AI Project
AI Project
Delhi
ClassI
X
84 – Artificial
3 Intelligence
Project
Report
Name SANDEEP B -
Firstly, I would like to thank our respected Principal, [Ms. Priya Sridharan],
for her encouragement and continuous support, which provided the
motivation to complete this project successfully.
1. ACKNOWLEDGMENT
2. CERTIFICATE
3. PROJECT
4. BIBILIOGRAPHY
INDEX
PROJECT
1.Problem statement:
A problem statement in
cybersecurity identifies a
specific cybersecurity issue
or threat that an organization
or individual faces, outlining
the problem's impact and the
need for a solution.
2.
Users/Stakeholders: In cybersecurity,
stakeholders are individuals
or groups whose interests
can be affected by
cybersecurity decisions and
actions, including internal
employees, management,
customers, suppliers,
regulators, and external
partners.
3. Objectives: Integrity:
Preservation of Integrity.
Another critical aim of cyber
security is to preserve
the integrity of systems and
data. This means ensuring
that information Digital
Reneges
Incident Response
Automation: AI-driven
systems can automatically
respond to detected threats
in real-time. For example, if a
security breach is detected,
AI can isolate the affected
system.
6. Data Used: Data analytics gives us the
power to sift through digital
noise, identify hidden threats
and predict future attacks.
It's the key to faster incident
detection, more accurate
threat assessments and
data-driven security
decisions. For cybersecurity
professionals, developing
data analysis skills can make
you stand out from the
crowd.
Endpoint security—
deployed on endpoint
devices like servers and
employee workstations,
prevent threats like malware
and unauthorized access and
help detect and stop
breaches as they happen.
8. SDG Involved: Cybersecurity can help fight
cybercrime, such as online
fraud and cyberbullying,
which can pose a threat to
the safety of individuals and
communities. The fight
against cybercrime is
important to many of the
SDGs, including goal
16 which is about promoting
peaceful and inclusive
societies.
9. Future Scope: AI-Powered Threat
Detection: AI will become
increasingly integral to
identifying and responding to
new and complex cyber
threats. Advanced machine
learning algorithms will
continuously learn from
evolving attack methods and
adapt in real-time to new
tactics, techniques, and
procedures (TTPs) used by
cybercriminals.
Post-Quantum
Cryptography: With the
advent of quantum
computers, traditional
encryption methods may
become vulnerable. Research
into post-quantum
cryptography will develop
encryption techniques that
can withstand the power of
quantum computing.
BIBILIOGRAPHY
https://chatgpt.com/c/67acb8bd-bec8-800d-81e1-08ea59c31d66
https://www.rasmussen.edu/degrees/technology/blog/cyber security-
problems/
https://pmc.ncbi.nlm.nih.gov/articles/PMC11155471/
https://www.jaroeducation.com/blog/scope-of-cyber-security/
#:~:text=The%20scope%20of%20cyber%20security%20is
%20increasing%20daily%20as%20potent,itself%20against%20these
%20evolving%20threats.
https://www.imperva.com/learn/application-security/cyber-security-
solutions/
https://www.infosecinstitute.com/resources/general-security/data-
analytics-in cybersecurity/#:~:text=Data%20analytics%20use%20in
%20cybersecurity&text=Data%20analytics%20gives%20us
%20the,and%20data%2Ddriven%20security%20decisions.
https://www.freepik.com/vectors/data-usage
https://www.dreamstime.com/illustration/round-features.html
https://www.freepik.com/premium-vector/language-computers-
programmer-s-guide_81508480.htm
https://www.etsy.com/in-en/listing/1657432001/artificial-intelligence-
svg-ai-machine
https://www.istockphoto.com/photos/artificial-intelligence
https://www.vecteezy.com/free-vector/future-scope
https://stock.adobe.com/in/search?k=implement+idea
Cook book (For Reference)
A.I. Book
THANK
YOU