[go: up one dir, main page]

0% found this document useful (0 votes)
24 views10 pages

AI Project

The project report focuses on cybersecurity, specifically addressing cyberattacks and fraud in online transactions. It outlines the problem statement, objectives, features of cybersecurity, the role of AI in threat detection, and future developments in the field. The report also includes acknowledgments, a bibliography, and emphasizes the importance of cybersecurity in promoting safe and inclusive societies.

Uploaded by

ifmdshahin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

AI Project

The project report focuses on cybersecurity, specifically addressing cyberattacks and fraud in online transactions. It outlines the problem statement, objectives, features of cybersecurity, the role of AI in threat detection, and future developments in the field. The report also includes acknowledgments, a bibliography, and emphasizes the importance of cybersecurity in promoting safe and inclusive societies.

Uploaded by

ifmdshahin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Affiliated to CBSE, New

Delhi

ClassI
X
84 – Artificial
3 Intelligence
Project
Report

 Name SANDEEP B -

 Class ___XI_________ Section ____ C___ __

 Roll Number ___________ _11305__________________________


 Academic Year ___________2024-25______ _____

 Project Title CYBER SECURITY -


ACKNOWLEDGEMENT

I would like to express my deepest gratitude to everyone who has


supported me throughout the development of this project on
"Cyberattacks and Fraud in Online Transactions."

Firstly, I would like to thank our respected Principal, [Ms. Priya Sridharan],
for her encouragement and continuous support, which provided the
motivation to complete this project successfully.

I am also extremely grateful to my AI teacher, [Ms. Ophilia Mam], whose


expert guidance, valuable insights, and patience were instrumental in
shaping this research.

I also want to extend my thanks to my peers and colleagues for their


collaborative efforts, ideas, and constructive feedback, which helped me
enhance the quality of my work.
S. NO. TOPIC

1. ACKNOWLEDGMENT

2. CERTIFICATE

3. PROJECT

4. BIBILIOGRAPHY

INDEX
PROJECT
1.Problem statement:
A problem statement in
cybersecurity identifies a
specific cybersecurity issue
or threat that an organization
or individual faces, outlining
the problem's impact and the
need for a solution.

2.
Users/Stakeholders: In cybersecurity,
stakeholders are individuals
or groups whose interests
can be affected by
cybersecurity decisions and
actions, including internal
employees, management,
customers, suppliers,
regulators, and external
partners.
3. Objectives: Integrity:
Preservation of Integrity.
Another critical aim of cyber
security is to preserve
the integrity of systems and
data. This means ensuring
that information Digital
Reneges

Awareness and Education:


To inform students about
various financial aid options,
eligibility criteria, and the
application process.
4. Features: Network Security
Protects the integrity,
confidentiality, and
availability of data and
resources in a network.
Includes firewalls, intrusion
detection/prevention systems
(IDS/IPS), and VPNs.
Information Security
Ensures that sensitive
information is protected from
unauthorized access and
alterations. Includes
encryption, data masking,
and secure data storage.

5. A.I used: Anomaly Detection: AI


algorithms can analyze
normal network behavior and
identify deviations that could
indicate cyber threats, such
as malware or unauthorized
access attempts

Incident Response
Automation: AI-driven
systems can automatically
respond to detected threats
in real-time. For example, if a
security breach is detected,
AI can isolate the affected
system.
6. Data Used: Data analytics gives us the
power to sift through digital
noise, identify hidden threats
and predict future attacks.
It's the key to faster incident
detection, more accurate
threat assessments and
data-driven security
decisions. For cybersecurity
professionals, developing
data analysis skills can make
you stand out from the
crowd.

7. Solution: Application security


solutions help test software
applications
for vulnerabilities during
development and testing
stages, and protect them
against attacks when running
in production.

Endpoint security—
deployed on endpoint
devices like servers and
employee workstations,
prevent threats like malware
and unauthorized access and
help detect and stop
breaches as they happen.
8. SDG Involved: Cybersecurity can help fight
cybercrime, such as online
fraud and cyberbullying,
which can pose a threat to
the safety of individuals and
communities. The fight
against cybercrime is
important to many of the
SDGs, including goal
16 which is about promoting
peaceful and inclusive
societies.
9. Future Scope: AI-Powered Threat
Detection: AI will become
increasingly integral to
identifying and responding to
new and complex cyber
threats. Advanced machine
learning algorithms will
continuously learn from
evolving attack methods and
adapt in real-time to new
tactics, techniques, and
procedures (TTPs) used by
cybercriminals.
Post-Quantum
Cryptography: With the
advent of quantum
computers, traditional
encryption methods may
become vulnerable. Research
into post-quantum
cryptography will develop
encryption techniques that
can withstand the power of
quantum computing.

BIBILIOGRAPHY
 https://chatgpt.com/c/67acb8bd-bec8-800d-81e1-08ea59c31d66
 https://www.rasmussen.edu/degrees/technology/blog/cyber security-
problems/
 https://pmc.ncbi.nlm.nih.gov/articles/PMC11155471/
 https://www.jaroeducation.com/blog/scope-of-cyber-security/
#:~:text=The%20scope%20of%20cyber%20security%20is
%20increasing%20daily%20as%20potent,itself%20against%20these
%20evolving%20threats.
 https://www.imperva.com/learn/application-security/cyber-security-
solutions/
 https://www.infosecinstitute.com/resources/general-security/data-
analytics-in cybersecurity/#:~:text=Data%20analytics%20use%20in
%20cybersecurity&text=Data%20analytics%20gives%20us
%20the,and%20data%2Ddriven%20security%20decisions.
 https://www.freepik.com/vectors/data-usage
 https://www.dreamstime.com/illustration/round-features.html
 https://www.freepik.com/premium-vector/language-computers-
programmer-s-guide_81508480.htm
 https://www.etsy.com/in-en/listing/1657432001/artificial-intelligence-
svg-ai-machine
 https://www.istockphoto.com/photos/artificial-intelligence
 https://www.vecteezy.com/free-vector/future-scope
 https://stock.adobe.com/in/search?k=implement+idea
 Cook book (For Reference)
 A.I. Book
THANK
YOU

You might also like