6. Questions
• Thank you for being apart of my presentation and I hope you’ve
discovered the great things AI offers in Cyber Security!
Editor's Notes
Simple introduction of who I am, welcome them softly and energetically
Break down what the title stands for
Background on myself (Major, year, future career)
What is AI? – Artificial Intelligence as its name stands for is the hypothesis and improvement of PC frameworks ready to perform assignments that regularly require human knowledge, for example, visual observation, discourse acknowledgment, dynamic, and interpretation between dialects
Why AI in cyber security? – Often discussed as the justifiable protected needed to be used against digital attacks or cracks. As the years progress the fight against digital weapons, attacks, and malware wages on increasingly becoming a difficult battle. Replacing human interaction from the attack the program would act much faster and render out actions at a quicker rate to more effectively evade the attack. AI replaces the functions a human would do with a pre-set program already running so it could locate the threat before it appears, while it is attempted to gain access, or even worse doing something harmful to the database, machine, etc. Our goal with replacing cyber security with AI would be to cut down on the amount of attack are successfully infiltrated. Increase the amount of prevented attacks, secure everyone's data, privacy, etc.
The positive impact that AI has in this department that a lot of the software's provided are typically free with an option to upgrade to a better package to get better protection. As time goes on the AI gets smarter, faster, and more impeccable with the skillset it assembles through the user operating it and giving it instructions.
SiteLock: Known as main web security and cybersecurity programming with millions of sites under its assurance. Offers 360-degree security to discovering vulnerabilities, from consequently evacuating malware to WordPress database filtering, this arrangement protects against all DDoS assaults and satisfies all PCI consistence guidelines. SiteLock Cybersecurity Features : Behavioral Analytics, Endpoint Management, Incident Management, Vulnerability Scanning, Whitelisting/Blacklisting
Heimdal CORP: The answer for malware observing, programming the board, web traffic detailing, and web examining and separating. Its most notable highlights are for AI/Machine learning, social examination, etc.
LOG360: A log the board and cybersecurity device that assists organizations with keeping their system and information liberated from malevolent movement. With continuous examination, relationship and documenting capacities, this arrangement screens basic changes in gatherings and track suspicious clients' conduct. It is an incorporated arrangement that consolidates ADAudit Plus and EventLog Analyzer into a solitary support. The prime highlights incorporate insurance of classified information and obstruct interior security dangers.
AI calculations work by investigating information and yield information at that point utilizing that information to change the framework for various conditions. Therefore, the calculation learns by doing and refines the procedure iteratively. To the extent cybersecurity goes, this presents two dangers. Since the AI framework is engaged to settle on choices and conclusions in a computerized manner with almost no human mediation, any trade off and invasion can go undetected for some time.
These algorithms are generally accessible on the web and genuinely simple to utilize. Similar open-source programming and libraries that can be utilized for real purposes can likewise be a wellspring of defenselessness that would work for the lawbreaker.
Aggressors can make malware that conceals its starting point and method in this way making it increasingly hard for customary security devices to recognize its computerized unique finger impression. It's as of now feasible for one to buy customized malware on the Dark Web that can dodge location by the main antiviruses. An AI malware unit can include secrecy that guarantees it's constantly a stride in front of updates to antivirus programming and other cautious frameworks.
Attacks aren’t typically a very rare occurrence typically when an cyber security software is installed there is a scanning phase
In the scanning phase it would approximately take numerous minutes or hours to complete depending on the size of the hard drive and the amount of data on the machine
The AI then scans through the machine searching each file one by one looking for any suspicious .exe files where they shouldn’t be or anything that could be misleading and a virus instead
This is also done every time before a new application or program is installed into the machine to prevent anything from entering that shouldn’t be intended for the user
Once it’s detected there are numerous functions that can be done to handle the situation at hand to take care of the attack
If something is detected that’s already been there and harming you there are options to recover the data lost, harmed, or stolen to prevent more from happening
Close the presentation with sincere thank you and answer any loose questions and concerns by the audience.