Nathan Vargoshe What is Artificial Intelligence?

Slides:



Advertisements
Similar presentations
Artificial Intelligence
Advertisements

A Brief History of Artificial Intelligence
Shailesh Appukuttan : M.Tech 1st Year CS344 Seminar
CSCE101 –Chapter 8 (continued) Tuesday, December 5, 2006.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Artificial Intelligence By Ryan Shoultes & Jeremy Creighton.
Succeeding with Technology Information, Decision Support… Decision Making and Problem Solving Management Information Systems Decision Support Systems Group.
Lecture 21 Principles of Grain Handling Systems. 1. There will always be a bottleneck in any materials handling system. 2. If design capacity is not being.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Chapter 12 The Macro Environment – Technological Influences
Spiking Neural Networks and You Brains and games.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Artificial intelligence systems form a broad and diverse set of.
MICHAEL FINE Artificial Intelligence and The Singularity 1.
Artificial Intelligence By Michelle Witcofsky And Evan Flanagan.
Artificial Intelligence and Expert Systems. ARTIFICIAL INTELLIGENCE (AI) is the science of R L Being able to Ability to solve a problem.
I Robot.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
Security Vulnerabilities in A Virtual Environment
Applicability Analysis of Software Testing for Actual Operating Railway Software Jong-Gyu Hwang 1, Hyun-Jeong Jo 1, Baek-Hyun Kim 1, Jong-Hyun Baek 1 1.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Role Of Network IDS in Network Perimeter Defense.
Presented by:- Reema Tariq Artificial Intelligence.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Overview of Artificial Intelligence (1) Artificial intelligence (AI) Computers with the ability to mimic or duplicate the functions of the human brain.
The Application of Data Mining in Telecommunication by Wang Lina February 2003.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
What is cognitive psychology?
How Artificial Intelligence is Changing the Supply Chain
Fundamentals of Information Systems, Sixth Edition
Chapter 11: Artificial Intelligence
Fundamentals of Information Systems
CHAPTER 1 Introduction BIC 3337 EXPERT SYSTEM.
Chapter 11: Artificial Intelligence
Chapter 1- Introduction
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Trends in my profession, Information Technology
Evaluating a Real-time Anomaly-based IDS
By: Medhanit Mamo and Jiaqi Yuan
Today’s Risk. Today’s Solutions. Cyber security and
Cyber Threat Intelligence Sharing Standards-based Repository
5G Security Training
CIS 333 RANK Education for Service-- cis333rank.com.
Artificial Intelligence
Artificial Intelligence
First work in AI 1943 The name “Artificial Intelligence” coined 1956
Privacy Through Anonymous Connection and Browsing
Network Intrusion Detection Using GA
PROACTIVE SNOOPING ANALYSIS
Course Instructor: knza ch
Introduction Artificial Intelligent.
Shifting from “Incident” to “Continuous” Response
Artificial Intelligence (Lecture 1)
Scientific Inquiry Standard B – 1.7.
A novel probabilistic language-based CAPTCHA system
Author(s). TITLE, Journal, vol. #, pp.#-#, Month, Year.
Artificial Intelligence in Manufacturing
Algorithmic Management and Fairness
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Emerging Information Technologies I
Integrating Deep Learning with Cyber Forensics
Maintaining order and safety in a city is no small task
Autonomous Network Alerting Systems and Programmable Networks
Artificial Intelligence
Irene-Angelica Chounta Senior Researcher
Challenges Of Network Security
Scientific Inquiry Standards B – 1.7 and B – 1.8.
What is Artificial Intelligence? (AI) is the simulation of human intelligence processes by machines, especially computer systems. These processes include.
Cybersecurity Simplified: Phishing
Artificial Intelligence and Trusted Microelectronics
Presentation transcript:

Artificial Intelligence: Ethical Issues and its Applications in Cyber Security Nathan Vargoshe What is Artificial Intelligence? Cybersecurity and Applications Conclusion Artificial Intelligence can be defined as technology that demonstrates some form of basic intelligence, including the ability to learn and make decisions. Theoretically, advanced AI may even have the capacity to simulate and surpass the cognitive abilities of the human mind.1 This technology has been playing an increasingly large role in today’s society. Artificial Intelligence is undoubtedly becoming a large part of society today, and while this advanced technology introduces new issues, it also provides many benefits to a number of industries, including the cybersecurity field. It is important to note that this technology is still fairly new, and although there are ethical issues concerning the integration of AI into society, the technology continues to develop and improve. The benefits offered by AI in the cybersecurity field outweigh the controversies in, and since the industry of cybersecurity is ever-changing, AI is necessary to keep up with the changes. Cybersecurity is a field of study in the computer science industry that is dedicated to countering malicious attacks and exploits on networks. Having the proper countermeasures to these attacks are necessary, as the results of a successful attack can be catastrophic for the victim. AI technology has a promising future in the field of cybersecurity. Machine learning has been used to identify anomalous events on a network, which is often a signal of many types of attacks.4 Because of its ability to detect these signs of an attack, AI can be incorporated into intrusion detection systems (IDSs), which monitor network traffic and detect malicious activity.5 Ethical Issues How does Artificial Intelligence Work? The simple calculations and processes that occur in the human mind during every second of the day are actually much more complex than they initially seem, and developing a computer program to perform these same calculations takes time. Machine Learning is the term that is used to define how an AI “learns.” A technique known as genetic programming involves feeding an algorithm data and telling the algorithm what this data is. The algorithm interprets this data, and when it is asked questions about this data, developers determine if the results fall within a certain acceptable frame. Algorithms that succeed are built off and “reproduce,” while algorithms that fail are destroyed. This happens repeatedly until an algorithm emerges that can essentially understand and make decisions about the data that it is fed.2 Bias: AI has the potential to be biased due to it needing to learn from information that is given to it. Therefore, it has the potential to inherit the biases of the human creators.3 More Advanced vs. Less Advanced: As AI becomes more advanced, it becomes more integrated into our society. There are concerns on how AI would handle ethical dilemmas, and whether a more advanced AI would make more moral decisions over a less advanced AI.. Cybersecurity Issues: AI may also pose some threats to the industries that they are implemented in. For example, in the cybersecurity field, an AI tasked with assigning users on a network certain privileges may automatically deny a user certain privileges based on biases that it may have. Picture Credits: https://openclipart.org/tags/Artificial%20Intelligence https://www.istockphoto.com/ca/illustrations/artificial-intelligence?sort=mostpopular&mediatype=illustration&phrase=artificial%20intelligence 1 Parnas, David Lorge. 2017. “The Real Risks of Artificial Intelligence: Incidents from the Early Days of AI Research Are Instructive in the Current AI Environment.” Communications of the ACM 60 (10): 27–31. doi:10.1145/3132724. 2 Milad Fatehnia, and Gholamreza Amirinia. “A Review of Genetic Programming and Artificial Neural Network Applications in Pile Foundations.” International Journal of Geo-Engineering, no. 1 (2018): 1. doi:10.1186/s40703-017-0067-6. 3 Howard, Ayanna, and Jason Borenstein. 2019. “Trust and Bias in Robots: These Elements of Artificial Intelligence Present Ethical Challenges, Which Scientists Are Trying to Solve.” American Scientist, no. 2: 86. 4 Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver, and Pierre Collet. “Foundations and Applications of Artificial Intelligence for Zero-Day and Multi-Step Attack Detection.” EURASIP Journal on Information Security, Vol 2018, Iss 1, Pp 1-21 (2018), no. 1 (2018): 1. doi:10.1186/s13635-018-0074-y. 5 M Rhodes-Ousley, Information Security: the complete reference (McGraw-Hill Education, 2013).