Role of Artificial Intelligence in Enhancing Information Assurance

Authors

  • Nahid Neoaz Wilmington University, USA

Keywords:

Theoretical plane, AI, differences, self-governing systems, risks, adaptive systems, Bit coin, safety language, armor against cyber criminality, constant vigil, isolation, data clone, data purity.

Abstract

Abstract: The unveiling of AI in the supplement of Information assurance is revolutionizing practice of Cybersecurity in organization. Derived from AI enablers of ML and DL, NLP makes a significant contribution in the construction of threat perception, risk management, immediate response, and recovery to incidents than the conventional security. Executive Summary Machine Learning Employment A raw feed of a vast volume of data in advance technology can be fed in on a continuous basis, these data can be filtered, analyzed, verified, interpreted, patterns can be generated, threat identification and threat handling can be done on an automated basis and time loss to threats and time taken for rectifications can be minimized. The value of AI can consequently be justified on the basis of further details within the vulnerability management on the basis of risk prioritization, the analytical approach of patch metallization as well as the detection of new vulnerability, the so-called zero-day-vulnerability; for incident response, AI is of relevance because it uses the analytical potentials of AI in order to immediately contain the event, to drive the recovery process, and during findings analysis. That is why its constant supervision is one of the activities that make AI enhance one or another stabilization of the organizational systems, and provides the prognosis of dangers and the implementation of numerous rehearsing. Therefore, AI as the potential future solution in the sphere of cybersecurity needs to be discussed in connection with the data safety concerns, as well as ethical issues and roles of people. The principal concern of this paper is therefore, on how convenient on information assurance is, with point reference to the aspect of how it can be convenient in helping to elucidate threats, for the purpose of responding independently and in improving the recovery process; notwithstanding, like everything in this world, AI has both advantages and disadvantages that require reconsideration. Which is why AI is a strategic asset that needs to be used to protect organizations and their systems against today’s and tomorrow’s cyber threats.

References

Zheng, Q., Yu, C., Cao, J., Xu, Y., Xing, Q., & Jin, Y. (2024). Advanced Payment Security System: XGBoost, LightGBM and SMOTE Integrated. arXiv preprint arXiv:2406.04658.

Song, X., Wu, D., Zhang, B., Peng, Z., Dang, B., Pan, F., & Wu, Z. (2023). Zeroprompt: streaming acoustic encoders are zero-shot masked lms. arXiv preprint arXiv:2305.10649.

Lyu, W., Zheng, S., Pang, L., Ling, H., & Chen, C. (2023). Attention-enhancing backdoor attacks against bert-based models. arXiv preprint arXiv:2310.14480.

Yu, C., Jin, Y., Xing, Q., Zhang, Y., Guo, S., & Meng, S. (2024). Advanced User Credit Risk Prediction Model using LightGBM, XGBoost and Tabnet with SMOTEENN. arXiv preprint arXiv:2408.03497.

Peng, H., Xie, X., Shivdikar, K., Hasan, M. A., Zhao, J., Huang, S., & Ding, C. (2024, April). Maxk-gnn: Extremely fast gpu kernel design for accelerating graph neural networks training. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2 (pp. 683-698).

Lyu, W., Dong, X., Wong, R., Zheng, S., Abell-Hart, K., Wang, F., & Chen, C. (2022). A multimodal transformer: Fusing clinical notes with structured EHR data for interpretable in-hospital mortality prediction. In AMIA Annual Symposium Proceedings (Vol. 2022, p. 719). American Medical Informatics Association

Weng, Y., & Wu, J. (2024). Big data and machine learning in defense. International Journal of Computer Science and Information Technology, 16(2), 25-35.

Yu, C., Xu, Y., Cao, J., Zhang, Y., Jin, Y., & Zhu, M. (2024). Credit card fraud detection using advanced transformer model. arXiv preprint arXiv:2406.03733.

Jin, C., Peng, H., Zhao, S., Wang, Z., Xu, W., Han, L., & Metaxas, D. N. (2024). APEER: Automatic Prompt Engineering Enhances Large Language Model Rerunning. arXiv preprint arXiv:2406.14449.

Lin, Z., Wang, Z., Zhu, Y., Li, Z., & Qin, H. (2024). Text Sentiment Detection and Classification Based on Integrated Learning Algorithm. Applied Science and Engineering Journal for Advanced Research, 3(3), 27-33.

Zhu, A., Li, J., & Lu, C. (2021). Pseudo view representation learning for monocular RGB-D human pose and shape estimation. IEEE Signal Processing Letters, 29, 712-716

Liu, T., Cai, Q., Xu, C., Hong, B., Ni, F., Qiao, Y., & Yang, T. (2024). Rumor Detection with A Novel Graph Neural Network Approach. Academic Journal of Science and Technology, 10(1), 305-310.

Lipeng, L., Xu, L., Liu, J., Zhao, H., Jiang, T., & Zheng, T. (2024). Prioritized experience replay-based DDQN for Unmanned Vehicle Path Planning. arXiv preprint arXiv:2406.17286.

Luo, H., Wu, T., Han, C. F., & Yan, Z. (2022, December). IGN: Implicit Generative Networks. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 560-566). IEEE.

Jin, C., Che, T., Peng, H., Li, Y., & Pavone, M. (2024). Learning from teaching regularization: Generalizable correlations should be easy to imitate. arXiv preprint arXiv:2402.02769.

Peng, H., Ran, R., Luo, Y., Zhao, J., Huang, S., Thorat, K., & Ding, C. (2024). Lingcn: Structural linearized graph convolutional network for homomorphically encrypted inference. Advances in Neural Information Processing Systems, 36. ISSN: 3006-4023 (Online), Journal of Artificial Intelligence General Science (JAIGS) DOI: 10.60087 398

Yan, C., Weng, Y., Wang, J., Zhao, Y., Zou, Y., Li, Z., & Baltimore, U. S. Enhancing Credit Card Fraud Detection Through Adaptive Model Optimization.

Liu, T., Cai, Q., Xu, C., Hong, B., Xiong, J., Qiao, Y., & Yang, T. (2024). Image Captioning in News Report Scenario. Academic Journal of Science and Technology, 10(1), 284-289.

Deng, T., Shen, G., Qin, T., Wang, J., Zhao, W., Wang, J., & Chen, W. (2024). Plgslam: Progressive neural scene represenation with local to global bundle adjustment. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 19657-19666).

Sun, C., Li, S., Lin, Y., & Hu, W. (2022). From Visual Behavior to Signage Design: A Wayfinding Experiment with Eye-Tracking in Satellite Terminal of PVG Airport. In Proceedings of the 2021 DigitalFUTURES: The 3rd International Conference on Computational Design and Robotic Fabrication (CDRF 2021) 3 (pp. 252-262). Springer Singapore

Desyatnyuk, O., Naumenko, M., Lytovchenko, I., & Beketov, O. (2024). Impact of digitalization on international financial security in conditions of sustainable development. Problemy Ekorozwoju, 19(1), 104-114.

Evren, R., & Milson, S. (2024). The cyber threat landscape: understanding and mitigating risks (No. 11705). EasyChair.

George, A.S., Baskar, T., & Srikaanth, P.B. (2024). Cyber threats to critical infrastructure: assessing vulnerabilities across key sectors. Partners Universal International Innovation Journal, 2(1), 51-75.

George, A.S., Baskar, T., & Srikaanth, P.B. (2024). Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities across Key Sectors. Partners Universal International Innovation Journal, 2(1), 51-75.

Gounari, M., Stergiopoulos, G., Pipyros, K., & Gritzalis, D. (2024). Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards. International Cybersecurity Law Review, 1- 42.

Groenewald, E., & Kilag, O.K. (2024). E-commerce Inventory Auditing: Best Practices, Challenges, and the Role of Technology. International Multidisciplinary Journal of Research for Innovation, Sustainability, and Excellence (IMJRISE), 1(2), 36-42.

Gupta, V.P., & Arora, A.K. (2024). FinTech: the Financial Sector's Digital Reformation. Revolutionary Challenges and Opportunities of Fintech.

Hassan, A.O., Ewuga, S.K., Abdul, A.A., Abrahams, T.O., Oladeinde, M., & Dawodu, S.O. (2024). Cybersecurity in banking: a global perspective with a focus on Nigerian practices. Computer Science & IT Research Journal, 5(1), 41-59.

Huang, H., Jiang, N., Chen, W., Tang, Y., & Li, N. (2024). A call to rethink the necessity of and challenges facing academic research organizations in the new era of drug innovation in China. Drug Discovery Today, 103925.

Judijanto, L., Kaaffah, F.M., Muthmainah, H.N., & Vandika, A.Y. (2024). Literature review on computer network security in the financial sector in indonesia challenges and Finance & Accounting Research Journal, Volume 6, Issue 4, April 2024 Farayola, P.No. 501-514 Page 514 solutions in facing digital security threats. Sciences du Nord Nature Science and Technology, 1(01), 20-27.

Corine Boon, Deanne N. Den Hartog, David P. Lepak, A systematic review of human resource management systems and their measurement, J. Manag. 45 (6) (2019) 2498–2537.

Ashlea C. Troth, David E. Guest, The case for psychology in human resource management research, Hum. Resour. Manag. J. 30 (1) (2020) 34–48.

Maria Panayiota Markoulli, Mapping human resource management: reviewing the field and charting future directions, Hum. Resour. Manag. Rev. 27 (3) (2017) 367–396.

Orhan Yabanci, from human resource management to intelligent human resource management: a conceptual perspective, Hum. Intell. Syst. Integr. 1 (2) (2019) 101–109.

Karen Pak, Human Resource Management and the ability, motivation and opportunity to continue working: a review of quantitative studies, Hum. Resour. Manag. Rev. 29 (3) (2019) 336–352.

Samuel Roscoe, Green human resource management and the enablers of green organisational culture: enhancing a firm’s environmental performance for sustainable development, Bus. Strat. Environ. 28 (5) (2019) 737–749

Stefan Strohmeier, Smart HRM–a Delphi study on the application and consequences of the internet of things in human resource management, Int. J. Hum. Resour. Manag. 31 (18) (2020) 2289–2318.

Yishu Liu, An optimized human resource management model for cloud-edge computing in the internet of things, Cluster Comput. 25 (4) (2022) 2527–2539.

Kambur Emine, Yildirim Tulay, from traditional to smart human resources management, Int. J. Manpow. 44 (3) (2023) 422–452.

Mohammed Mohammed Sadeeq, Nasiba M. Abdulkareem, Subhi Rm Zeebaree, Dindar Mikaeel Ahmed, Ahmed Saifullah Sami, Rizgar R. Zebari, IoT and Cloud computing issues, challenges and opportunities: a review, Qubahan Acad. J. 1 (2) (2021) 1–7.

Downloads

Published

2024-10-15

How to Cite

Neoaz, N. (2024). Role of Artificial Intelligence in Enhancing Information Assurance. BULLET : Jurnal Multidisiplin Ilmu, 3(5), 749–758. Retrieved from https://journal.mediapublikasi.id/index.php/bullet/article/view/4899