SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
Cyber Security
in AI
(Artificial Intelligence)
Made By:- Harsh Bhanushali
What isArtificial Intelligence?
Artificial intelligence (AI) refers to the simulation of human intelligence in
machines that are programmed to think like humans and mimic their actions.
The term may also be applied to any machine that exhibits traits associated with a
human mind such as learning and problem-solving.
What isCyber Security?
Cyber security refers to the body of technologies, processes, and
practices designed to protect networks, devices, programs, and data
from attack, damage, or unauthorized access. Cyber security may also
be referred to as information technology security.
The role of AI in Cyber
Security
Artificialintelligence (AI)
with cybersecurity, securityprofessionals have
additional resources to defend vulnerable networks
and data from cyberattackers. After applying this
technology, it brought instant insights, resulting in
reduced response times.
How AI help in
Cyber Security?
Artificialintelligence techniques can be
used to learn how to remove noise or
unwanted data and to
enable securityexperts to understand
the cyberenvironment in order to detect
abnormal activity. Ai can also
benefit cybersecurity with automated
techniques to generate
whenever cyberthreats are detected.
Which is better artificial
intelligence or cyber
security?
In terms of difficultness to learn and
job growth rate, Artificial
Intelligenceis better than Cyber
Securitybut Cyber
Securityand ArtificialIntelligenceis
equally important. Many companies
are using Artificial
intelligencefor Cyber
Securityapplications.
What are the types of cyber
security?
5 Main types of cyber security
are:-
1) Critical infrastructure
security
2) Application Security
3) Network Security
1. Critical infrastructure
security:
Critical infrastructure security
consists of the cyber-physical
systems that modern societies
rely on.
Common examples of critical
infrastructure are electricity
grid, water purification, traffic
lights, shopping centers,
2. Application security:
Application security uses
software and hardware
methods to tackle external
threats that can arise in the
development stage of an
application.
Applications are much more
accessible over networks,
causing the adoption of
security measures during the
development phase to be an
imperative phase of the
project.
Types of application security:
• antivirus programs
3. Network security:
Cyber security is concerned
with outside threats, network
security guards against
unauthorized intrusion of your
internal networks due to
malicious intent.
Common examples of network
security implementation:
• extra logins
• new passwords
• application security
4. Cloud Security:
Cloud security is a software-based security tool that
protects and monitors the data in your cloud
resources. Cloud providers are constantly creating
and implementing new security tools to help
enterprise users better secure their data.
The report further finds that…
• On-premise environment users experience an
average of 61.4 attacks while;
• Service provider environment customers
experienced an average of 27.8 attacks.
5. Internet of things (IoT)
security
IoT refers to a wide variety of critical and non-critical cyber
physical systems, like appliances, sensors, televisions, wifi
routers, printers, and security cameras.
A study done by Bain found that
• security is one of the biggest barriers to great IoT
adoption
• enterprises would buy more IoT devices on average if
security concerns were addressed
• enterprises are optimistic about IoT’s business value
and growth
Cyber Security in AI (Artificial Intelligence)

More Related Content

What's hot (20)

PDF
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
 
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
PPTX
Cyber security and AI
DexterJanPineda
 
PPTX
Cyber security
Pihu Goel
 
PDF
Security Automation and Machine Learning
Siemplify
 
PPTX
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
Machine learning in Cyber Security
RajathV2
 
PDF
Cyber security and demonstration of security tools
Vicky Fernandes
 
PDF
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
PPTX
Cyber security
Sapna Patil
 
PPTX
AI and ML in Cybersecurity
Forcepoint LLC
 
PPTX
Cyber security
Harsh verma
 
PDF
AI and Cybersecurity - Food for Thought
NUS-ISS
 
PPTX
Cybercrime and Security
Noushad Hasan
 
PDF
Introduction to Information Security
Dumindu Pahalawatta
 
PDF
Artificial Intelligence in cybersecurity
SmartlearningUK
 
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Cyber security and AI
DexterJanPineda
 
Cyber security
Pihu Goel
 
Security Automation and Machine Learning
Siemplify
 
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber Security Awareness
Ramiro Cid
 
Machine learning in Cyber Security
RajathV2
 
Cyber security and demonstration of security tools
Vicky Fernandes
 
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
Cyber security
Sapna Patil
 
AI and ML in Cybersecurity
Forcepoint LLC
 
Cyber security
Harsh verma
 
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Cybercrime and Security
Noushad Hasan
 
Introduction to Information Security
Dumindu Pahalawatta
 
Artificial Intelligence in cybersecurity
SmartlearningUK
 

Similar to Cyber Security in AI (Artificial Intelligence) (20)

PPTX
Introduction to intelligence cybersecurity
arazaque2675
 
PDF
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
PPTX
Module 1Introduction to cyber security.pptx
Skippedltd
 
PDF
Top cybersecurity courses in India 2025.
aabb03448
 
PDF
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
PPTX
IMPORTANCE OF IN THE WORLD Cyber security.pptx
falloudiop940
 
PDF
Strengthening Digital Fortresses The Role of AI Engineers in Modern Cybersecu...
sarat06711
 
PDF
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
PDF
Cyber security notes or Mca/bca about security
rahulsinghvi13
 
PDF
Computer Network Security
Sachithra Gayan
 
PDF
Cyber Security Intelligence
ijtsrd
 
PDF
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
PDF
Introduction to Cyber Security presentation
Rosy G
 
PDF
A review: Artificial intelligence and expert systems for cyber security
bijejournal
 
PDF
Anatomy of a cyber attack
Mark Silver
 
PDF
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
 
PDF
A Study On Recent Trends And Developments In Intrusion Detection System
Lindsey Sais
 
PDF
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
PPTX
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
ddhhiiyyaa20131
 
PDF
network_security.docx_2.pdf
ahmed53254
 
Introduction to intelligence cybersecurity
arazaque2675
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
Module 1Introduction to cyber security.pptx
Skippedltd
 
Top cybersecurity courses in India 2025.
aabb03448
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
IMPORTANCE OF IN THE WORLD Cyber security.pptx
falloudiop940
 
Strengthening Digital Fortresses The Role of AI Engineers in Modern Cybersecu...
sarat06711
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
Cyber security notes or Mca/bca about security
rahulsinghvi13
 
Computer Network Security
Sachithra Gayan
 
Cyber Security Intelligence
ijtsrd
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
Introduction to Cyber Security presentation
Rosy G
 
A review: Artificial intelligence and expert systems for cyber security
bijejournal
 
Anatomy of a cyber attack
Mark Silver
 
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
 
A Study On Recent Trends And Developments In Intrusion Detection System
Lindsey Sais
 
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
ddhhiiyyaa20131
 
network_security.docx_2.pdf
ahmed53254
 
Ad

Recently uploaded (20)

PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
PDF
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Top Managed Service Providers in Los Angeles
Captain IT
 
Ad

Cyber Security in AI (Artificial Intelligence)

  • 1. Cyber Security in AI (Artificial Intelligence) Made By:- Harsh Bhanushali
  • 2. What isArtificial Intelligence? Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. The term may also be applied to any machine that exhibits traits associated with a human mind such as learning and problem-solving. What isCyber Security? Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 3. The role of AI in Cyber Security Artificialintelligence (AI) with cybersecurity, securityprofessionals have additional resources to defend vulnerable networks and data from cyberattackers. After applying this technology, it brought instant insights, resulting in reduced response times. How AI help in Cyber Security? Artificialintelligence techniques can be used to learn how to remove noise or unwanted data and to enable securityexperts to understand the cyberenvironment in order to detect abnormal activity. Ai can also benefit cybersecurity with automated techniques to generate whenever cyberthreats are detected. Which is better artificial intelligence or cyber security? In terms of difficultness to learn and job growth rate, Artificial Intelligenceis better than Cyber Securitybut Cyber Securityand ArtificialIntelligenceis equally important. Many companies are using Artificial intelligencefor Cyber Securityapplications.
  • 4. What are the types of cyber security? 5 Main types of cyber security are:- 1) Critical infrastructure security 2) Application Security 3) Network Security 1. Critical infrastructure security: Critical infrastructure security consists of the cyber-physical systems that modern societies rely on. Common examples of critical infrastructure are electricity grid, water purification, traffic lights, shopping centers, 2. Application security: Application security uses software and hardware methods to tackle external threats that can arise in the development stage of an application. Applications are much more accessible over networks, causing the adoption of security measures during the development phase to be an imperative phase of the project. Types of application security: • antivirus programs
  • 5. 3. Network security: Cyber security is concerned with outside threats, network security guards against unauthorized intrusion of your internal networks due to malicious intent. Common examples of network security implementation: • extra logins • new passwords • application security 4. Cloud Security: Cloud security is a software-based security tool that protects and monitors the data in your cloud resources. Cloud providers are constantly creating and implementing new security tools to help enterprise users better secure their data. The report further finds that… • On-premise environment users experience an average of 61.4 attacks while; • Service provider environment customers experienced an average of 27.8 attacks. 5. Internet of things (IoT) security IoT refers to a wide variety of critical and non-critical cyber physical systems, like appliances, sensors, televisions, wifi routers, printers, and security cameras. A study done by Bain found that • security is one of the biggest barriers to great IoT adoption • enterprises would buy more IoT devices on average if security concerns were addressed • enterprises are optimistic about IoT’s business value and growth