SlideShare a Scribd company logo
Team 20: Threat Attack: AI Cyber Security Company
Decision making
Analysis: The very first function of management as far as
information security is concerned is to ensure that the
company's data is safe. Cybersecurity can put a company is a
compromising situation, make it pay millions or even cause
irreparable damage to a company. For instance, Target paid a
whopping $18.5 million in the settlement because of cyber
attacks (Jalali, Siegel & Madnick, 2019, March). The
management should be at the forefront of protecting such
losses. The management should also ensure that there is data
confidentiality, availability, and integrity. It was also important
to use the benchmark with other security companies while
setting the price. The period set for test Machine learning and
testing for the Defense system is appropriate because the users
will be familiar with the system after four or more months.
Recommendation for improvement: For a startup, there is a need
to consolidate strategies to ensure that you don't run many
programs that will need finances while the company is still
young. For instance, you can only have two strategies per
column on the adoption strategies. As a startup, the idea of
acquisitions should also wait, unless you want to be acquired by
an established company such as AVAST or IBM.
Innovation
Analysis: First, creating a security system that works with AI,
and AR among other systems is a great innovation. Secondly,
the product allows customers to know that something is wrong
in their system before a cyber-attack is finally executed. This
will be a real deal for companies and individuals because the
rising cybersecurity threats are a concern to many institutions
who are losing millions of dollars. Lastly, the use of complex
mathematics and machine learning will allow the product to
detect threats in real time.
Recommendation for improvement: The time it takes to install
this product is a concern. There is a need to benchmark with
other established cybersecurity companies such as AVAST and
McAfee to reduce the installation time. For example, with
AVAST, it takes just 2 to 3 minutes to download and install it
on your device. Also, the team should ensure that the product
protects major threat routes such as web security and email.
Most attacks are through email by use of malicious attachments
and phishing emails as well as unsafe URLs.
Management
Analysis: The blend in the team I charge of the company is
amazing. For instance, Melina Samuel, who is a professor of
Applied Probability, will help in the creation of complex
mathematical problems, Vishal Patel will deal with AI solutions
and AI technology, Katherine King will be in charge of
marketing to ensure that the company is successful and Chris
Cha will head the team as the CEO. With such experience, the
company is most likely to succeed and be a force to reckon in
the Cyber Security Industry.
Recommendation for improvement: The management should
organize training with their top customers to teach them on the
basics of cybersecurity. They should also update the system
regularly.
Motivation
Analysis: The first motivation is from the selected management
team. Having such top and experienced personalities will give
the company the motivation to succeed. You also chose the best
industry where there is healthy competition with each company
having a considerable share of the market. This will motivate
the management to know that there is a likelihood of them also
getting their share. The last motivating factor is that technology
is here to stay and is evolving day and night. Many people,
startups and established companies are shifting from paperwork
to computers. This is an assurance that the market will continue
to grow and the company will surely succeed.
Recommendation for improvement: You should include
strategies that will help in motivating the employees that shall
help in the day to day running of the company.
References
Jalali, M., Siegel, M. & Madnick, S. (2019, March). Decision-
making and biases in cybersecurity capability development:
Evidence from a simulation game experiment. Retrieved from
https://www.sciencedirect.com/science/article/pii/S0963868717
304353
Defense Attack
AI Cyber Security Company
Team 20
The problem: Cyber Data Breach is on the Rise
Customer Pain Points
● Cyber attack is on the rise, protection
is a must
● Cyber attack is costly to firms
● Cyber breach damages consumer
trust and firm’s credibility
● Threat can come from within the
network
Mission Statement:
We fight cyber security in the same
way our immune system fights
diseases
The solution
● Detects abnormal behavior and
fights back in real time
● Easy and fast installation (1-2
hours)
● Scalable to over million devices
● Works with sophisticated
systems like AR, AI and others
The Product
An AI cyber system that uses machine
learning and mathematics to detect
abnormal behavior within a system.
Our product gives our customers the
leverage to take action before data is
breached.
How it works
Step 1
AI learns and
understand what
constitute as a
threat
Step 2
Complex probability
methods calculate
probabilities in the
light of evidence
Step 3
If abnormal behavior
is detected an alarm
is sent off to all
devices within the
network
The Team
Melina Samuel
PhD Mathematics
MIT Professor of
Applied Probability
Vishal Patel
PhD Artificial
Intelligence
Katherine king
Chief Marketing
Officer
Former Facebook AI
Research and
Technology Manager
Former CMO of 5 IPO
Startups
Chris Cha
Chief Executive
Officer
Former Microsoft CEO
with over 10 years of
experience
The Customers - Industry Breakdown
The Customers
Any company that has connected devices is vulnerable to cyber
attacks
● Tech companies, such as Facebook, LinkedIn, Amazon,
Google, etc...
● Educational Institutions
● Financial Institutions
● Startups and small businesses
● Institutions with low system maintenance
Business Model
No partners yet -Build team
-Marketing strategy
-Long/short term
strategies
-
-Prevent and reduces
the number of
successful cyber
attacks
-Reduces the amount
of downtime suffered
from attacks
-Reduces the amount
of money lost from
attacks
-Customer Service
-Premium membership
Beneficial Program
-US Financial
institutions
-US Health
Institutions
-US Education
Institutions
-Emerging Make
Price will be determined on the basis of market price
and service provided
-Monthly service fee
-Add on premium services
-AI Engineers
-Industry expertise
consultant
-Tech events
-Send demo to
business
developers
Pricing
Monthly Service Fee
● Professional
● Enterprise
Monthly Service Fee
● Large Institutions
Professional - UP to 5 devices
$100
Enterprise - Up to 25 devices
$1000
Large Institutions - 50 and up
Starting at $10,000
Beachhead Market
- Small
State/Municipal
Banks
- Small Hospital
- Agricultural cities
- Emerging countries
-
TAM: (large institutions budget)
SAM
SOM:(small banks cyber security budget)
Financial
-Need a seed round of $510K
-Patent initial $10K
-3 AI Engineers $300K
-Fixed/Variable cost $50K
-Founder Salary $50K
-Operation cost $100K
First Year Projection
(¼% IBM Sales)
$41 Mil
Business Model
October 2019
Startup.
Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec
October 2019
Hire Employees.
Business Model
April 2020
Machine learning system test.
December 2020
Coalescing two
systems
October 2020
Attack Defense system
test
Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec
Business Model
February 2021
Alpha test of the
product
April 2021
Alpha test closed; Beta test of
the product; Collecting
current cyber security
information
December 2021
AI Cyber Security
system V1.0 release
October 2021
Beta test closed; Keep
Collecting current cyber
security information
Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec
Adoption Strategy
Awareness Consideration Research Selection Purchase Delivery
-Trade industry
events
-AI research
events
-Startup
conventions
-Search engine
marketing
-Tech
innovation
events
-Industry online
media programs
-Our Website
-Social Networks
-Partner events
-Demos
-Company
brochure
-Trials
-Analyst reports
-Customer
reference
program
-Contracts
-Pricing
-Customer
references
-Installation/
support
program
-Customer
reference
program
-Training/educa
tion
Adoption Strategy - GROWTH
Acquiring Customers Keeping Customers Staying Competitive
-Funnel Top audience for email
lead generation purposes
-Incentive program for HR and
office managers
-Use 3rd party data to construct
look alike across customer
segment
-Expand current marketing
strategy to include look alike
-Dedicated account executives to
cater to high profile customers
(Dinners, VIP event tickets, etc.)
-Effective and reliable tech
support
-Loyalty programs
-Ongoing software update
-Strategic acquisitions
-Loyalty programs
Competition/Market
Competition
Top 5 Competitors: (57.99%)
● AVAST.(15.12%)
● McAfee.(12.73%)
● Malwarebytes.(10.38%)
● Bitdefender.(10.19%)
● ESET.(9.57%)
● IBM (8.2%)
Q & A
References
[1] Crane Crane, “80 Eye-Opening Cyber Security Statistics
for 2019”. SSL store, April 2019
<https://www.thesslstore.com/blog/80-eye
-opening-cyber-security-statistics-for-2019/> Mar 2019
[2] “Market share held by the leading Windows anti-malware
application vendors worldwide, as of January 2019”
Statista.com ,
Technology &
Telecommunications<https://www.statista.com/statistics/271048
/market-share-held-by-antivirus-
vendors-for-windows-systems/> Mar 2019
[3] “Rising Number of Cyber Attacks Against the Federal IT
Infrastructure” CybersecurityMarket.com, June 2015
<https://www.cybersecurit
ymarket.com/?p=37> Mar 2019
https://www.thesslstore.com/blog/80-eye-opening-cyber-
security-statistics-for-2019/
[4] Marc Toussaint, “Artificial Intelligence:Probabilities”
<https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14-
ArtificialIntelligence/10-probabilities.pdf> Mar 2019
[5] “Cyber Security Market Size and Share | Industry Report,
2019-2025. (n.d.)” Grandviewresearch.com May 2019
<https://www.grandviewresearch.com/industry-analysis/cyber-
security-market> May 2019
[6] Alto, P. “Media alert: Rising cyber-security threats fuel
9% growth in global security market in Q3 2017”. Dec
2017<https://
www.canalys.com/newsroom/media-alert-rising-cyber-security-
threats-fuel-9-growth-global-security-mark
et-q3-2017> May 2019
[7] “Global Artificial Intelligence-based Cybersecurity Market
2018-2022 | Rising Adoption of Chatbots to Boost Growth |
Technavio.” June
2018<https://www.businesswire.com/news/home/201806110058
07/en/Global-Artificial-
Intelligence-based-Cybersecurity-Market-2018-2022-Rising>
May 2019
https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14-
ArtificialIntelligence/10-probabilities.pdf
https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14-
ArtificialIntelligence/10-probabilities.pdf

More Related Content

Similar to Team 20 Threat Attack AI Cyber Security Company Decision makin.docx

Better Business Outcomes with Big Data Analytics
Better Business Outcomes with Big Data AnalyticsBetter Business Outcomes with Big Data Analytics
Better Business Outcomes with Big Data Analytics
IBM Software India
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
Conor Coughlan
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Cognizant
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Enterprise Management Associates
 
E-Business.docx
E-Business.docxE-Business.docx
E-Business.docx
smumbahelp
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
MuhammadArif823
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
 
yellowibm
yellowibmyellowibm
yellowibm
Kay Orr
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data Analytics
Billington K
 
yellowibm
yellowibmyellowibm
yellowibm
Kim Kozlik
 
How Can Businesses Adopt AI Technology to Achieve Their Goals
How Can Businesses Adopt AI Technology to Achieve Their GoalsHow Can Businesses Adopt AI Technology to Achieve Their Goals
How Can Businesses Adopt AI Technology to Achieve Their Goals
Kavika Roy
 
Business Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talentBusiness Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talent
Rani Channamma University, Sangolli Rayanna First Grade Constituent College, Belagavi
 
Security Threats Management Information System by BILAL AHMED.pdf
Security Threats Management Information System by BILAL AHMED.pdfSecurity Threats Management Information System by BILAL AHMED.pdf
Security Threats Management Information System by BILAL AHMED.pdf
BILAL CREATION PRODUCTION
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
guestc65425
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptx
XDuce Corporation
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdf
XDuce Corporation
 
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu EssayMmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
Jennifer Wright
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
 

Similar to Team 20 Threat Attack AI Cyber Security Company Decision makin.docx (20)

Better Business Outcomes with Big Data Analytics
Better Business Outcomes with Big Data AnalyticsBetter Business Outcomes with Big Data Analytics
Better Business Outcomes with Big Data Analytics
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
E-Business.docx
E-Business.docxE-Business.docx
E-Business.docx
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
yellowibm
yellowibmyellowibm
yellowibm
 
yellowibm
yellowibmyellowibm
yellowibm
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data Analytics
 
yellowibm
yellowibmyellowibm
yellowibm
 
How Can Businesses Adopt AI Technology to Achieve Their Goals
How Can Businesses Adopt AI Technology to Achieve Their GoalsHow Can Businesses Adopt AI Technology to Achieve Their Goals
How Can Businesses Adopt AI Technology to Achieve Their Goals
 
Business Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talentBusiness Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talent
 
Security Threats Management Information System by BILAL AHMED.pdf
Security Threats Management Information System by BILAL AHMED.pdfSecurity Threats Management Information System by BILAL AHMED.pdf
Security Threats Management Information System by BILAL AHMED.pdf
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptx
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdf
 
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu EssayMmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 

More from erlindaw

TCP is a reliable transport protocol. Research the TCP protocol an.docx
TCP is a reliable transport protocol. Research the TCP protocol an.docxTCP is a reliable transport protocol. Research the TCP protocol an.docx
TCP is a reliable transport protocol. Research the TCP protocol an.docx
erlindaw
 
TDS-001 Object Reassignment .docx
TDS-001                                      Object Reassignment .docxTDS-001                                      Object Reassignment .docx
TDS-001 Object Reassignment .docx
erlindaw
 
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docxTCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
erlindaw
 
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docxTchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
erlindaw
 
TaxesExamine the impact of FIN 48 (Accounting for the Un.docx
TaxesExamine the impact of FIN 48 (Accounting for the Un.docxTaxesExamine the impact of FIN 48 (Accounting for the Un.docx
TaxesExamine the impact of FIN 48 (Accounting for the Un.docx
erlindaw
 
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docxTB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
erlindaw
 
TAXATIONJoan Fung, age 67, is married to Alan, age 56, who ha.docx
TAXATIONJoan  Fung, age 67, is married to Alan, age 56, who ha.docxTAXATIONJoan  Fung, age 67, is married to Alan, age 56, who ha.docx
TAXATIONJoan Fung, age 67, is married to Alan, age 56, who ha.docx
erlindaw
 
Tax Laws and ConsequencesThis week we covered a wide variety.docx
Tax Laws and ConsequencesThis week we covered a wide variety.docxTax Laws and ConsequencesThis week we covered a wide variety.docx
Tax Laws and ConsequencesThis week we covered a wide variety.docx
erlindaw
 
Tawara D. Goode ▪National Center for Cultural Competence ▪ Ge.docx
Tawara D.  Goode ▪National Center for Cultural Competence ▪ Ge.docxTawara D.  Goode ▪National Center for Cultural Competence ▪ Ge.docx
Tawara D. Goode ▪National Center for Cultural Competence ▪ Ge.docx
erlindaw
 
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docxTask NamePhase 2 Individual ProjectDeliverable Length750–1.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docx
erlindaw
 
TASKUnderstanding the true costs of serving a customer is an inv.docx
TASKUnderstanding the true costs of serving a customer is an inv.docxTASKUnderstanding the true costs of serving a customer is an inv.docx
TASKUnderstanding the true costs of serving a customer is an inv.docx
erlindaw
 
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docxTaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
erlindaw
 
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docxTask NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
erlindaw
 
Task 1.  Provide a brief description of the key areas of law dea.docx
Task 1.  Provide a brief description of the key areas of law dea.docxTask 1.  Provide a brief description of the key areas of law dea.docx
Task 1.  Provide a brief description of the key areas of law dea.docx
erlindaw
 
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docxTask NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
erlindaw
 
Task Analysis of Contemporary Media Reporting on the World of Wor.docx
Task Analysis of Contemporary Media Reporting on the World of Wor.docxTask Analysis of Contemporary Media Reporting on the World of Wor.docx
Task Analysis of Contemporary Media Reporting on the World of Wor.docx
erlindaw
 
TasksUsing the financial information gathered inWeek 1, add.docx
TasksUsing the financial information gathered inWeek 1, add.docxTasksUsing the financial information gathered inWeek 1, add.docx
TasksUsing the financial information gathered inWeek 1, add.docx
erlindaw
 
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docxTask NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
erlindaw
 
TaskYou are required to prepare for this Assessment Item by.docx
TaskYou are required to prepare for this Assessment Item by.docxTaskYou are required to prepare for this Assessment Item by.docx
TaskYou are required to prepare for this Assessment Item by.docx
erlindaw
 
TaskYou are required to produce a report outlining the planning an.docx
TaskYou are required to produce a report outlining the planning an.docxTaskYou are required to produce a report outlining the planning an.docx
TaskYou are required to produce a report outlining the planning an.docx
erlindaw
 

More from erlindaw (20)

TCP is a reliable transport protocol. Research the TCP protocol an.docx
TCP is a reliable transport protocol. Research the TCP protocol an.docxTCP is a reliable transport protocol. Research the TCP protocol an.docx
TCP is a reliable transport protocol. Research the TCP protocol an.docx
 
TDS-001 Object Reassignment .docx
TDS-001                                      Object Reassignment .docxTDS-001                                      Object Reassignment .docx
TDS-001 Object Reassignment .docx
 
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docxTCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
TCHE2560 – TASK 2 – INTEGRATED CURRICULUM PLANNER An.docx
 
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docxTchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
Tchaikovsky, Souvenir de Florence Janine Jensen and Friendsht.docx
 
TaxesExamine the impact of FIN 48 (Accounting for the Un.docx
TaxesExamine the impact of FIN 48 (Accounting for the Un.docxTaxesExamine the impact of FIN 48 (Accounting for the Un.docx
TaxesExamine the impact of FIN 48 (Accounting for the Un.docx
 
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docxTB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
TB0333 Rev. 032017Copyright © 2017 Thunderbird School o.docx
 
TAXATIONJoan Fung, age 67, is married to Alan, age 56, who ha.docx
TAXATIONJoan  Fung, age 67, is married to Alan, age 56, who ha.docxTAXATIONJoan  Fung, age 67, is married to Alan, age 56, who ha.docx
TAXATIONJoan Fung, age 67, is married to Alan, age 56, who ha.docx
 
Tax Laws and ConsequencesThis week we covered a wide variety.docx
Tax Laws and ConsequencesThis week we covered a wide variety.docxTax Laws and ConsequencesThis week we covered a wide variety.docx
Tax Laws and ConsequencesThis week we covered a wide variety.docx
 
Tawara D. Goode ▪National Center for Cultural Competence ▪ Ge.docx
Tawara D.  Goode ▪National Center for Cultural Competence ▪ Ge.docxTawara D.  Goode ▪National Center for Cultural Competence ▪ Ge.docx
Tawara D. Goode ▪National Center for Cultural Competence ▪ Ge.docx
 
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docxTask NamePhase 2 Individual ProjectDeliverable Length750–1.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1.docx
 
TASKUnderstanding the true costs of serving a customer is an inv.docx
TASKUnderstanding the true costs of serving a customer is an inv.docxTASKUnderstanding the true costs of serving a customer is an inv.docx
TASKUnderstanding the true costs of serving a customer is an inv.docx
 
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docxTaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
TaskThe CIO of LEI has decided to move 100 of their IT landscap.docx
 
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docxTask NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 2 Individual ProjectDeliverable Length750–1,0.docx
 
Task 1.  Provide a brief description of the key areas of law dea.docx
Task 1.  Provide a brief description of the key areas of law dea.docxTask 1.  Provide a brief description of the key areas of law dea.docx
Task 1.  Provide a brief description of the key areas of law dea.docx
 
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docxTask NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
Task NamePhase 3 Individual ProjectDeliverable Length2-3 pag.docx
 
Task Analysis of Contemporary Media Reporting on the World of Wor.docx
Task Analysis of Contemporary Media Reporting on the World of Wor.docxTask Analysis of Contemporary Media Reporting on the World of Wor.docx
Task Analysis of Contemporary Media Reporting on the World of Wor.docx
 
TasksUsing the financial information gathered inWeek 1, add.docx
TasksUsing the financial information gathered inWeek 1, add.docxTasksUsing the financial information gathered inWeek 1, add.docx
TasksUsing the financial information gathered inWeek 1, add.docx
 
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docxTask NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
Task NamePhase 1 Individual ProjectDeliverable Length750–1,0.docx
 
TaskYou are required to prepare for this Assessment Item by.docx
TaskYou are required to prepare for this Assessment Item by.docxTaskYou are required to prepare for this Assessment Item by.docx
TaskYou are required to prepare for this Assessment Item by.docx
 
TaskYou are required to produce a report outlining the planning an.docx
TaskYou are required to produce a report outlining the planning an.docxTaskYou are required to produce a report outlining the planning an.docx
TaskYou are required to produce a report outlining the planning an.docx
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

Team 20 Threat Attack AI Cyber Security Company Decision makin.docx

  • 1. Team 20: Threat Attack: AI Cyber Security Company Decision making Analysis: The very first function of management as far as information security is concerned is to ensure that the company's data is safe. Cybersecurity can put a company is a compromising situation, make it pay millions or even cause irreparable damage to a company. For instance, Target paid a whopping $18.5 million in the settlement because of cyber attacks (Jalali, Siegel & Madnick, 2019, March). The management should be at the forefront of protecting such losses. The management should also ensure that there is data confidentiality, availability, and integrity. It was also important to use the benchmark with other security companies while setting the price. The period set for test Machine learning and testing for the Defense system is appropriate because the users will be familiar with the system after four or more months. Recommendation for improvement: For a startup, there is a need to consolidate strategies to ensure that you don't run many programs that will need finances while the company is still young. For instance, you can only have two strategies per column on the adoption strategies. As a startup, the idea of acquisitions should also wait, unless you want to be acquired by an established company such as AVAST or IBM. Innovation Analysis: First, creating a security system that works with AI, and AR among other systems is a great innovation. Secondly, the product allows customers to know that something is wrong in their system before a cyber-attack is finally executed. This will be a real deal for companies and individuals because the rising cybersecurity threats are a concern to many institutions who are losing millions of dollars. Lastly, the use of complex mathematics and machine learning will allow the product to detect threats in real time. Recommendation for improvement: The time it takes to install
  • 2. this product is a concern. There is a need to benchmark with other established cybersecurity companies such as AVAST and McAfee to reduce the installation time. For example, with AVAST, it takes just 2 to 3 minutes to download and install it on your device. Also, the team should ensure that the product protects major threat routes such as web security and email. Most attacks are through email by use of malicious attachments and phishing emails as well as unsafe URLs. Management Analysis: The blend in the team I charge of the company is amazing. For instance, Melina Samuel, who is a professor of Applied Probability, will help in the creation of complex mathematical problems, Vishal Patel will deal with AI solutions and AI technology, Katherine King will be in charge of marketing to ensure that the company is successful and Chris Cha will head the team as the CEO. With such experience, the company is most likely to succeed and be a force to reckon in the Cyber Security Industry. Recommendation for improvement: The management should organize training with their top customers to teach them on the basics of cybersecurity. They should also update the system regularly. Motivation Analysis: The first motivation is from the selected management team. Having such top and experienced personalities will give the company the motivation to succeed. You also chose the best industry where there is healthy competition with each company having a considerable share of the market. This will motivate the management to know that there is a likelihood of them also getting their share. The last motivating factor is that technology is here to stay and is evolving day and night. Many people, startups and established companies are shifting from paperwork to computers. This is an assurance that the market will continue to grow and the company will surely succeed. Recommendation for improvement: You should include strategies that will help in motivating the employees that shall
  • 3. help in the day to day running of the company. References Jalali, M., Siegel, M. & Madnick, S. (2019, March). Decision- making and biases in cybersecurity capability development: Evidence from a simulation game experiment. Retrieved from https://www.sciencedirect.com/science/article/pii/S0963868717 304353 Defense Attack AI Cyber Security Company Team 20 The problem: Cyber Data Breach is on the Rise Customer Pain Points ● Cyber attack is on the rise, protection is a must ● Cyber attack is costly to firms ● Cyber breach damages consumer trust and firm’s credibility ● Threat can come from within the
  • 4. network Mission Statement: We fight cyber security in the same way our immune system fights diseases The solution ● Detects abnormal behavior and fights back in real time ● Easy and fast installation (1-2 hours) ● Scalable to over million devices ● Works with sophisticated systems like AR, AI and others The Product An AI cyber system that uses machine learning and mathematics to detect abnormal behavior within a system.
  • 5. Our product gives our customers the leverage to take action before data is breached. How it works Step 1 AI learns and understand what constitute as a threat Step 2 Complex probability methods calculate probabilities in the light of evidence Step 3 If abnormal behavior is detected an alarm is sent off to all devices within the network The Team
  • 6. Melina Samuel PhD Mathematics MIT Professor of Applied Probability Vishal Patel PhD Artificial Intelligence Katherine king Chief Marketing Officer Former Facebook AI Research and Technology Manager Former CMO of 5 IPO Startups Chris Cha Chief Executive Officer Former Microsoft CEO with over 10 years of experience
  • 7. The Customers - Industry Breakdown The Customers Any company that has connected devices is vulnerable to cyber attacks ● Tech companies, such as Facebook, LinkedIn, Amazon, Google, etc... ● Educational Institutions ● Financial Institutions ● Startups and small businesses ● Institutions with low system maintenance Business Model No partners yet -Build team -Marketing strategy -Long/short term strategies - -Prevent and reduces the number of successful cyber attacks -Reduces the amount of downtime suffered
  • 8. from attacks -Reduces the amount of money lost from attacks -Customer Service -Premium membership Beneficial Program -US Financial institutions -US Health Institutions -US Education Institutions -Emerging Make Price will be determined on the basis of market price and service provided -Monthly service fee -Add on premium services -AI Engineers -Industry expertise consultant -Tech events -Send demo to business developers Pricing
  • 9. Monthly Service Fee ● Professional ● Enterprise Monthly Service Fee ● Large Institutions Professional - UP to 5 devices $100 Enterprise - Up to 25 devices $1000 Large Institutions - 50 and up Starting at $10,000 Beachhead Market - Small State/Municipal Banks - Small Hospital - Agricultural cities - Emerging countries - TAM: (large institutions budget) SAM
  • 10. SOM:(small banks cyber security budget) Financial -Need a seed round of $510K -Patent initial $10K -3 AI Engineers $300K -Fixed/Variable cost $50K -Founder Salary $50K -Operation cost $100K First Year Projection (¼% IBM Sales) $41 Mil Business Model October 2019 Startup. Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec October 2019 Hire Employees.
  • 11. Business Model April 2020 Machine learning system test. December 2020 Coalescing two systems October 2020 Attack Defense system test Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec Business Model February 2021 Alpha test of the product April 2021 Alpha test closed; Beta test of the product; Collecting current cyber security information December 2021 AI Cyber Security system V1.0 release
  • 12. October 2021 Beta test closed; Keep Collecting current cyber security information Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec Adoption Strategy Awareness Consideration Research Selection Purchase Delivery -Trade industry events -AI research events -Startup conventions -Search engine marketing -Tech innovation events -Industry online media programs -Our Website -Social Networks -Partner events -Demos -Company brochure -Trials
  • 13. -Analyst reports -Customer reference program -Contracts -Pricing -Customer references -Installation/ support program -Customer reference program -Training/educa tion Adoption Strategy - GROWTH Acquiring Customers Keeping Customers Staying Competitive -Funnel Top audience for email lead generation purposes -Incentive program for HR and office managers -Use 3rd party data to construct look alike across customer segment -Expand current marketing strategy to include look alike -Dedicated account executives to
  • 14. cater to high profile customers (Dinners, VIP event tickets, etc.) -Effective and reliable tech support -Loyalty programs -Ongoing software update -Strategic acquisitions -Loyalty programs Competition/Market Competition Top 5 Competitors: (57.99%) ● AVAST.(15.12%) ● McAfee.(12.73%) ● Malwarebytes.(10.38%) ● Bitdefender.(10.19%) ● ESET.(9.57%) ● IBM (8.2%) Q & A
  • 15. References [1] Crane Crane, “80 Eye-Opening Cyber Security Statistics for 2019”. SSL store, April 2019 <https://www.thesslstore.com/blog/80-eye -opening-cyber-security-statistics-for-2019/> Mar 2019 [2] “Market share held by the leading Windows anti-malware application vendors worldwide, as of January 2019” Statista.com , Technology & Telecommunications<https://www.statista.com/statistics/271048 /market-share-held-by-antivirus- vendors-for-windows-systems/> Mar 2019 [3] “Rising Number of Cyber Attacks Against the Federal IT Infrastructure” CybersecurityMarket.com, June 2015 <https://www.cybersecurit ymarket.com/?p=37> Mar 2019 https://www.thesslstore.com/blog/80-eye-opening-cyber- security-statistics-for-2019/ [4] Marc Toussaint, “Artificial Intelligence:Probabilities” <https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14- ArtificialIntelligence/10-probabilities.pdf> Mar 2019 [5] “Cyber Security Market Size and Share | Industry Report, 2019-2025. (n.d.)” Grandviewresearch.com May 2019
  • 16. <https://www.grandviewresearch.com/industry-analysis/cyber- security-market> May 2019 [6] Alto, P. “Media alert: Rising cyber-security threats fuel 9% growth in global security market in Q3 2017”. Dec 2017<https:// www.canalys.com/newsroom/media-alert-rising-cyber-security- threats-fuel-9-growth-global-security-mark et-q3-2017> May 2019 [7] “Global Artificial Intelligence-based Cybersecurity Market 2018-2022 | Rising Adoption of Chatbots to Boost Growth | Technavio.” June 2018<https://www.businesswire.com/news/home/201806110058 07/en/Global-Artificial- Intelligence-based-Cybersecurity-Market-2018-2022-Rising> May 2019 https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14- ArtificialIntelligence/10-probabilities.pdf https://ipvs.informatik.uni-stuttgart.de/mlr/marc/teaching/14- ArtificialIntelligence/10-probabilities.pdf