Ramifications of Artificial Intelligence and Cyber Security

Year : 2025 | Volume : 03 | Issue : 01 | Page : 40-45
    By

    V Hans,

  1. Research Professor, Department of Management & Commerce, Srinivas University, Mangaluru, Karnataka, India

Abstract

Artificial intelligence (AI) has pros and cons for cyber security: AI can improve network security, anti-malware, and fraud detection. AI can simulate cyberattacks, automate responses, and analyse enormous databases. AI-powered phishing and deepfakes are cyber risks. AI can potentially be attacked and become a liability for corporations. AI has transformed cyber security, bringing both new opportunities and challenges. AI-powered tools discover abnormalities faster, automate threat responses, and improve threat detection accuracy. As AI systems improve, fraudsters use them to launch complex attacks like AI-generated phishing schemes, deepfakes, and adaptive malware. Defenders must innovate to outperform hostile actors in this cyber arms race due to AI’s dual usage. This article discusses how AI integration in cyber security might minimize or increase cyber threats and the ethical and regulatory frameworks needed to handle this changing situation. AI algorithms can find software trends and spot basic infections and ransomware before they infect computers. AI can boost capabilities and protect data by reviewing articles, news updates, and cyber risk research using natural language processing.

Keywords: Artificial intelligence (AI), cyber security, threat detection, AI-driven attacks, automation, ethics

[This article belongs to International Journal of Information Security Engineering ]

How to cite this article:
V Hans. Ramifications of Artificial Intelligence and Cyber Security. International Journal of Information Security Engineering. 2025; 03(01):40-45.
How to cite this URL:
V Hans. Ramifications of Artificial Intelligence and Cyber Security. International Journal of Information Security Engineering. 2025; 03(01):40-45. Available from: https://journals.stmjournals.com/ijise/article=2025/view=201785



References

  1. IBM. Artificial Intelligence (AI) Solutions. [Online]. Ibm.com. 2024. Available at https://www. ibm.com/artificial-intelligence?utm_content=SRCWW&p1=Search&p4=43700077827237093&p5=p&p9=58700008530962751&gad_source=1&gclid=Cj0KCQiAy8K8BhCZARIsAKJ8sfS_cicDte_OeloA-K7ABS75t4yF3ZqPLAc2MAfD77qZx9KbWqLno2MaArlmEALw_wcB&gclsrc= aw.ds
  2. Cisco. Cloud Security. [Online]. Cisco. 2024. Available at https://www.cisco.com/c/en_in/ products/security/what-is-cybersecurity.html
  3. Li JH. Cyber security meets artificial intelligence: a survey. Front Inform Technol Electron Eng. 2018; 19 (12): 1462–1474.
  4. Thakur K, Qiu M, Gai K, Ali ML. An investigation on cyber security threats and security models. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, USA, November 3–5, 2015. pp. 307–311.
  5. Ghelani D. Cyber security, cyber threats, implications and future perspectives: a review. Authorea Preprints. September 22, 2022. Available From: https://www.authorea.com/users/506161/ articles/587239-cyber-security-cyber-threats-implications-and-future-perspectives-a-review
  6. Kumar S, Gupta U, Singh AK, Singh AK. Artificial intelligence: revolutionizing cyber security in the digital era. J Computers Mech Manage. 2023; 2 (3): 31–42.
  7. Nair MM, Deshmukh A, Tyagi AK. Artificial intelligence for cyber security: current trends and future challenges. Automat Secure Comput Next‐Gen Syst. 2024; May 3: 83–114.
  8. Chaudhary H, Detroja A, Prajapati P, Shah P. A review of various challenges in cybersecurity using artificial intelligence. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Toothukudi, India, December 3–5, 2020. pp. 829–836.
  9. Morel B. Artificial intelligence and the future of cybersecurity. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA, October 21, 2011. pp. 93–98.
  10. Hans V. B. An examination of artificial intelligence in India. Int J Enhanced Res Manage Computer Appl. 2023; 12 (10): 1–7.

Regular Issue Subscription Review Article
Volume 03
Issue 01
Received 07/10/2024
Accepted 15/01/2025
Published 12/02/2025
Publication Time 128 Days


My IP

PlumX Metrics