Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Artificial Intelligence and Cybersecurity: A Global Scenario

Version 1 : Received: 6 May 2024 / Approved: 7 May 2024 / Online: 8 May 2024 (08:52:15 CEST)

How to cite: Mandal, S.; Patra, S. K. Artificial Intelligence and Cybersecurity: A Global Scenario. Preprints 2024, 2024050415. https://doi.org/10.20944/preprints202405.0415.v1 Mandal, S.; Patra, S. K. Artificial Intelligence and Cybersecurity: A Global Scenario. Preprints 2024, 2024050415. https://doi.org/10.20944/preprints202405.0415.v1

Abstract

Artificial Intelligence (AI) tools and techniques are comparatively recent advances of present-day globalized world. With their easy availability and friendly user interface AI has affected every sphere of human being. These tools are increasingly becoming popular because of the numerous benefits occurred to the society in many ways. However, there are not only the positive side of these technologies, but also many negative sides. Along with the development and adoption of AI, cyber-attacks are increased and disrupting the information system. Threat actors may misuse artificial intelligence. Hence, these tool designers are working and applying the ability of generative AI can tip the scales in cybersecurity. So, in the age of AI, there is always tension between the cyber attackers and the defenders to make a balanced information system. It is a general rule that defenders must be well in advance in their favor and keep ahead of adversaries. The United National and several governments for example the US, UK, and the big AI giants like Microsoft along with OpenAI, are working on emerging cyberattacks. This research paper explores the concept of information resilience in ML and AI systems, focusing on strategies to enhance their ability to withstand uncertainties, adversarial attacks, and data perturbations.

Keywords

artificial intelligence; machine learning; information resilience; robustness; data bias

Subject

Social Sciences, Safety Research

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.