The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities

Adewale Daniel Sontan 1, * and Segun Victor Samuel 2

1 Independent Researcher, Newark, New Jersey, 07103, USA.
2 Independent Researcher, Johannesburg, South Africa.
 
Review Article
World Journal of Advanced Research and Reviews, 2024, 21(02), 1720–1736
Article DOI: 10.30574/wjarr.2024.21.2.0607
 
Publication history: 
Received on 13 January 2024; revised on 24 February 2024; accepted on 26 February 2024
 
Abstract: 
The fusion of artificial intelligence (AI) with cybersecurity represents a paradigm shift in our efforts to safeguard digital assets against a dynamic threat landscape. This manuscript comprehensively analyses AI's transformative role in cybersecurity, covering foundational principles, advanced methodologies, and ethical considerations. This article begins with exploring fundamental AI techniques such as machine learning and natural language processing. The manuscript delineates their applications in bolstering threat detection, vulnerability analysis, and incident response. Traditional approaches to vulnerability analysis are juxtaposed with AI-driven methodologies, highlighting the efficacy of automated scanning, threat prioritization, and adaptive risk assessment. Moreover, the manuscript delves into the pivotal role of AI-driven automation in expediting incident response, minimizing human error, and fortifying overall security postures. Ethical and privacy concerns surrounding AI deployment in cybersecurity are carefully examined, emphasizing the importance of responsible decision-making, privacy protection, and transparency. Looking ahead, emerging trends such as adversarial machine learning and zero trust security present promising avenues for further exploration, offering opportunities to enhance digital resilience against evolving threats.
 
Keywords: 
Artificial Intelligence; Cyber Security; Threat Detection; Incident Response; Vulnerability Scanning; Machine Learning
 
Full text article in PDF: 
Share this