SlideShare a Scribd company logo
Artificial Intelligence In
Cyber Security
Enis Kovacevic
Introduction
• What is AI?
• Why AI in cyber security?
• The goal of increasing AI in cyber security?
Software Used
• SiteLock
• Heimdal CORP
• Log360
Risks.
• Infiltration can be undetectable.
• A lot can be lost.
• Algorithms are easily accessible.
• AI can assist hackers.
Detection Of Attack
• Start
• Scan
• Detect
Questions
• Thank you for being apart of my presentation and I hope you’ve
discovered the great things AI offers in Cyber Security!

More Related Content

What's hot

SkySync
SkySyncSkySync
SkySync
6PM Solutions
 
Web security
Web security Web security
Web security
Kaushal Bhavsar
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
Bunmi Sowande
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed Sanders
 
How secure is your website?
How secure is your website?How secure is your website?
How secure is your website?
Ian Grey
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
Mike Stone
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
Abhijeet Rane
 

What's hot (7)

SkySync
SkySyncSkySync
SkySync
 
Web security
Web security Web security
Web security
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your Business
 
How secure is your website?
How secure is your website?How secure is your website?
How secure is your website?
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Artifical Intelligence in Cyber Security

Editor's Notes

  1. Simple introduction of who I am, welcome them softly and energetically Break down what the title stands for Background on myself (Major, year, future career)
  2. What is AI? – Artificial Intelligence as its name stands for is the hypothesis and improvement of PC frameworks ready to perform assignments that regularly require human knowledge, for example, visual observation, discourse acknowledgment, dynamic, and interpretation between dialects Why AI in cyber security? – Often discussed as the justifiable protected needed to be used against digital attacks or cracks. As the years progress the fight against digital weapons, attacks, and malware wages on increasingly becoming a difficult battle. Replacing human interaction from the attack the program would act much faster and render out actions at a quicker rate to more effectively evade the attack. AI replaces the functions a human would do with a pre-set program already running so it could locate the threat before it appears, while it is attempted to gain access, or even worse doing something harmful to the database, machine, etc. Our goal with replacing cyber security with AI would be to cut down on the amount of attack are successfully infiltrated. Increase the amount of prevented attacks, secure everyone's data, privacy, etc. The positive impact that AI has in this department that a lot of the software's provided are typically free with an option to upgrade to a better package to get better protection. As time goes on the AI gets smarter, faster, and more impeccable with the skillset it assembles through the user operating it and giving it instructions.
  3. SiteLock: Known as main web security and cybersecurity programming with millions of sites under its assurance. Offers 360-degree security to discovering vulnerabilities, from consequently evacuating malware to WordPress database filtering, this arrangement protects against all DDoS assaults and satisfies all PCI consistence guidelines. SiteLock Cybersecurity Features : Behavioral Analytics, Endpoint Management, Incident Management, Vulnerability Scanning, Whitelisting/Blacklisting Heimdal CORP: The answer for malware observing, programming the board, web traffic detailing, and web examining and separating. Its most notable highlights are for AI/Machine learning, social examination, etc. LOG360: A log the board and cybersecurity device that assists organizations with keeping their system and information liberated from malevolent movement. With continuous examination, relationship and documenting capacities, this arrangement screens basic changes in gatherings and track suspicious clients' conduct. It is an incorporated arrangement that consolidates ADAudit Plus and EventLog Analyzer into a solitary support. The prime highlights incorporate insurance of classified information and obstruct interior security dangers.
  4. AI calculations work by investigating information and yield information at that point utilizing that information to change the framework for various conditions. Therefore, the calculation learns by doing and refines the procedure iteratively. To the extent cybersecurity goes, this presents two dangers. Since the AI framework is engaged to settle on choices and conclusions in a computerized manner with almost no human mediation, any trade off and invasion can go undetected for some time. These algorithms are generally accessible on the web and genuinely simple to utilize. Similar open-source programming and libraries that can be utilized for real purposes can likewise be a wellspring of defenselessness that would work for the lawbreaker. Aggressors can make malware that conceals its starting point and method in this way making it increasingly hard for customary security devices to recognize its computerized unique finger impression. It's as of now feasible for one to buy customized malware on the Dark Web that can dodge location by the main antiviruses. An AI malware unit can include secrecy that guarantees it's constantly a stride in front of updates to antivirus programming and other cautious frameworks.
  5. Attacks aren’t typically a very rare occurrence typically when an cyber security software is installed there is a scanning phase In the scanning phase it would approximately take numerous minutes or hours to complete depending on the size of the hard drive and the amount of data on the machine The AI then scans through the machine searching each file one by one looking for any suspicious .exe files where they shouldn’t be or anything that could be misleading and a virus instead This is also done every time before a new application or program is installed into the machine to prevent anything from entering that shouldn’t be intended for the user Once it’s detected there are numerous functions that can be done to handle the situation at hand to take care of the attack If something is detected that’s already been there and harming you there are options to recover the data lost, harmed, or stolen to prevent more from happening
  6. Close the presentation with sincere thank you and answer any loose questions and concerns by the audience.