SlideShare a Scribd company logo
1 of 6
Artificial Intelligence In
Cyber Security
Enis Kovacevic
Introduction
• What is AI?
• Why AI in cyber security?
• The goal of increasing AI in cyber security?
Software Used
• SiteLock
• Heimdal CORP
• Log360
Risks.
• Infiltration can be undetectable.
• A lot can be lost.
• Algorithms are easily accessible.
• AI can assist hackers.
Detection Of Attack
• Start
• Scan
• Detect
Questions
• Thank you for being apart of my presentation and I hope you’ve
discovered the great things AI offers in Cyber Security!

More Related Content

What's hot

Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your Business
Ted Sanders
 

What's hot (7)

SkySync
SkySyncSkySync
SkySync
 
Web security
Web security Web security
Web security
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your Business
 
How secure is your website?
How secure is your website?How secure is your website?
How secure is your website?
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 

Artifical Intelligence in Cyber Security

Editor's Notes

  1. Simple introduction of who I am, welcome them softly and energetically Break down what the title stands for Background on myself (Major, year, future career)
  2. What is AI? – Artificial Intelligence as its name stands for is the hypothesis and improvement of PC frameworks ready to perform assignments that regularly require human knowledge, for example, visual observation, discourse acknowledgment, dynamic, and interpretation between dialects Why AI in cyber security? – Often discussed as the justifiable protected needed to be used against digital attacks or cracks. As the years progress the fight against digital weapons, attacks, and malware wages on increasingly becoming a difficult battle. Replacing human interaction from the attack the program would act much faster and render out actions at a quicker rate to more effectively evade the attack. AI replaces the functions a human would do with a pre-set program already running so it could locate the threat before it appears, while it is attempted to gain access, or even worse doing something harmful to the database, machine, etc. Our goal with replacing cyber security with AI would be to cut down on the amount of attack are successfully infiltrated. Increase the amount of prevented attacks, secure everyone's data, privacy, etc. The positive impact that AI has in this department that a lot of the software's provided are typically free with an option to upgrade to a better package to get better protection. As time goes on the AI gets smarter, faster, and more impeccable with the skillset it assembles through the user operating it and giving it instructions.
  3. SiteLock: Known as main web security and cybersecurity programming with millions of sites under its assurance. Offers 360-degree security to discovering vulnerabilities, from consequently evacuating malware to WordPress database filtering, this arrangement protects against all DDoS assaults and satisfies all PCI consistence guidelines. SiteLock Cybersecurity Features : Behavioral Analytics, Endpoint Management, Incident Management, Vulnerability Scanning, Whitelisting/Blacklisting Heimdal CORP: The answer for malware observing, programming the board, web traffic detailing, and web examining and separating. Its most notable highlights are for AI/Machine learning, social examination, etc. LOG360: A log the board and cybersecurity device that assists organizations with keeping their system and information liberated from malevolent movement. With continuous examination, relationship and documenting capacities, this arrangement screens basic changes in gatherings and track suspicious clients' conduct. It is an incorporated arrangement that consolidates ADAudit Plus and EventLog Analyzer into a solitary support. The prime highlights incorporate insurance of classified information and obstruct interior security dangers.
  4. AI calculations work by investigating information and yield information at that point utilizing that information to change the framework for various conditions. Therefore, the calculation learns by doing and refines the procedure iteratively. To the extent cybersecurity goes, this presents two dangers. Since the AI framework is engaged to settle on choices and conclusions in a computerized manner with almost no human mediation, any trade off and invasion can go undetected for some time. These algorithms are generally accessible on the web and genuinely simple to utilize. Similar open-source programming and libraries that can be utilized for real purposes can likewise be a wellspring of defenselessness that would work for the lawbreaker. Aggressors can make malware that conceals its starting point and method in this way making it increasingly hard for customary security devices to recognize its computerized unique finger impression. It's as of now feasible for one to buy customized malware on the Dark Web that can dodge location by the main antiviruses. An AI malware unit can include secrecy that guarantees it's constantly a stride in front of updates to antivirus programming and other cautious frameworks.
  5. Attacks aren’t typically a very rare occurrence typically when an cyber security software is installed there is a scanning phase In the scanning phase it would approximately take numerous minutes or hours to complete depending on the size of the hard drive and the amount of data on the machine The AI then scans through the machine searching each file one by one looking for any suspicious .exe files where they shouldn’t be or anything that could be misleading and a virus instead This is also done every time before a new application or program is installed into the machine to prevent anything from entering that shouldn’t be intended for the user Once it’s detected there are numerous functions that can be done to handle the situation at hand to take care of the attack If something is detected that’s already been there and harming you there are options to recover the data lost, harmed, or stolen to prevent more from happening
  6. Close the presentation with sincere thank you and answer any loose questions and concerns by the audience.