Professional Documents
Culture Documents
What Is Artificial Intelligence? Cybersecurity and Applications Conclusion
What Is Artificial Intelligence? Cybersecurity and Applications Conclusion
A technique known as genetic programming involves feeding More Advanced vs. Less Advanced: As AI becomes more advanced, it becomes more
an algorithm data and telling the algorithm what this data is. integrated into our society. There are concerns on how AI would handle ethical dilemmas, and
The algorithm interprets this data, and when it is asked whether a more advanced AI would make more moral decisions over a less advanced AI..
questions about this data, developers determine if the results
fall within a certain acceptable frame. Algorithms that succeed
are built off and “reproduce,” while algorithms that fail are
destroyed. This happens repeatedly until an algorithm Cybersecurity Issues: AI may also pose some threats to the industries that they are implemented in. For
emerges that can essentially understand and make decisions example, in the cybersecurity field, an AI tasked with assigning users on a network certain privileges may
about the data that it is fed.2 automatically deny a user certain privileges based on biases that it may have.
Picture Credits:
1 Parnas, David Lorge. 2017. “The Real Risks of Artificial Intelligence: Incidents from the Early Days of AI Research Are Instructive in the Current AI Environment.” Communications of the ACM 60 (10): 27–31. doi:10.1145/3132724.
https://openclipart.org/tags/Artificial%20Intelligence
2
Milad Fatehnia, and Gholamreza Amirinia. “A Review of Genetic Programming and Artificial Neural Network Applications in Pile Foundations.” International Journal of Geo-Engineering, no. 1 (2018): 1. doi:10.1186/s40703-017-0067-6.
3
Howard, Ayanna, and Jason Borenstein. 2019. “Trust and Bias in Robots: These Elements of Artificial Intelligence Present Ethical Challenges, Which Scientists Are Trying to Solve.” American Scientist, no. 2: 86. https://www.istockphoto.com/ca/illustrations/artificial-intellig
4
Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver, and Pierre Collet. “Foundations and Applications of Artificial Intelligence for Zero-Day and Multi-Step Attack Detection.” EURASIP Journal on Information Security, Vol 2018, Iss 1, Pp 1-21 (2018), no. 1 (2018): 1. doi:10.1186/s13635-018-0074-y. ence?sort=mostpopular&mediatype=illustration&phrase=art
ificial%20intelligence
5
M Rhodes-Ousley, Information Security: the complete reference (McGraw-Hill Education, 2013).