Abstract
The article analyzes business cybersecurity strategies using artificial intelligence technologies, which are currently changing rapidly due to the nature of cyber attacks and the need to find new ways to counter cybersecurity threats. The main purpose of the study is to show how, by introducing artificial intelligence at the micro level, cybersecurity groups can help organizations make more informed business decisions regarding the production and logistics of their products and services, given that cybersecurity and artificial intelligence should work together, create cybersecurity management programs, thereby increasing awareness of the risks associated with cybercrime. Overall, our goal is not only to discuss cybersecurity data science and related techniques, but also to focus on the applicability of cybersecurity to intelligent data-based decision-making to protect systems from cyber attacks. The results of the study are aimed at extracting models of cybersecurity incidents and building an appropriate cybersecurity model in order to (1) make the security system automated and intelligent, and business, having taken steps to mitigate cyber threats, was able to experiment with artificial intelligence and cybersecurity, take on more responsibility, strengthen cooperation, develop a strategy for using artificial intelligence technologies to protect cyberspace; (2) strategically transforming cybersecurity, AI developers should make new changes and make more informed decisions to manage cyber attacks in the business process system; (3) help business leaders determine the timing of investments and the share of the budget for the implementation of AI related to the investment strategy for the development of AI, based on future reports on the evaluation of the effectiveness of AI.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Artificial Intelligence//WIPO Technology Trends. World Intellectual Property Organization. Geneva (2019)
Gupta, B.B., Tvari, A., Jainak, S., Agrawal, D.P.: The fight against phishing attacks: the current state and future challenges. Neural Comput. Appl. 28(12), 3629–54 (2017)
IBM Opens Threat Intelligence to Combat Cyber Attacks. https://www.ibm.com/news/ca/en/.html. Accessed 21 Oct 2012
Artificial Intelligence. Merriam-Webster. https://www.merriam-webster.com/dictionary/artificial%20intelligence. Accessed 11 Nov 2022
(ISO)/International Electrotechnical Commission (IEC), ISO/IEC 27001:(2005) Information technology—Security techniques—Information security management systems—Requirements, Switzerland. https://www.iso.org/standard/42103.html (2005)
Mohammadi, S., Mirvaziri, H., Gazizade-Ahsai, M., Karimipur, H.: Detection of cyber intrusions using the combined component of the selection algorithm 44, 80–88 (2019)
Craigen, D., Diakun-Thibault, N., Purge, R.: Definition of cybersecurity. Technol. Innov. Manag. Rev. 4(10), 13–21 (2014)
Lee, I.: Cybersecurity: risk management framework and investment cost analysis. Bus. Horiz. 64(5), 659–671 (2021)
Kukier K.: Data, Data Everywhere: A Special Report on Information Management (2010)
Alice, A.M., Zaidan, B.B., Zaidan, A.A., Sahar, N.M.: An overview of intrusion detection systems based on deep learning methods: consistent taxonomy, challenges, motivations, recommendations, meaningful analysis, and future directions. Neural Comput. Appl. 32(14), 9827–9858 (2020)
Nosova, S.S., Norkina, A.N., Morozov, N.V.: Artificial Intelligence and Economics. Bachelor’s degree, Textbook for universities. M.: KNORUS, p. 400 (2023)
McCallister, E.; Grance, T.; Scarfone, K.: Guide to protecting the confidentiality of personally identifiable information (PII), Special Publication (SP) 800-122, National Institute of Standards and Technology (NIST), USA. https://csrc.nist.gov/publications/detail/sp/800-122/final (2010)
Al-Garadi, M., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22, 1646–1685 (2020)
Nosova S.S., Norkina, A.N., Morozov, N.V.: Typologies of Financial Frauds Bachelor’s Degree, Specialty. Textbook for Universities. M.: KNORUS, p. 476 (2021)
Nosova, S.S., Norkina, A.N., Morozov, N.V.: Artificial intelligence and the future of the modern economy. Innov. Invest. 1, 229–234 (2023)
Nosova, S.S., Putilov, A.V, Norkina, A.N.: Fundamentals of the Digital Economy. Bachelor’s Degree, Textbook For Universities. M.: KNORUS, p. 392 (2022)
Forugi F., Luksh.: Data science methodology for cybersecurity projects. preprint arXiv :1803.04219 (2018)
International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), ISO/IEC 2700, Switzerland. https://www.iso.org/standard/73906.html (2018)
Django-Jacquard, J., Nepal, S.: Overview of emerging threats in the field of cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nosova, S., Norkina, A., Morozov, N. (2024). Strategies for Business Cybersecurity Using AI Technologies. In: Samsonovich, A.V., Liu, T. (eds) Biologically Inspired Cognitive Architectures 2023. BICA 2023. Studies in Computational Intelligence, vol 1130. Springer, Cham. https://doi.org/10.1007/978-3-031-50381-8_67
Download citation
DOI: https://doi.org/10.1007/978-3-031-50381-8_67
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50380-1
Online ISBN: 978-3-031-50381-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)