Skip to main content

Strategies for Business Cybersecurity Using AI Technologies

  • Conference paper
  • First Online:
Biologically Inspired Cognitive Architectures 2023 (BICA 2023)

Abstract

The article analyzes business cybersecurity strategies using artificial intelligence technologies, which are currently changing rapidly due to the nature of cyber attacks and the need to find new ways to counter cybersecurity threats. The main purpose of the study is to show how, by introducing artificial intelligence at the micro level, cybersecurity groups can help organizations make more informed business decisions regarding the production and logistics of their products and services, given that cybersecurity and artificial intelligence should work together, create cybersecurity management programs, thereby increasing awareness of the risks associated with cybercrime. Overall, our goal is not only to discuss cybersecurity data science and related techniques, but also to focus on the applicability of cybersecurity to intelligent data-based decision-making to protect systems from cyber attacks. The results of the study are aimed at extracting models of cybersecurity incidents and building an appropriate cybersecurity model in order to (1) make the security system automated and intelligent, and business, having taken steps to mitigate cyber threats, was able to experiment with artificial intelligence and cybersecurity, take on more responsibility, strengthen cooperation, develop a strategy for using artificial intelligence technologies to protect cyberspace; (2) strategically transforming cybersecurity, AI developers should make new changes and make more informed decisions to manage cyber attacks in the business process system; (3) help business leaders determine the timing of investments and the share of the budget for the implementation of AI related to the investment strategy for the development of AI, based on future reports on the evaluation of the effectiveness of AI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Artificial Intelligence//WIPO Technology Trends. World Intellectual Property Organization. Geneva (2019)

    Google Scholar 

  2. Gupta, B.B., Tvari, A., Jainak, S., Agrawal, D.P.: The fight against phishing attacks: the current state and future challenges. Neural Comput. Appl. 28(12), 3629–54 (2017)

    Article  Google Scholar 

  3. IBM Opens Threat Intelligence to Combat Cyber Attacks. https://www.ibm.com/news/ca/en/.html. Accessed 21 Oct 2012

  4. Artificial Intelligence. Merriam-Webster. https://www.merriam-webster.com/dictionary/artificial%20intelligence. Accessed 11 Nov 2022

  5. (ISO)/International Electrotechnical Commission (IEC), ISO/IEC 27001:(2005) Information technology—Security techniques—Information security management systems—Requirements, Switzerland. https://www.iso.org/standard/42103.html (2005)

  6. Mohammadi, S., Mirvaziri, H., Gazizade-Ahsai, M., Karimipur, H.: Detection of cyber intrusions using the combined component of the selection algorithm 44, 80–88 (2019)

    Google Scholar 

  7. Craigen, D., Diakun-Thibault, N., Purge, R.: Definition of cybersecurity. Technol. Innov. Manag. Rev. 4(10), 13–21 (2014)

    Article  Google Scholar 

  8. Lee, I.: Cybersecurity: risk management framework and investment cost analysis. Bus. Horiz. 64(5), 659–671 (2021)

    Article  Google Scholar 

  9. Kukier K.: Data, Data Everywhere: A Special Report on Information Management (2010)

    Google Scholar 

  10. Alice, A.M., Zaidan, B.B., Zaidan, A.A., Sahar, N.M.: An overview of intrusion detection systems based on deep learning methods: consistent taxonomy, challenges, motivations, recommendations, meaningful analysis, and future directions. Neural Comput. Appl. 32(14), 9827–9858 (2020)

    Article  Google Scholar 

  11. Nosova, S.S., Norkina, A.N., Morozov, N.V.: Artificial Intelligence and Economics. Bachelor’s degree, Textbook for universities. M.: KNORUS, p. 400 (2023)

    Google Scholar 

  12. McCallister, E.; Grance, T.; Scarfone, K.: Guide to protecting the confidentiality of personally identifiable information (PII), Special Publication (SP) 800-122, National Institute of Standards and Technology (NIST), USA. https://csrc.nist.gov/publications/detail/sp/800-122/final (2010)

  13. Al-Garadi, M., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22, 1646–1685 (2020)

    Article  Google Scholar 

  14. Nosova S.S., Norkina, A.N., Morozov, N.V.: Typologies of Financial Frauds Bachelor’s Degree, Specialty. Textbook for Universities. M.: KNORUS, p. 476 (2021)

    Google Scholar 

  15. Nosova, S.S., Norkina, A.N., Morozov, N.V.: Artificial intelligence and the future of the modern economy. Innov. Invest. 1, 229–234 (2023)

    Google Scholar 

  16. Nosova, S.S., Putilov, A.V, Norkina, A.N.: Fundamentals of the Digital Economy. Bachelor’s Degree, Textbook For Universities. M.: KNORUS, p. 392 (2022)

    Google Scholar 

  17. Forugi F., Luksh.: Data science methodology for cybersecurity projects. preprint arXiv :1803.04219 (2018)

    Google Scholar 

  18. International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), ISO/IEC 2700, Switzerland. https://www.iso.org/standard/73906.html (2018)

  19. Django-Jacquard, J., Nepal, S.: Overview of emerging threats in the field of cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Svetlana Nosova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nosova, S., Norkina, A., Morozov, N. (2024). Strategies for Business Cybersecurity Using AI Technologies. In: Samsonovich, A.V., Liu, T. (eds) Biologically Inspired Cognitive Architectures 2023. BICA 2023. Studies in Computational Intelligence, vol 1130. Springer, Cham. https://doi.org/10.1007/978-3-031-50381-8_67

Download citation

Publish with us

Policies and ethics