Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 8 No 10 (2024): Volume 8, Issue 10, October 2024 | Pages: 221-224
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 26-10-2024
As technology rapidly advances, our digital world is becoming increasingly complex and interconnected, making cyber security a critical concern for both businesses and individuals. Traditional security measures are struggling to keep pace with the sophisticated and evolving cyber threats we now face. This is where Artificial Intelligence (AI) plays a crucial role. Artificial Intelligence it is a branch of science which making a machine that are capable to acting and thinking like a human. Due to the cyber criminality the cyber security there has been developed. In the digital world cybercrimes or cyber-attacks are increasing day by day thus there are need to developing a modern, strong, powerful security for preventing our digital or personal information and data from theft. The main purpose of this cyberattack is our traditional threat detection method to identify threat are falling a part.AI algorithms are able to works more efficiently than humans. AI organizations are enabling of better detection and prevention to threats in real time. AI also powered cyber security solutions and advanced techniques to identify anomalies, vast amount of data and signs of attacks. This paper is discussing How AI is enhancing the cyber security OR Role of AI in cyber security. AI used for fraud detection and Spam filtering becomes possible due to ML and AI algorithms. AI can detect the numbers of false positive that may arise with use of out of detect frauds and identification methods.[1]
Anomalies, sophisticated, Machine Learning, Deep Learning, Artificial Intelligence
Prof. S. B. Bele, Sanskruti R. Gourkhede, Purva V. Bonde, & Prajkta P. Papalkar. (2024). The Role of Artificial Intelligence in Cyber Security. International Research Journal of Innovations in Engineering and Technology - IRJIET, 8(10), 221-224. Article DOI https://doi.org/10.47001/IRJIET/2024.810029
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence