Professional Documents
Culture Documents
Assignment-Sherin Northhampton
Assignment-Sherin Northhampton
Cyber security is one of the growing concerns in the different hi-tech companies which are dealing with
different types of big data. Availability of the different models like knowledge breach protection, task
automation and knowledge authentication, and many more. This is the reason for enhancing the incident
responses of the different hi-tech companies by rapidly identifying tasks and decision-making measures.
AI is also following the data-driven approach based on data analysis and decision-making.
Slide 2: BACKGROUND
•Cyberattacks are increasing in volume and complexity in the different tech-driven companies.
•
•AI is conducting resource security operations that are staying ahead of the threats.
•
•Availability of the different models like natural language processing, and machine learning
drastically decreases the operation time.
Cyberattacks are increasing day by day as cyber frauds are using a number of attacks like
Malware attacks, Ransomware attacks have the ability to provide barriers in network operations.
AI is conducting the resource-based operation view, which is staying ahead of all the threats in
cyber security. There is the prohibition of cutting threat technologies which are reducing the
threats in cyber security. The availability of different models like natural language processing,
and machine learning have been used for preventing cyber attacks in the network.
Ethical hacking for preventing cyberattacks in the networks where the different types of
Malware attacks, phishing attacks, and super phishing have been prevented. Ethical
hackers are gaining unauthorized access to different networks to increase the security
of the network. They are taking the test in their own networks by providing the attacks in
their own system. They are the duplication of the strategies and the different types of
malicious attacks. Based on the hacking quality, there are three types of hackers that
have evolved white hat hackers, grey hat hackers, and black hat hackers.
Artificial intelligence is the process of the development of machines that are working like
humans. This is defined as human intelligence emergence by machines. The role of
humans is to give the decisions of the machines and AI is providing the outcomes of
the results. There are four types of artificial intelligence which are the limited memories
that are taking a limited number of instructions. Reactive machines have the ability to
make decisions based on the circumstances. With the theory in mind, machines are
working based on the availability of the models like machine learning, predictive
analysis models, and many more.
The digital twin is defined as the virtual model of the physical objects which is used to
send real-time data from one segment to another. This is the combination of the
sensors which is providing the communication path of the different types of digital data.
This is also supporting the behavior of the simulations based on the selected objects in
the same. There is little difference between the simulations and the digital twins. The
simulation is typically studying the particular objects and the digital twin is showing the
considerably richer study in the virtual environment.
Cybersecurity has been improved by using the digital twins to clean up the
vulnerabilities by creating virtual clones using different types of firmware. This is making
the different clone-type architecture which is working on the real-time data. This is
providing the expanded attack surface where the attack area has been increased in the
system. There is the provision of making the attack on the virtual system. After the
completion of the attack in the virtual system the data has been generated based on the
attack. With the help of the additional attack vector, they can be used to detect real
information regarding the attacker.
Slide 8: Emergence of the Internet of Things
The Internet of Things is the new invention of embedded technology which is providing
virtual connections between different hardware and different internet system. This is
requiring a single router for the transformation of data from one system to another one.
This is defined as the master router which is providing the higher speed of internet.
There is the provision of an IoT management system using the wider management of
the data. There are enabling the different sensors and IoT gateway for the collection
and communication of the data.
•This is enabling the industrial control system including devices and the network
capability.
•
•
•This is showing data theft, data or service manipulation, and the non-compliance of the
data.
•
•There are some kinds of possible attacks in the system which are the Bricker Bot,
Stuxnet, and Mirai Botnet.
IoT is facing a wider range of attacks due to the lacking of cyber security. There is an
advanced data management system which is protecting the prevention of attacks in the
network. This is enabling network control and increases the network security in the
system. This is also liable for increasing the network capability in the system. Due to the
advanced data management, there is the provision of making prevention of data theft
and non-compliance of the data in the network.
•Google China was hit by a cyber attack in 2009 where the data has been breached from
different servers in China.
•
•Teen hacks NASA and Google defense department.
•
•Sonic Wall company hack attempt in 2022.
There is some real-world case study there are the different kinds of hacking that have been
attempted throughout the country. There are Google China has been attacked by some
fraudsters. They have conducted phishing attacks to steal some information and personal
property as well. There are also data breaching that has been used to be conducted in the stealing
data and personal information as well. Apart from this, there a teenager aged 15 hacked NASA
and Google's defiance department in the year 1999. The most recent hacking activity has been
conducted on Sonic Wall in 2022.
Sonic Wall has been targeted multiple times by attackers to gain access which has recorded
139.3 million crypto jackings in 2022 which has recorded a 43 % increase in 2021. This is also
suffering attacks like Malware, Ransomware, and the different kinds of IoT Malware in the
company.
Sonic Wall has been targeted several times in the past few years. There is the provision of
making the webcast technology in the on-demand basics. This is the reason for increasing the
security of the system. The company has attempted the 6.3 million instruction attempt in 2022.
This is also enabling the advanced threat protection unit.
This is providing future simulations based on the different virtual processes in which the
different kinds of future simulations have been used for detecting cyber threats. This is
improving the defense capabilities in the different antivirus software and the virus detection
program. This is allowing the programmer for doing the pre-programming and counterstrike for
protecting the cyber attacks.
The digital twin is making the improvement in the visibility and the decision making based on
the three different techniques which are the decision regarding cloud where the virtual visibility
has been improved. Apart from this, there is open coding technology in which the coding has
been conducted on virtual platforms. Apart from this, there is the data analysis where the
different modeling has been conducted in the proper manner.
•Data detrending.
•There is a gap between the research center and the real world based on the
availability of real data.
•
•During the time of testing, there is a lacking of an attack scenario.
There is a certain gap between the research lab and the real world where the lacking of data is
providing the gap between these two. Apart from this, there will be a lacking of the real, attack
condition in the case of the lab testing.
•Cyber security is one of the burning problems for the tech companies which are working on
data.
•
•The AI and machine learning and digital twins have been used for providing cyber security.
AI and machine learning are bringing automation I the field of cyber security for prevention of
the different kinds of cyber attacks. Apart from this, there will be digital twins have been used
for the prevention of attacks.
•After completion of the report this has been recommended that the digital twin will be
used for improving the cyber security in the network.
•
•Cyber security meshing is also applicable in providing protection.
Reference list
Moshood, T.D., Nawanir, G., Sorooshian, S. and Okfalisa, O., 2021. Digital twins drove supply chain
visibility within logistics: A new paradigm for future logistics. Applied System Innovation, 4(2), p.29.
BLOMKVIST, Y. and Ullemar Loenbom, L.E.O., 2020. Improving supply chain visibility within logistics by
implementing a Digital Twin: A case study at Scania Logistics.
Khan, B., Fatima, H., Qureshi, A., Kumar, S., Hanan, A., Hussain, J. and Abdullah, S., 2023. Drawbacks
of artificial intelligence and their potential solutions in the healthcare sector. Biomedical Materials &
Devices, pp.1-8.
Parisi, A., 2019. Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for
preventing cyber attacks and detecting threats and network anomalies. Packt Publishing Ltd.
He, Y., Luo, C., Camacho, R.S., Wang, K. and Zhang, H., 2020, September. AI-Based Security Attack
Pathway for Cardiac Medical Diagnosis Systems (CMDS). In 2020 Computing in Cardiology (pp. 1-4).
IEEE.
Yaacoub, J.P.A., Noura, H.N., Salman, O. and Chehab, A., 2021. A survey on ethical hacking: issues and
challenges. arXiv preprint arXiv:2103.15072.
Pradhan, K., John, P. and Sandhu, N., 2021. Use of artificial intelligence in healthcare delivery in India. J
Hosp Manag Health Policy, 5, pp.1-10.
Carter, S.M., Rogers, W., Win, K.T., Frazer, H., Richards, B. and Houssami, N., 2020. The ethical, legal,
and social implications of using artificial intelligence systems in breast cancer care. The Breast, 49, pp.25-
32.
Greenbaum, D., 2023. The Convergence of Biotechnology and Cybersecurity: A Primer on the Emerging
Field of Cybersecurity. Cybersecurity, pp.1-6.
Fomunyam, K.G., 2019. Education and the Fourth Industrial Revolution: Challenges and possibilities for
engineering education. International Journal of Mechanical Engineering and Technology, 10(8), pp.271-
284.