SlideShare a Scribd company logo
1 of 15
Download to read offline
Spotle.ai Study Material
Spotle.ai/Learn
AI
And
Cyber-security
Threats
Spotle.ai Study Material
Spotle.ai/Learn
You have locked your door and
went out to a shopping mall. In
the meanwhile if someone can
break into your home and steal
your valuables. That is a threat
to the home security. Right?
What is
cyber-security
threat?
Spotle.ai Study Material
Spotle.ai/Learn
Similarly, if someone or a
group of people can maliciously
break your online security and
steal or manipulate your digital
information such as financial
details, corporate details,
personal details that’s a threat
to your cyber security.
What is
cyber-security
threat?
Spotle.ai Study Material
Spotle.ai/Learn
AI is nothing but algorithms,
codes and how you are using
them. As a matter of fact, there
will be good usage as well as bad
usage of AI. And AI is bound to
create more deadly threats to our
digital life than there is already.
We need to be aware of the
threats AI can bring to us over
internet.
Good AI Bad AI
Spotle.ai Study Material
Spotle.ai/Learn
Before your machine learning
algorithms starts working for
you they need to be trained to
perform. This is just like how
we learn. For an Amazon Alexa
to answer your questions it
needs to be trained with a lot of
training data.
Corrupt learning and
data sabotaging
Spotle.ai Study Material
Spotle.ai/Learn
But if your system is fed with
fake/ incorrect/ altered data
your system will learn garbage
and produce garbage.
Corrupt learning and
data sabotaging
Spotle.ai Study Material
Spotle.ai/Learn
This can entirely disrupt the
decision making and operations
in businesses. For companies
that depend on AI based
automation for supply-chain and
sales, a sabotaged data set may
result in drastic under or
oversupply and overproduction
of products leading to huge loss.
Corrupt learning and
data sabotaging
Spotle.ai Study Material
Spotle.ai/Learn
BEC or Business Email
Compromise is something in
which attackers pose as CEOs
and other senior-level managers
to trick people in charge of
banking accounts to make
fraudulent transfers in the guise
of closing a deal or otherwise
getting business done.
Deepfaking your business
Spotle.ai Study Material
Spotle.ai/Learn
And now attackers are using AI
powered audio calls to deepfake
their targets. Experts believe we
will see increased use of
AI-powered deepfake audio to
carry out BEC-style attacks in
2020.
Deepfaking your business
Spotle.ai Study Material
Spotle.ai/Learn
Facial recognition technique is a
more secured way of protecting
your sensitive information on
digital platform. Financial
institutions are rapidly building
AI-powered facial recognition
based authentication
mechanisms that can confirm
online identity using mobile
cameras and stored image of the
person.
Deepfaking your identity
Spotle.ai Study Material
Spotle.ai/Learn
It is suspected that mechanism
to dupe these systems are in use
that uses AI to deepfake
identities.
Deepfaking your identity
Spotle.ai Study Material
Spotle.ai/Learn
More advanced data
masking will be needed to
shield the customer analytics
as well as other secret
corporate information
leaking via employee social
data sharing. Advanced AI
will be used to crack the
analytics. More advanced
rapidly evolving AI
algorithms will be needed to
counter that.
Compromised secrets
Spotle.ai Study Material
Spotle.ai/Learn
AI-powered malware
Anytime in the coming days we
suspect to see advanced
malwares powered by AI. This
will severely challenge our way
of digital life and totally disrupt
it.
Spotle.ai Study Material
Spotle.ai/Learn
The beginning
However, what we have
witnessed so far may be just the
tip of an iceberg. No one knows
exactly how big or deadly cyber
attacks are coming via AI in the
near future.
Our estimate says, cybersecurity
is going to be one of the most
sought after skills in 2021. It
better be ready.
Spotle.ai Study Material
Spotle.ai/Learn
#HappyLearning
#BeCareerReady

More Related Content

What's hot

Data security problems
Data security problemsData security problems
Data security problems
sou0001
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 

What's hot (20)

Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hacking
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hacking
 
Data security problems
Data security problemsData security problems
Data security problems
 
Phishing
PhishingPhishing
Phishing
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing
PhishingPhishing
Phishing
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
NII Social Engineering Case Study
NII Social Engineering Case StudyNII Social Engineering Case Study
NII Social Engineering Case Study
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Security provisions
Security provisions Security provisions
Security provisions
 
Information security
Information securityInformation security
Information security
 

Similar to AI And Cyber-security Threats

Similar to AI And Cyber-security Threats (20)

How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
Data breach
Data breachData breach
Data breach
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
How Artificial Intelligence Is Used For Cybersecurity Attacks
 How Artificial Intelligence Is Used For Cybersecurity Attacks  How Artificial Intelligence Is Used For Cybersecurity Attacks
How Artificial Intelligence Is Used For Cybersecurity Attacks
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 

More from Spotle.ai

More from Spotle.ai (20)

Spotle AI-thon - AI For Good Business Plan Showcase - Team IIM Indore - AI Ro...
Spotle AI-thon - AI For Good Business Plan Showcase - Team IIM Indore - AI Ro...Spotle AI-thon - AI For Good Business Plan Showcase - Team IIM Indore - AI Ro...
Spotle AI-thon - AI For Good Business Plan Showcase - Team IIM Indore - AI Ro...
 
Spotle AI-thon - AI For Good Business Plan Showcase - Cummins College
Spotle AI-thon - AI For Good Business Plan Showcase - Cummins CollegeSpotle AI-thon - AI For Good Business Plan Showcase - Cummins College
Spotle AI-thon - AI For Good Business Plan Showcase - Cummins College
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Elit...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Elit...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Elit...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Elit...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India- Ankur chat...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India- Ankur chat...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India- Ankur chat...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India- Ankur chat...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team La c...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team La c...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team La c...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team La c...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Temp...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Temp...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Temp...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Temp...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Zer...
 Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Zer... Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Zer...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Zer...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Shivam Gi...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Shivam Gi...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Shivam Gi...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Shivam Gi...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Cyber Pun...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Cyber Pun...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Cyber Pun...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Cyber Pun...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Tech Owls...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Tech Owls...Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Tech Owls...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Tech Owls...
 
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Jar...
 Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Jar... Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Jar...
Spotle AI-thon Top 10 Showcase - Analysing Mental Health Of India - Team Jar...
 
Artificial intelligence in fintech
Artificial intelligence in fintechArtificial intelligence in fintech
Artificial intelligence in fintech
 
Semi-supervised Machine Learning
Semi-supervised Machine LearningSemi-supervised Machine Learning
Semi-supervised Machine Learning
 
Basics of Reinforcement Learning
Basics of Reinforcement LearningBasics of Reinforcement Learning
Basics of Reinforcement Learning
 
Tableau And Data Visualization - Get Started
Tableau And Data Visualization - Get StartedTableau And Data Visualization - Get Started
Tableau And Data Visualization - Get Started
 
Artificial Intelligence in FinTech
Artificial Intelligence in FinTechArtificial Intelligence in FinTech
Artificial Intelligence in FinTech
 
Supervised and Unsupervised Machine Learning
Supervised and Unsupervised Machine LearningSupervised and Unsupervised Machine Learning
Supervised and Unsupervised Machine Learning
 
Growing-up With AI
Growing-up With AIGrowing-up With AI
Growing-up With AI
 
Robotic Process Automation With Blue Prism
Robotic Process Automation With Blue PrismRobotic Process Automation With Blue Prism
Robotic Process Automation With Blue Prism
 
Get started with Microsoft Azure
Get started with Microsoft AzureGet started with Microsoft Azure
Get started with Microsoft Azure
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

AI And Cyber-security Threats

  • 2. Spotle.ai Study Material Spotle.ai/Learn You have locked your door and went out to a shopping mall. In the meanwhile if someone can break into your home and steal your valuables. That is a threat to the home security. Right? What is cyber-security threat?
  • 3. Spotle.ai Study Material Spotle.ai/Learn Similarly, if someone or a group of people can maliciously break your online security and steal or manipulate your digital information such as financial details, corporate details, personal details that’s a threat to your cyber security. What is cyber-security threat?
  • 4. Spotle.ai Study Material Spotle.ai/Learn AI is nothing but algorithms, codes and how you are using them. As a matter of fact, there will be good usage as well as bad usage of AI. And AI is bound to create more deadly threats to our digital life than there is already. We need to be aware of the threats AI can bring to us over internet. Good AI Bad AI
  • 5. Spotle.ai Study Material Spotle.ai/Learn Before your machine learning algorithms starts working for you they need to be trained to perform. This is just like how we learn. For an Amazon Alexa to answer your questions it needs to be trained with a lot of training data. Corrupt learning and data sabotaging
  • 6. Spotle.ai Study Material Spotle.ai/Learn But if your system is fed with fake/ incorrect/ altered data your system will learn garbage and produce garbage. Corrupt learning and data sabotaging
  • 7. Spotle.ai Study Material Spotle.ai/Learn This can entirely disrupt the decision making and operations in businesses. For companies that depend on AI based automation for supply-chain and sales, a sabotaged data set may result in drastic under or oversupply and overproduction of products leading to huge loss. Corrupt learning and data sabotaging
  • 8. Spotle.ai Study Material Spotle.ai/Learn BEC or Business Email Compromise is something in which attackers pose as CEOs and other senior-level managers to trick people in charge of banking accounts to make fraudulent transfers in the guise of closing a deal or otherwise getting business done. Deepfaking your business
  • 9. Spotle.ai Study Material Spotle.ai/Learn And now attackers are using AI powered audio calls to deepfake their targets. Experts believe we will see increased use of AI-powered deepfake audio to carry out BEC-style attacks in 2020. Deepfaking your business
  • 10. Spotle.ai Study Material Spotle.ai/Learn Facial recognition technique is a more secured way of protecting your sensitive information on digital platform. Financial institutions are rapidly building AI-powered facial recognition based authentication mechanisms that can confirm online identity using mobile cameras and stored image of the person. Deepfaking your identity
  • 11. Spotle.ai Study Material Spotle.ai/Learn It is suspected that mechanism to dupe these systems are in use that uses AI to deepfake identities. Deepfaking your identity
  • 12. Spotle.ai Study Material Spotle.ai/Learn More advanced data masking will be needed to shield the customer analytics as well as other secret corporate information leaking via employee social data sharing. Advanced AI will be used to crack the analytics. More advanced rapidly evolving AI algorithms will be needed to counter that. Compromised secrets
  • 13. Spotle.ai Study Material Spotle.ai/Learn AI-powered malware Anytime in the coming days we suspect to see advanced malwares powered by AI. This will severely challenge our way of digital life and totally disrupt it.
  • 14. Spotle.ai Study Material Spotle.ai/Learn The beginning However, what we have witnessed so far may be just the tip of an iceberg. No one knows exactly how big or deadly cyber attacks are coming via AI in the near future. Our estimate says, cybersecurity is going to be one of the most sought after skills in 2021. It better be ready.