This week you learned about how automated artificial intelligence cybersecurity.docx
This week you learned about how automated artificial intelligence
cybersecurity
This week you learned about how automated artificial intelligence cybersecurity systems
are planned to provide a defense against threat actors. This assignment is designed to
support your understanding and synthesis of that knowledge. Specifically, you will perform
research on the applicable theoretical frameworks and current practices used to plan
automated artificial intelligence cybersecurity systems to facilitate the protection of the
organization’s critical information resources from current and future loss. Based on this
research, you will integrate the theories and practices to provide a novel conceptual system
overview for automation that uses artificial intelligence within cybersecurity
systems.Describe the theoretical frameworks and current practices used to guide the
planning of automated artificial intelligence cybersecurity systems to protect the
organization’s critical information resources from current and future cybersecurity-related
loss.Specific to artificial intelligence cybersecurity systems, explain the behavioral
differences between the common groups of threat actors, including cybercriminals, insiders,
nation-state actors, terrorists, hacktivists, script kiddies, and competitors.Create a block
diagram of the AI asset taxonomy system including the following asset categories: data,
model, actors, processes, environment & tools, and artifacts. Show the relationships
between the blocks and provide at least 10 example assets under each category.Describe
the high-level categorization of threats that comprise the AI threat landscape as AI
cybersecurity challenges.Discuss the threat-actor tactics used for new threat actor offense
strategies, including specific techniques, system outline, data flows, and resources needed
for these systems, and how the proposed plan addresses these problem threat areas in
practice. Describe how these tactics will need to evolve to prepare for the future
cybersecurity landscape.Length: 6 page paper, not including title and reference pages, plus
1 block diagramPlease include the Block Diagram