Publicidad
This week you learned about how automated artificial intelligence cybersecurity.docx
Próximo SlideShare
PART ONEInstructionsSeveral tools exist that can be used bPART ONEInstructionsSeveral tools exist that can be used b
Cargando en ... 3
1 de 1
Publicidad

Más contenido relacionado

Similar a This week you learned about how automated artificial intelligence cybersecurity.docx(20)

Publicidad

This week you learned about how automated artificial intelligence cybersecurity.docx

  1. This week you learned about how automated artificial intelligence cybersecurity This week you learned about how automated artificial intelligence cybersecurity systems are planned to provide a defense against threat actors. This assignment is designed to support your understanding and synthesis of that knowledge. Specifically, you will perform research on the applicable theoretical frameworks and current practices used to plan automated artificial intelligence cybersecurity systems to facilitate the protection of the organization’s critical information resources from current and future loss. Based on this research, you will integrate the theories and practices to provide a novel conceptual system overview for automation that uses artificial intelligence within cybersecurity systems.Describe the theoretical frameworks and current practices used to guide the planning of automated artificial intelligence cybersecurity systems to protect the organization’s critical information resources from current and future cybersecurity-related loss.Specific to artificial intelligence cybersecurity systems, explain the behavioral differences between the common groups of threat actors, including cybercriminals, insiders, nation-state actors, terrorists, hacktivists, script kiddies, and competitors.Create a block diagram of the AI asset taxonomy system including the following asset categories: data, model, actors, processes, environment & tools, and artifacts. Show the relationships between the blocks and provide at least 10 example assets under each category.Describe the high-level categorization of threats that comprise the AI threat landscape as AI cybersecurity challenges.Discuss the threat-actor tactics used for new threat actor offense strategies, including specific techniques, system outline, data flows, and resources needed for these systems, and how the proposed plan addresses these problem threat areas in practice. Describe how these tactics will need to evolve to prepare for the future cybersecurity landscape.Length: 6 page paper, not including title and reference pages, plus 1 block diagramPlease include the Block Diagram
Publicidad