Risk Assessment of Artificial Intelligence Systems in Cybersecurity
Keywords:
cybersecurity, NIST, Risk mitigation, vulnerabilities, methodologiesAbstract
The article focuses on the vital function of AI (Artificial Intelligence) in cybersecurity measures and argues for effective risk assessment techniques in AI-powered cybersecurity. In this section, the article explored AI in cybersecurity by emphasizing the AI technologies that are in use and what their applications are in the field of threat detection, vulnerability management, and proactive defense mechanisms. Moreover, the article looked into the AI security risk types, such as malicious AI, biases, fairness issues, potential vulnerabilities, and the ethical questions the AI process causes. The paper explained the concepts of frameworks and methodologies for assessing risks in AI systems, beginning with existing risk assessment frameworks, such as the NIST cybersecurity framework and the FAIR framework methodologies. Risk mitigation strategies of AI systems, regulatory and ethical issues, and future AI and cybersecurity problems concerning technological progress are also assessed. As concluded, implementing regulations for compliance, ethical principles, and technological developments is the key to meeting the new challenges and developing safe and sustainable digital systems. The recommendations comprise fostering transparency, accountability, and continuous education and awareness programs to enable people to manage ethical dilemmas and mitigate the risks very well.
References
Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). "Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions." Information Fusion, vol. 101804.
Aslam, M. (2024). "AI and Cybersecurity: An Ever-Evolving Landscape." International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 1, pp. 52-71.
Wiafe, F., Koranteng, N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020). "Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature." IEEE Access, vol. 8, pp. 146598-146612.
Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). "Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review." Electronics, vol. 11, no. 2, p. 198.
Dash, B., Ansari, M. F., Sharma, P., & Ali, A. (2022). "Threats and Opportunities with AI-Based Cyber Security Intrusion Detection: A Review." International Journal of Software Engineering & Applications (IJSEA), vol. 13, no. 5.
Jain, V., Balakrishnan, A., Chintale, P., Gadiparthi, S., & Najana, M. (2024). "Blockchain Empowerment in Sanctions and AML Compliance: A Transparent Approach." International Journal of Computer Trends and Technology, vol. 72, no. 5, pp. 1-10.
Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). "Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity." IEEE Access, vol. 8, pp. 23817-23837.
Soni, V. D. (2020). "Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA." SSRN, 3624487.
Naik, B., Mehta, A., Yagnik, H., & Shah, M. (2022). "The Impacts of Artificial Intelligence Techniques in Augmentation of Cybersecurity: A Comprehensive Review." Complex & Intelligent Systems, vol. 8, no. 2, pp. 1763-1780.
Nadella, G. S., & Gonaygunta, H. (2021). "Enhancing Cybersecurity with Artificial Intelligence: Predictive Techniques and Challenges in the Age of IoT."
Mehrabi, N., Morstatter, F., Saxena, N., Lerman, K., & Galstyan, A. (2021). "A Survey on Bias and Fairness in Machine Learning." ACM Computing Surveys (CSUR), vol. 54, no. 6, pp. 1-35.
Landers, R. N., & Behrend, T. S. (2023). "Auditing the AI Auditors: A Framework for Evaluating Fairness and Bias in High Stakes AI Predictive Models." American Psychologist, vol. 78, no. 1, p. 36.
Fletcher, R., Nakeshimana, R. A., & Olubeko, O. (2021). "Addressing Fairness, Bias, and Appropriate Use of Artificial Intelligence and Machine Learning in Global Health." Frontiers in Artificial Intelligence, vol. 3, p. 561802.
Berghoff, M., Neu, J., & von Twickel, A. (2020). "Vulnerabilities of Connectionist AI Applications: Evaluation and Defense." Frontiers in Big Data, vol. 3, p. 23.
Breda, P., Markova, R., Abdin, A., Jha, D., Carlo, A., & Mantı, N. P. (2022). "Cyber Vulnerabilities and Risks of AI Technologies in Space Applications." In 73rd International Astronautical Congress (IAC), Paris, France.