SlideShare a Scribd company logo
Use of Artificial Intelligence
in cyber Security
Engineering College In India | Avantika
University
Artificial Intelligence (AI) is a revolutionizing technology that
has transformed the way machines and gadgets interact
with humans and each other. An AI-powered machine can
recognize or sense the changes in its environment and take
appropriate action automatically in order to perform its
intended task.
Use of Artificial Intelligence
in cyber Security
AI leads to minimal or no human intervention as the
machines are able to perform several activities on their own.
The technology has impacted almost all sectors including
cyber security.
The amount of online data is growing exponentially and
becoming susceptible to malicious activities. In such a
scenario, it has become difficult to safeguard large chunks of
data from potential threats. Artificial Intelligence can come into
play in such cases. The technology plays a crucial role in
providing protection to online data.
Following are the use of artificial intelligence in cyber
security:
It is cumbersome to manage an enormous amount of data
produced by systems on a daily basis. This task can be
easily executed by exploiting artificial intelligence software.
Artificial intelligence can handle and process tons of data
within minutes, which would otherwise takes months.
Data Handling
AI-powered systems can quickly detect the problems and
take appropriate action. On the other hand, human
controlled cyber security systems would take much longer
time even for detecting the problem itself.
Fast Action
In most of the cases, cybercriminals are found to be hiding
in the system for a long time. They generally wait for the
right moment to attack. With the help of artificial
intelligence, we can spot these hidden threats and take
appropriate actions.
Protection
By exploiting artificial intelligence in cyber security, we can
save a lot of time. We don't have to manage enormous
amount of data, we don't have to constantly look out for
cybercriminals or threats needles. This gives us more time to
plan new strategies and bring out new ideas to the table in
order to improve our overall security system.
Time Saving and Enhance Efficiency
With the use of artificial intelligence in cyber security, we can
cut out the expenses that would have been spent on the
security and management of the online data. If the task of
managing and protecting data is handled manually, it would
require a number of people. However, with artificial
intelligence, a single system can look after tons of data.
Saving Resources
These were some of the uses of artificial intelligence in
cyber security. Although artificial intelligence has so many
advantages over human intelligence, it is dependent on
humans. It cannot make decisions on its own. There is
equal need of a human brain as it is of artificial intelligence.
All software that runs on AI is designed by computer
engineers. So, proficient engineers are required
Due to the ever-increasing demand for engineers, there is a
bright scope in the field. So, if you wish to enter this
rewarding field of computer engineering, then you should
pursue B.Tech in Computer Science and Engineering.
Looking for best engineering college in MP? If so, then you
should enroll for admissions at Avantika University’s
Engineering College.
Situated in Ujjain MP, Avantika University is a part of
reputed MIT Pune and it is India’s only design-centric
university. Its engineering college is among top engineering
colleges in MP that offers world-class education. So, shape
your career by joining Avantika University right away.
Conclusion
Avantika University is the MIT Institute of Design in Ujjain,
MP. It follows a unique learning approach where the
students are encouraged to think out of the box. Avantika
University is the part of reputed MIT Pune.
THANK YOU

More Related Content

What's hot

AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
AI in security
AI in securityAI in security
AI in security
Subrat Panda, PhD
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
Olivier Busolini
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
Rishi Kant
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
scoopnewsgroup
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
Faction XYZ
 
Artificial Intelligence Overview Powerpoint Presentation Slides
Artificial Intelligence Overview Powerpoint Presentation SlidesArtificial Intelligence Overview Powerpoint Presentation Slides
Artificial Intelligence Overview Powerpoint Presentation Slides
SlideTeam
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
Infosec
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
Karl Seiler
 

What's hot (20)

AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
AI in security
AI in securityAI in security
AI in security
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Artificial Intelligence Overview Powerpoint Presentation Slides
Artificial Intelligence Overview Powerpoint Presentation SlidesArtificial Intelligence Overview Powerpoint Presentation Slides
Artificial Intelligence Overview Powerpoint Presentation Slides
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
 

Similar to Use of Artificial Intelligence in Cyber Security - Avantika University

IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
FlyWly
 
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
Freelancing
 
How AI is Revolutionizing Cybersecurity (1).pdf
How AI is Revolutionizing Cybersecurity (1).pdfHow AI is Revolutionizing Cybersecurity (1).pdf
How AI is Revolutionizing Cybersecurity (1).pdf
ARC Solutions Inc.
 
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
cyberprosocial
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
KantaShakkarwal
 
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
Ciente
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
MobibizIndia1
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
cyberprosocial
 
A Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdfA Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdf
manoharparakh
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
BT Techsoft Pvt. Ltd
 
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial IntelligenceAn Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligence
ijtsrd
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
amdigitalmark15
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
Cynthia King
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
DataScienceConferenc1
 
How Artificial Intelligence Is Used For Cybersecurity Attacks
 How Artificial Intelligence Is Used For Cybersecurity Attacks  How Artificial Intelligence Is Used For Cybersecurity Attacks
How Artificial Intelligence Is Used For Cybersecurity Attacks
Sysvoot Antivirus
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
Karthik Sarma
 

Similar to Use of Artificial Intelligence in Cyber Security - Avantika University (20)

IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
 
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
 
How AI is Revolutionizing Cybersecurity (1).pdf
How AI is Revolutionizing Cybersecurity (1).pdfHow AI is Revolutionizing Cybersecurity (1).pdf
How AI is Revolutionizing Cybersecurity (1).pdf
 
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
A Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdfA Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdf
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial IntelligenceAn Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligence
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
 
How Artificial Intelligence Is Used For Cybersecurity Attacks
 How Artificial Intelligence Is Used For Cybersecurity Attacks  How Artificial Intelligence Is Used For Cybersecurity Attacks
How Artificial Intelligence Is Used For Cybersecurity Attacks
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
 

More from Avantika University

What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
Avantika University
 
Types of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika UniversityTypes of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika University
Avantika University
 
Fields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika UniversityFields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika University
Avantika University
 
Need of Software Engineering - Avantika University
Need of Software Engineering - Avantika UniversityNeed of Software Engineering - Avantika University
Need of Software Engineering - Avantika University
Avantika University
 
Advantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika UniversityAdvantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika University
Avantika University
 
Fashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika UniversityFashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika University
Avantika University
 
Elements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika UniversityElements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika University
Avantika University
 
Types of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika UniversityTypes of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika University
Avantika University
 
About Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika UniversityAbout Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika University
Avantika University
 
Scope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika UniversityScope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika University
Avantika University
 
Technology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika UniversityTechnology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika University
Avantika University
 
Essential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika UniversityEssential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika University
Avantika University
 
Design Fundamentals - Avantika University
Design Fundamentals - Avantika UniversityDesign Fundamentals - Avantika University
Design Fundamentals - Avantika University
Avantika University
 
Top Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika UniversityTop Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika University
Avantika University
 
Elements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika UniversityElements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika University
Avantika University
 
Scope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika UniversityScope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika University
Avantika University
 
Elements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika UniversityElements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika University
Avantika University
 
Design Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika UniversityDesign Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika University
Avantika University
 
Importance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika UniversityImportance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika University
Avantika University
 
Fashion Design Careers - Avantika University
Fashion Design Careers - Avantika UniversityFashion Design Careers - Avantika University
Fashion Design Careers - Avantika University
Avantika University
 

More from Avantika University (20)

What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Types of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika UniversityTypes of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika University
 
Fields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika UniversityFields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika University
 
Need of Software Engineering - Avantika University
Need of Software Engineering - Avantika UniversityNeed of Software Engineering - Avantika University
Need of Software Engineering - Avantika University
 
Advantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika UniversityAdvantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika University
 
Fashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika UniversityFashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika University
 
Elements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika UniversityElements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika University
 
Types of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika UniversityTypes of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika University
 
About Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika UniversityAbout Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika University
 
Scope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika UniversityScope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika University
 
Technology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika UniversityTechnology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika University
 
Essential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika UniversityEssential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika University
 
Design Fundamentals - Avantika University
Design Fundamentals - Avantika UniversityDesign Fundamentals - Avantika University
Design Fundamentals - Avantika University
 
Top Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika UniversityTop Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika University
 
Elements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika UniversityElements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika University
 
Scope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika UniversityScope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika University
 
Elements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika UniversityElements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika University
 
Design Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika UniversityDesign Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika University
 
Importance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika UniversityImportance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika University
 
Fashion Design Careers - Avantika University
Fashion Design Careers - Avantika UniversityFashion Design Careers - Avantika University
Fashion Design Careers - Avantika University
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Use of Artificial Intelligence in Cyber Security - Avantika University

  • 1. Use of Artificial Intelligence in cyber Security Engineering College In India | Avantika University
  • 2. Artificial Intelligence (AI) is a revolutionizing technology that has transformed the way machines and gadgets interact with humans and each other. An AI-powered machine can recognize or sense the changes in its environment and take appropriate action automatically in order to perform its intended task. Use of Artificial Intelligence in cyber Security
  • 3. AI leads to minimal or no human intervention as the machines are able to perform several activities on their own. The technology has impacted almost all sectors including cyber security.
  • 4. The amount of online data is growing exponentially and becoming susceptible to malicious activities. In such a scenario, it has become difficult to safeguard large chunks of data from potential threats. Artificial Intelligence can come into play in such cases. The technology plays a crucial role in providing protection to online data. Following are the use of artificial intelligence in cyber security:
  • 5. It is cumbersome to manage an enormous amount of data produced by systems on a daily basis. This task can be easily executed by exploiting artificial intelligence software. Artificial intelligence can handle and process tons of data within minutes, which would otherwise takes months. Data Handling
  • 6. AI-powered systems can quickly detect the problems and take appropriate action. On the other hand, human controlled cyber security systems would take much longer time even for detecting the problem itself. Fast Action
  • 7. In most of the cases, cybercriminals are found to be hiding in the system for a long time. They generally wait for the right moment to attack. With the help of artificial intelligence, we can spot these hidden threats and take appropriate actions. Protection
  • 8. By exploiting artificial intelligence in cyber security, we can save a lot of time. We don't have to manage enormous amount of data, we don't have to constantly look out for cybercriminals or threats needles. This gives us more time to plan new strategies and bring out new ideas to the table in order to improve our overall security system. Time Saving and Enhance Efficiency
  • 9. With the use of artificial intelligence in cyber security, we can cut out the expenses that would have been spent on the security and management of the online data. If the task of managing and protecting data is handled manually, it would require a number of people. However, with artificial intelligence, a single system can look after tons of data. Saving Resources
  • 10. These were some of the uses of artificial intelligence in cyber security. Although artificial intelligence has so many advantages over human intelligence, it is dependent on humans. It cannot make decisions on its own. There is equal need of a human brain as it is of artificial intelligence. All software that runs on AI is designed by computer engineers. So, proficient engineers are required
  • 11. Due to the ever-increasing demand for engineers, there is a bright scope in the field. So, if you wish to enter this rewarding field of computer engineering, then you should pursue B.Tech in Computer Science and Engineering. Looking for best engineering college in MP? If so, then you should enroll for admissions at Avantika University’s Engineering College.
  • 12. Situated in Ujjain MP, Avantika University is a part of reputed MIT Pune and it is India’s only design-centric university. Its engineering college is among top engineering colleges in MP that offers world-class education. So, shape your career by joining Avantika University right away.
  • 13. Conclusion Avantika University is the MIT Institute of Design in Ujjain, MP. It follows a unique learning approach where the students are encouraged to think out of the box. Avantika University is the part of reputed MIT Pune.