Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Slide 1: Introduction

•AI is improving the protection and remediation of cyberattacks.



•AI's ability to detect nuanced attacks, hi-tech security, and enhanced incident
responses.

•AI is rapidly identifying risk and accelerating the decision-making in data-driven
decision-making measures.

Cyber security is one of the growing concerns in the different hi-tech companies which are dealing with
different types of big data. Availability of the different models like knowledge breach protection, task
automation and knowledge authentication, and many more. This is the reason for enhancing the incident
responses of the different hi-tech companies by rapidly identifying tasks and decision-making measures.
AI is also following the data-driven approach based on data analysis and decision-making.

Slide 2: BACKGROUND

•Cyberattacks are increasing in volume and complexity in the different tech-driven companies.

•AI is conducting resource security operations that are staying ahead of the threats.

•Availability of the different models like natural language processing, and machine learning
drastically decreases the operation time.

Cyberattacks are increasing day by day as cyber frauds are using a number of attacks like
Malware attacks, Ransomware attacks have the ability to provide barriers in network operations.
AI is conducting the resource-based operation view, which is staying ahead of all the threats in
cyber security. There is the prohibition of cutting threat technologies which are reducing the
threats in cyber security. The availability of different models like natural language processing,
and machine learning have been used for preventing cyber attacks in the network.

Slide 3: CONCEPT OF ETHICAL HACKING

•Ethical hacking is the practice of authorized attempts to gain unauthorized access.



•Carrying out ethical hacking is carrying out the duplication of strategies and malicious
attacks.

There are three types of hackers like black hat hackers, white hat hackers, and grey
hat hackers

Ethical hacking for preventing cyberattacks in the networks where the different types of
Malware attacks, phishing attacks, and super phishing have been prevented. Ethical
hackers are gaining unauthorized access to different networks to increase the security
of the network. They are taking the test in their own networks by providing the attacks in
their own system. They are the duplication of the strategies and the different types of
malicious attacks. Based on the hacking quality, there are three types of hackers that
have evolved white hat hackers, grey hat hackers, and black hat hackers.

Slide 4: Concept of cyber security

•Cyber security is providing the protection of internet-connected systems, hardware,


software, and networking.

•Prohibiting cyber threats, stealing, and duplicating of the data.

•There are three main types of cyber attacks Malware, spoofing, and denial of service
attacks.

Cybersecurity is providing protection in the network which is connected either physically


or virtually. This is proving the protection from the generation of the hardware-based
system or the software-based system connected to the machines. This is providing
protection from getting stealing or duplication of data from the database. There are
three main types of cyber attacks in the networks which are phishing attacks, super
phishing, Malware, and denial of service attacks.

Slide 5: Concept of artificial intelligence

•Simulations of human intelligence processed by machines.



•Humans bring the career of machines by providing them with decisions.


•There are 4 types of AI which are limited memories, reactive machines, theory in mind,
and self-awareness.

Artificial intelligence is the process of the development of machines that are working like
humans. This is defined as human intelligence emergence by machines. The role of
humans is to give the decisions of the machines and AI is providing the outcomes of
the results. There are four types of artificial intelligence which are the limited memories
that are taking a limited number of instructions. Reactive machines have the ability to
make decisions based on the circumstances. With the theory in mind, machines are
working based on the availability of the models like machine learning, predictive
analysis models, and many more.

Slide 6: EMERGENCE OF DIGITAL TWINS

•Digital twin is a virtual model designed to accurately reflect the physical


object.

•Combining the various types of sensors produces different aspects of the
performances of digital objects.

•The virtual models are able to run the simulations.

The digital twin is defined as the virtual model of the physical objects which is used to
send real-time data from one segment to another. This is the combination of the
sensors which is providing the communication path of the different types of digital data.
This is also supporting the behavior of the simulations based on the selected objects in
the same. There is little difference between the simulations and the digital twins. The
simulation is typically studying the particular objects and the digital twin is showing the
considerably richer study in the virtual environment.

Slide 7: Role of the digital twin in cyber security

•Digital twins are helping companies to clean up vulnerabilities by creating virtual


clones.

•Digital twin mimics the fed – real-time data from the physical system.

•Digital twin is creating the additional attack vector using real-time data.

Cybersecurity has been improved by using the digital twins to clean up the
vulnerabilities by creating virtual clones using different types of firmware. This is making
the different clone-type architecture which is working on the real-time data. This is
providing the expanded attack surface where the attack area has been increased in the
system. There is the provision of making the attack on the virtual system. After the
completion of the attack in the virtual system the data has been generated based on the
attack. With the help of the additional attack vector, they can be used to detect real
information regarding the attacker.
Slide 8: Emergence of the Internet of Things

•Internet of Things is the virtual network of physical objects.



•Things is describing the connection of the different objects based on the single router.

•Exchanging the data from one device to another one with using of the internet.

The Internet of Things is the new invention of embedded technology which is providing
virtual connections between different hardware and different internet system. This is
requiring a single router for the transformation of data from one system to another one.
This is defined as the master router which is providing the higher speed of internet.
There is the provision of an IoT management system using the wider management of
the data. There are enabling the different sensors and IoT gateway for the collection
and communication of the data.

Slide 9: Role of IoT in cyber security

•This is enabling the industrial control system including devices and the network
capability.


•This is showing data theft, data or service manipulation, and the non-compliance of the
data.

•There are some kinds of possible attacks in the system which are the Bricker Bot,
Stuxnet, and Mirai Botnet.

IoT is facing a wider range of attacks due to the lacking of cyber security. There is an
advanced data management system which is protecting the prevention of attacks in the
network. This is enabling network control and increases the network security in the
system. This is also liable for increasing the network capability in the system. Due to the
advanced data management, there is the provision of making prevention of data theft
and non-compliance of the data in the network.

Slide 10: Real-world cyber attack

•Google China was hit by a cyber attack in 2009 where the data has been breached from
different servers in China.

•Teen hacks NASA and Google defense department.

•Sonic Wall company hack attempt in 2022.

There is some real-world case study there are the different kinds of hacking that have been
attempted throughout the country. There are Google China has been attacked by some
fraudsters. They have conducted phishing attacks to steal some information and personal
property as well. There are also data breaching that has been used to be conducted in the stealing
data and personal information as well. Apart from this, there a teenager aged 15 hacked NASA
and Google's defiance department in the year 1999. The most recent hacking activity has been
conducted on Sonic Wall in 2022.

Slide 11: DIFFERENT REAL WORLD CYBER ATTACK (CONTD..)

•Data breach in Yahoo.


•Marriot hotel, over 500 million people's security compromised.

•The South Korean nightmare.


There are different types of data breaching has been conducted in the previous decades. There is
the provision of data breaching in Yahoo where the passwords of the different accounts have
been sealed. There is the stealing of about 500 million customer data from Marriot hotels. There
is the South Korean nightmare where 100 million credit cards have been stolen,

Slide 12: SONIC WALL COMPANY HACK ATTEMPTS

•Sonic Wall has recorded 139.3 million crypto jackings in 2022.



•There is a 43 % increase since 2021.


•This is working on Malware, Ransomware, and IoT Malware.

Sonic Wall has been targeted multiple times by attackers to gain access which has recorded
139.3 million crypto jackings in 2022 which has recorded a 43 % increase in 2021. This is also
suffering attacks like Malware, Ransomware, and the different kinds of IoT Malware in the
company.

Slide 13: Sonic Wall hack attempts

•Sonic Wall is conducting the on-demand webcast.



•The company has attempted the 6.3 million instruction attempt in 2022.

•Sonic wall has enabled the advanced threat protection unit.

Sonic Wall has been targeted several times in the past few years. There is the provision of
making the webcast technology in the on-demand basics. This is the reason for increasing the
security of the system. The company has attempted the 6.3 million instruction attempt in 2022.
This is also enabling the advanced threat protection unit.

Slide 14: IDENTIFICATION OF DT

•Implementation of future simulations based on the virtual process.



•Improving the defense capabilities of the different types of antivirus software.

•This is providing the pre-programing of a counter strike for every single cyber attack.

This is providing future simulations based on the different virtual processes in which the
different kinds of future simulations have been used for detecting cyber threats. This is
improving the defense capabilities in the different antivirus software and the virus detection
program. This is allowing the programmer for doing the pre-programming and counterstrike for
protecting the cyber attacks.

Slide 15: DT improving visibility and decision making

•Making the decision regarding word cloud.



•Open coding.


•Data analysis.

The digital twin is making the improvement in the visibility and the decision making based on
the three different techniques which are the decision regarding cloud where the virtual visibility
has been improved. Apart from this, there is open coding technology in which the coding has
been conducted on virtual platforms. Apart from this, there is the data analysis where the
different modeling has been conducted in the proper manner.

Slide 16: DT in monitoring and informing


•Data centric Engineering approach.

•Data detrending.

•Data dynamic modeling.


DT is providing the data-centric engineering approach in which the different types of data have
been taken into consideration in the field of visualizations. This is providing the applications of
the big data so the data de-trending will also be implemented in the system. Based on the
available data, there will be data dynamic modeling will be implemented.

Slide 17: GAP analysis

•There is a gap between the research center and the real world based on the
availability of real data.

•During the time of testing, there is a lacking of an attack scenario.

There is a certain gap between the research lab and the real world where the lacking of data is
providing the gap between these two. Apart from this, there will be a lacking of the real, attack
condition in the case of the lab testing.

Slide 18: Gap analysis

•Lacking the attack scenario.





•Lacking the availability of modeling.
There is the provision of lacking the attack condition in the system so there are the provision of
making the different kinds of the attack scenario for the conduction of testing. Apart from this,
there is a lacking of the availability of statistical modeling in the system.

Slide 19: Conclusion

•Cyber security is one of the burning problems for the tech companies which are working on
data.

•The AI and machine learning and digital twins have been used for providing cyber security.

AI and machine learning are bringing automation I the field of cyber security for prevention of
the different kinds of cyber attacks. Apart from this, there will be digital twins have been used
for the prevention of attacks.

Slide 20: Recommendation

•After completion of the report this has been recommended that the digital twin will be
used for improving the cyber security in the network.

•Cyber security meshing is also applicable in providing protection.
Reference list

Moshood, T.D., Nawanir, G., Sorooshian, S. and Okfalisa, O., 2021. Digital twins drove supply chain
visibility within logistics: A new paradigm for future logistics. Applied System Innovation, 4(2), p.29.

BLOMKVIST, Y. and Ullemar Loenbom, L.E.O., 2020. Improving supply chain visibility within logistics by
implementing a Digital Twin: A case study at Scania Logistics.

Khan, B., Fatima, H., Qureshi, A., Kumar, S., Hanan, A., Hussain, J. and Abdullah, S., 2023. Drawbacks
of artificial intelligence and their potential solutions in the healthcare sector. Biomedical Materials &
Devices, pp.1-8.

Parisi, A., 2019. Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for
preventing cyber attacks and detecting threats and network anomalies. Packt Publishing Ltd.

He, Y., Luo, C., Camacho, R.S., Wang, K. and Zhang, H., 2020, September. AI-Based Security Attack
Pathway for Cardiac Medical Diagnosis Systems (CMDS). In 2020 Computing in Cardiology (pp. 1-4).
IEEE.

Yaacoub, J.P.A., Noura, H.N., Salman, O. and Chehab, A., 2021. A survey on ethical hacking: issues and
challenges. arXiv preprint arXiv:2103.15072.

Pradhan, K., John, P. and Sandhu, N., 2021. Use of artificial intelligence in healthcare delivery in India. J
Hosp Manag Health Policy, 5, pp.1-10.

Carter, S.M., Rogers, W., Win, K.T., Frazer, H., Richards, B. and Houssami, N., 2020. The ethical, legal,
and social implications of using artificial intelligence systems in breast cancer care. The Breast, 49, pp.25-
32.

Greenbaum, D., 2023. The Convergence of Biotechnology and Cybersecurity: A Primer on the Emerging
Field of Cybersecurity. Cybersecurity, pp.1-6.

Fomunyam, K.G., 2019. Education and the Fourth Industrial Revolution: Challenges and possibilities for
engineering education. International Journal of Mechanical Engineering and Technology, 10(8), pp.271-
284.

You might also like