The use of advanced artificial intelligence capabilities within business

The use of advanced artificial intelligence

This preview shows page 12 - 14 out of 19 pages.

before it infiltrates an organization's system. The use of advanced artificial intelligence capabilities within business systems and programs prevents the usage of weak passwords for sites, applications, and system access. Passwords are an easy way through which hackers and cybercriminals use to access an organization's system. Passwords must, therefore, have at least eight characters, one special character, and a numerical. Moreover, artificial intelligence capabilities ensure that passwords are periodically changed within set timelines. This ultimately ensures that passwords are not easy to crack, hack, or even guess. This is a minimum level of security that computer and system users need to have (Li, 2018). Information contained in computers, mobile devices, and servers should always have a backup; this protects the user from losing any information in case of a hack or cyber-attack. Artificial intelligence and cybersecurity protocols always recommend that information or data be backed in different locations away from the original site. Moreover, a backup should always be done on a frequent basis; this ensures that the information is up to date and current. Finally, cybersecurity professionals always recommend that social network information be limited and minimal. Confidential information such as passwords, usernames, email addresses, and secret questions should not be posted on social platforms; this increases the exposure of a computer user to hacking. Browser settings and privacy protocols must always be secure; this ensures that no unauthorized access is possible within a system or program. Moreover, some websites require one to give sensitive personal data when signing up; internet
Image of page 12
Research project 13 users must be very cautious about disclosing confidential information that may potentially be used by hackers to access a system or site. In the modern world, hacking has become a common activity; it's, therefore, imperative that proactive actions are taken to boost one's cybersecurity. Ultimately, even with the presence of artificial intelligence capabilities, cybersecurity and protection should be a personal initiative. It, therefore, means that everyone must be cautious when it comes to the internet and usage of systems. Antiviruses should be installed in electronic devices so as to prevent against any malicious attempt to access or harm a device. Personal confidential information must continue to become private; this will decrease one's vulnerabilities from potential hacks. Cybersecurity is almost a basic need in this technology-driven world; it must, therefore, be taken with the seriousness and pro-activeness that it rightfully deserves (Li, 2018). Chapter 3 Research methodology This chapter will provide comprehensive analysis of the research problem and the projected objective of the research study. Artificial intelligence and cybersecurity is a sensitive issue that needs professional and personal attention. Artificial intelligence has had a lot of impacts on cybersecurity; these effects have been both positive and negative. A conclusive
Image of page 13
Image of page 14

You've reached the end of your free preview.

Want to read all 19 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture