated Cyber Attacks (pp. 1-24). IGI Global. https://www.igi-
global.com/chapter/the-role-of-artificial-intelligence-in-cyber-security/328592
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), pp.1153-
1176. https://ieeexplore.ieee.org/abstract/document/7307098/
Cali, U., Catak, F.O. and Halden, U., Trustworthy Cyber-Physical Power Systems Using Ai:
Dueling Algorithms for Pmu Anomaly Detection and Cybersecurity. Available at SSRN
4695936. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4695936
Crawford, T.H., 2020. Actor-network theory. In Oxford research encyclopedia of literature.
https://oxfordre.com/literature/display/10.1093/acrefore/9780190201098.001.0001/acrefore-
9780190201098-e-965
Drew, R., 2016. Technological determinism. A companion to popular culture, pp.165-183.
https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118883341.ch10
Graue, C., 2015. Qualitative data analysis. International Journal of Sales, Retailing &
Marketing, 4(9), pp.5-14.
https://www.circleinternational.co.uk/wp-content/uploads/2021/01/IJSRM4-9.pdf#page=9
11
Hutter, R. and Hutter, M., 2021. Chances and Risks of Artificial Intelligence—A Concept of
Developing and Exploiting Machine Intelligence for Future Societies. Applied System
Innovation, 4(2), p.37. https://www.mdpi.com/2571-5577/4/2/37
Iqbal, S., Rizvi, S.W.A., Haider, M.H. and Raza, S., 2023. Artificial Intelligence in Security and
Defense: Explore the integration of AI in military strategies, security policies, and its
implications for global power dynamics. INTERNATIONAL JOURNAL OF HUMAN AND
SOCIETY, 3(4), pp.341-353. https://ijhs.com.pk/index.php/IJHS/article/view/337
Jimmy, F., 2021. Emerging Threats: The Latest Cybersecurity Risks and the Role of Artificial
Intelligence in Enhancing Cybersecurity Defenses. Valley International Journal Digital Library,
pp.564-574. https://vipublisher.com/index.php/vij/article/view/292
Johnson, E. and Sylvia, M.L., 2018. Secondary data collection. Critical Analytics and Data
Management for the DNP, p.61. https://books.google.com/books?
hl=en&lr=&id=dvtIDwAAQBAJ&oi=fnd&pg=PA61&dq=Secondary+data+collection.
+Critical+Analytics+and+Data+Management+&ots=bZOKtOYPNH&sig=n7sZ2CcCgV9apSFh
_z7t8gbvcwA
Karpunina, E.K., Dedov, S.V., Kholod, M.V., Ponomarev, S.V. and Gorlova, E.A., 2020.
Artificial intelligence and its impact on economic security: Trends, estimates and forecasts. In
Scientific and Technical Revolution: Yesterday, Today and Tomorrow (pp. 213-225). Springer
International Publishing. https://link.springer.com/chapter/10.1007/978-3-030-47945-9_23
Khan, S.U., Eusufzai, F., Azharuddin Redwan, M., Ahmed, M. and Sabuj, S.R., 2022. Artificial
intelligence for cyber security: performance analysis of network intrusion detection. In
Explainable artificial intelligence for cyber security: Next generation artificial intelligence (pp.
113-139). Cham: Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-030-96630-0_6
Kumar, S., Gupta, U., Singh, A.K. and Singh, A.K., 2023. Artificial intelligence: revolutionizing
cyber security in the digital era. Journal of Computers, Mechanical and Management, 2(3),
pp.31-42. https://jcmm.co.in/index.php/jcmm/article/view/64
Manoharan, A. and Sarker, M., 2023. Revolutionizing Cybersecurity: Unleashing the Power of
Artificial Intelligence and Machine Learning for Next-Generation Threat Detection. DOI:
https://www. doi. org/10.56726/IRJMETS32644, 1.
12
Naik, B., Mehta, A., Yagnik, H. and Shah, M., 2022. The impacts of artificial intelligence
techniques in augmentation of cybersecurity: a comprehensive review. Complex & Intelligent
Systems, 8(2), pp.1763-1780. https://link.springer.com/article/10.1007/s40747-021-00494-8
Nickerson, C., 2022. Positivism in sociology: definition, theory & examples. Simply Psychology.
https://www.simplypsychology.org/positivism-in-sociology-definition-theory-examples.html
Raimundo, R. and Rosário, A., 2021. The impact of artificial intelligence on data system
security: a literature review. Sensors, 21(21), p.7029. https://www.mdpi.com/1424-
8220/21/21/7029
Sarker, I.H., Kayes, A.S.M. and Watters, P., 2019. Effectiveness analysis of machine learning
classification models for predicting personalized context-aware smartphone usage. Journal of
Big Data, 6(1), pp.1-28. https://link.springer.com/article/10.1186/s40537-019-0219-y
Shanmugavadivu, R. and Nagarajan, N., 2011. Network intrusion detection system using fuzzy
logic. Indian Journal of Computer Science and Engineering (IJCSE), 2(1), pp.101-111.
https://citeseerx.ist.psu.edu/document?
repid=rep1&type=pdf&doi=87614275882023d81b0c8814c4f7a13f6ba4cb7b