before it infiltrates an organization's system.
The use of advanced artificial intelligence capabilities within business systems and
programs prevents the usage of weak passwords for sites, applications, and system access.
Passwords are an easy way through which hackers and cybercriminals use to access an
organization's system. Passwords must, therefore, have at least eight characters, one special
character, and a numerical. Moreover, artificial intelligence capabilities ensure that passwords
are periodically changed within set timelines. This ultimately ensures that passwords are not easy
to crack, hack, or even guess. This is a minimum level of security that computer and system
users need to have (Li, 2018).
Information contained in computers, mobile devices, and servers should always have a
backup; this protects the user from losing any information in case of a hack or cyber-attack.
Artificial intelligence and cybersecurity protocols always recommend that information or data be
backed in different locations away from the original site. Moreover, a backup should always be
done on a frequent basis; this ensures that the information is up to date and current.
Finally, cybersecurity professionals always recommend that social network information
be limited and minimal. Confidential information such as passwords, usernames, email
addresses, and secret questions should not be posted on social platforms; this increases the
exposure of a computer user to hacking. Browser settings and privacy protocols must always be
secure; this ensures that no unauthorized access is possible within a system or program.
Moreover, some websites require one to give sensitive personal data when signing up; internet

Research project
13
users must be very cautious about disclosing confidential information that may potentially be
used by hackers to access a system or site.
In the modern world, hacking has become a common activity; it's, therefore, imperative
that proactive actions are taken to boost one's cybersecurity. Ultimately, even with the presence
of artificial intelligence capabilities, cybersecurity and protection should be a personal initiative.
It, therefore, means that everyone must be cautious when it comes to the internet and usage of
systems. Antiviruses should be installed in electronic devices so as to prevent against any
malicious attempt to access or harm a device. Personal confidential information must continue to
become private; this will decrease one's vulnerabilities from potential hacks. Cybersecurity is
almost a basic need in this technology-driven world; it must, therefore, be taken with the
seriousness and pro-activeness that it rightfully deserves (Li, 2018).
Chapter 3
Research methodology
This chapter will provide comprehensive analysis of the research problem and the
projected objective of the research study. Artificial intelligence and cybersecurity is a sensitive
issue that needs professional and personal attention. Artificial intelligence has had a lot of
impacts on cybersecurity; these effects have been both positive and negative. A conclusive


You've reached the end of your free preview.
Want to read all 19 pages?
- Fall '19
- Artificial Intelligence