Artificial Intelligence - Assignment Sample
VerifiedAdded on  2021/06/14
|7
|1530
|114
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ARTIFICIAL INTELLIGENCE
Artificial Intelligence
Name of the Student
Name of the University
Author’s Note:
Artificial Intelligence
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ARTIFICIAL INTELLIGENCE
Executive Summary
The main objective of this report is to mitigate the various threats and vulnerabilities of
artificial intelligence or AI present in the Gigantic Corporation. The various kinds of threats
mainly include denial of service information, hacking, destruction of computer systems and
breaching of data. All of these threats could cause several potential damages to the
company’s data or systems. Several challenges are faced by them to control these attacks.
The report will be providing various countermeasure strategies for the mitigation of threats
in artificial intelligence of Gigantic Corporation.
ARTIFICIAL INTELLIGENCE
Executive Summary
The main objective of this report is to mitigate the various threats and vulnerabilities of
artificial intelligence or AI present in the Gigantic Corporation. The various kinds of threats
mainly include denial of service information, hacking, destruction of computer systems and
breaching of data. All of these threats could cause several potential damages to the
company’s data or systems. Several challenges are faced by them to control these attacks.
The report will be providing various countermeasure strategies for the mitigation of threats
in artificial intelligence of Gigantic Corporation.
2
ARTIFICIAL INTELLIGENCE
Table of Contents
Introduction...............................................................................................................................3
Discussion...................................................................................................................................3
Identification of Threats and Attacks.....................................................................................3
Potential Damages Caused by Threats...................................................................................4
Challenges or Issues Faced.....................................................................................................4
Mitigation or Countermeasure Strategies.............................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6
ARTIFICIAL INTELLIGENCE
Table of Contents
Introduction...............................................................................................................................3
Discussion...................................................................................................................................3
Identification of Threats and Attacks.....................................................................................3
Potential Damages Caused by Threats...................................................................................4
Challenges or Issues Faced.....................................................................................................4
Mitigation or Countermeasure Strategies.............................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6
3
ARTIFICIAL INTELLIGENCE
Introduction
The main responsibility of an IT Security Consultant is to look over the overall
security of any organization. Gigantic Corporation recently has hired an IT Security
Consultant for securing their artificial intelligence. AI or artificial intelligence is the area of
computer science, which focuses on creating intelligent machines, working as well as
reacting like human beings [5]. The major task of this security consultant is to cooperate
with the technologists and business stakeholders. Moreover, he would be translating the
potential threats that are faced by this organization. This report will be highlighting on the
security threats or attacks that can affect the artificial intelligence with their proper
countermeasure strategies.
Discussion
Identification of Threats and Attacks
Artificial intelligence is considered as one of the most important advancements in
the cyber world. It is the perfect simulation of the intelligence of human beings that is being
processed by various machines and especially by computer systems [4]. All these processes
mainly involve learning, i.e. the proper acquisition of any information or rules to utilize the
information, self correction and reasoning, i.e. utilizing all the rules for reaching definite or
approximate conclusions. The most significant applications of this artificial intelligence are
machine vision, speech recognition and expert systems.
The organization of Gigantic Corporation has various important machines of artificial
intelligence. Thus, they are concerned about the threats or attacks. The probable threats
and attacks to the artificial intelligence of their company are as follows:
i) Denial of service information: The first and the foremost threat to the expert
system of artificial intelligence is the denial of service information. Since, the expert system
is responsible for emulating the ability for decision making of a human expert; it is always
vulnerable to this type of cyber attack [6]. Denial of service information is the type of
interruption that restricts the access of the computer system. The decision making ability of
this particular artificial intelligence system is stopped by this threat and thus important
information could not be retrieved. This often becomes a major issue for the organization as
they cannot take the significant decisions for the betterment of their company.
ii) Data Breaching: The second important threat or attack that can affect the artificial
intelligence of Gigantic Corporation organization is the breaching of data [2]. The expert
system is the piece of software that works as a database and stores various vital information
regarding the decisions of the organization. If any type of breaching occurs within that
information, the company would be in grave danger as all the important information or data
would be taken by the attackers.
iii) Hacking: The third type of threat that can occur within the artificial intelligence is
hacking [3]. The hacker or the attacker gets into the system for the purpose of acquiring all
ARTIFICIAL INTELLIGENCE
Introduction
The main responsibility of an IT Security Consultant is to look over the overall
security of any organization. Gigantic Corporation recently has hired an IT Security
Consultant for securing their artificial intelligence. AI or artificial intelligence is the area of
computer science, which focuses on creating intelligent machines, working as well as
reacting like human beings [5]. The major task of this security consultant is to cooperate
with the technologists and business stakeholders. Moreover, he would be translating the
potential threats that are faced by this organization. This report will be highlighting on the
security threats or attacks that can affect the artificial intelligence with their proper
countermeasure strategies.
Discussion
Identification of Threats and Attacks
Artificial intelligence is considered as one of the most important advancements in
the cyber world. It is the perfect simulation of the intelligence of human beings that is being
processed by various machines and especially by computer systems [4]. All these processes
mainly involve learning, i.e. the proper acquisition of any information or rules to utilize the
information, self correction and reasoning, i.e. utilizing all the rules for reaching definite or
approximate conclusions. The most significant applications of this artificial intelligence are
machine vision, speech recognition and expert systems.
The organization of Gigantic Corporation has various important machines of artificial
intelligence. Thus, they are concerned about the threats or attacks. The probable threats
and attacks to the artificial intelligence of their company are as follows:
i) Denial of service information: The first and the foremost threat to the expert
system of artificial intelligence is the denial of service information. Since, the expert system
is responsible for emulating the ability for decision making of a human expert; it is always
vulnerable to this type of cyber attack [6]. Denial of service information is the type of
interruption that restricts the access of the computer system. The decision making ability of
this particular artificial intelligence system is stopped by this threat and thus important
information could not be retrieved. This often becomes a major issue for the organization as
they cannot take the significant decisions for the betterment of their company.
ii) Data Breaching: The second important threat or attack that can affect the artificial
intelligence of Gigantic Corporation organization is the breaching of data [2]. The expert
system is the piece of software that works as a database and stores various vital information
regarding the decisions of the organization. If any type of breaching occurs within that
information, the company would be in grave danger as all the important information or data
would be taken by the attackers.
iii) Hacking: The third type of threat that can occur within the artificial intelligence is
hacking [3]. The hacker or the attacker gets into the system for the purpose of acquiring all
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
ARTIFICIAL INTELLIGENCE
the important and confidential information and thus changing or altering the data integrity.
This is again one of the most basic types of threats in AI.
iv) Destructing Systems: The systems could also be attacked by means of destructing
physically. Natural disruption and physical disruption are the most common types of this
attack [8].
Potential Damages Caused by Threats
The threats could be extremely dangerous for the organization of Gigantic
Corporation and they should be careful about their artificial intelligence. The potential
damages that could be caused by all the above mentioned attacks and threats are as
follows:
i) Denial of service information: The potential damage due to this particular threat is
the loss of confidential information. The decisions that the expert system of the organization
would be taking fall under this type of threat or attack [5]. The hacker denies the service and
whenever they try to make any decision, they are interrupted.
ii) Data Breaching: The information is breached by the hacker with this type of
attack and the organization can suffer through various tough situations.
iii) Hacking: The damage that can occur due to this losing of confidential information
and the information falling in the hands of a wrong person.
iv) Destructing Systems: The physical destruction can completely destroy the expert
system and if this type of situation arises, the organization will not only lose the information
by also suffer through financial losses [1].
Challenges or Issues Faced
Gigantic Corporation has faced various issues or challenges while controlling the
threats and attacks. They are given below:
i) Lack of People: The main challenge that they had faced is the lack of people. The
man power that is required is extremely higher than any other system and thus the
organization often undergoes several tough situations.
ii) One Track Minds: The next challenge that they faced was one track minds. While
dealing with the expert system problems, they observed that it was one track minds [3].
Mitigation or Countermeasure Strategies
The various mitigation strategies for reducing the threats and attacks of artificial
intelligence are as follows:
i) Capability Controls: It is the most basic strategy for reducing AI threats. The steps
of the AI machine should be restricted or checked so that it is not utilized by all. The strict
restriction to access would eventually stop the entry of unauthorized uses to a major level.
ii) Black Box Motivational Control: The second strategy for reducing the AI threats or
attacks is black box motivational control [7]. The reinforcement learning often enables
programs in internalising the complex concepts.
ARTIFICIAL INTELLIGENCE
the important and confidential information and thus changing or altering the data integrity.
This is again one of the most basic types of threats in AI.
iv) Destructing Systems: The systems could also be attacked by means of destructing
physically. Natural disruption and physical disruption are the most common types of this
attack [8].
Potential Damages Caused by Threats
The threats could be extremely dangerous for the organization of Gigantic
Corporation and they should be careful about their artificial intelligence. The potential
damages that could be caused by all the above mentioned attacks and threats are as
follows:
i) Denial of service information: The potential damage due to this particular threat is
the loss of confidential information. The decisions that the expert system of the organization
would be taking fall under this type of threat or attack [5]. The hacker denies the service and
whenever they try to make any decision, they are interrupted.
ii) Data Breaching: The information is breached by the hacker with this type of
attack and the organization can suffer through various tough situations.
iii) Hacking: The damage that can occur due to this losing of confidential information
and the information falling in the hands of a wrong person.
iv) Destructing Systems: The physical destruction can completely destroy the expert
system and if this type of situation arises, the organization will not only lose the information
by also suffer through financial losses [1].
Challenges or Issues Faced
Gigantic Corporation has faced various issues or challenges while controlling the
threats and attacks. They are given below:
i) Lack of People: The main challenge that they had faced is the lack of people. The
man power that is required is extremely higher than any other system and thus the
organization often undergoes several tough situations.
ii) One Track Minds: The next challenge that they faced was one track minds. While
dealing with the expert system problems, they observed that it was one track minds [3].
Mitigation or Countermeasure Strategies
The various mitigation strategies for reducing the threats and attacks of artificial
intelligence are as follows:
i) Capability Controls: It is the most basic strategy for reducing AI threats. The steps
of the AI machine should be restricted or checked so that it is not utilized by all. The strict
restriction to access would eventually stop the entry of unauthorized uses to a major level.
ii) Black Box Motivational Control: The second strategy for reducing the AI threats or
attacks is black box motivational control [7]. The reinforcement learning often enables
programs in internalising the complex concepts.
5
ARTIFICIAL INTELLIGENCE
Conclusion
Therefore, conclusion can be drawn that artificial intelligence is the specific type of
intelligence that is demonstrated by various machines. It is the kind of device that helps any
organization to perceive its environment and also takes up several actions for maximizing
the chance of achieving goals and objectives successfully. Some of the most important and
significant activities of computers working with AI or artificial intelligence mainly include
problem solving, speech recognition and learning. Gigantic Corporation is worried about
their artificial intelligence and thus they have recruited an IT Security Consultant for their
organization. The above report has properly outlined the probable threats to the artificial
intelligence of the company with probable damages. Countermeasure strategies are also
provided here.
ARTIFICIAL INTELLIGENCE
Conclusion
Therefore, conclusion can be drawn that artificial intelligence is the specific type of
intelligence that is demonstrated by various machines. It is the kind of device that helps any
organization to perceive its environment and also takes up several actions for maximizing
the chance of achieving goals and objectives successfully. Some of the most important and
significant activities of computers working with AI or artificial intelligence mainly include
problem solving, speech recognition and learning. Gigantic Corporation is worried about
their artificial intelligence and thus they have recruited an IT Security Consultant for their
organization. The above report has properly outlined the probable threats to the artificial
intelligence of the company with probable damages. Countermeasure strategies are also
provided here.
6
ARTIFICIAL INTELLIGENCE
References
[1] Russell, Stuart J., and Peter Norvig. Artificial intelligence: a modern approach. Malaysia;
Pearson Education Limited,, 2016.
[2] Michalski, Ryszard S., Jaime G. Carbonell, and Tom M. Mitchell, eds. Machine learning:
An artificial intelligence approach. Springer Science & Business Media, 2013.
[3] Nilsson, Nils J. Principles of artificial intelligence. Morgan Kaufmann, 2014.
[4] Cohen, Paul R., and Edward A. Feigenbaum, eds. The handbook of artificial intelligence.
Vol. 3. Butterworth-Heinemann, 2014.
[5] Wenger, Etienne. Artificial intelligence and tutoring systems: computational and
cognitive approaches to the communication of knowledge. Morgan Kaufmann, 2014.
[6] Hovy, Eduard, Roberto Navigli, and Simone Paolo Ponzetto. "Collaboratively built semi-
structured content and Artificial Intelligence: The story so far." Artificial Intelligence 194
(2013): 2-27.
[7] Bond, Alan H., and Les Gasser, eds. Readings in distributed artificial intelligence. Morgan
Kaufmann, 2014.
[8] Spiro, Rand J., Bertram C. Bruce, and William F. Brewer, eds. Theoretical issues in reading
comprehension: Perspectives from cognitive psychology, linguistics, artificial intelligence and
education. Vol. 11. Routledge, 2017.
ARTIFICIAL INTELLIGENCE
References
[1] Russell, Stuart J., and Peter Norvig. Artificial intelligence: a modern approach. Malaysia;
Pearson Education Limited,, 2016.
[2] Michalski, Ryszard S., Jaime G. Carbonell, and Tom M. Mitchell, eds. Machine learning:
An artificial intelligence approach. Springer Science & Business Media, 2013.
[3] Nilsson, Nils J. Principles of artificial intelligence. Morgan Kaufmann, 2014.
[4] Cohen, Paul R., and Edward A. Feigenbaum, eds. The handbook of artificial intelligence.
Vol. 3. Butterworth-Heinemann, 2014.
[5] Wenger, Etienne. Artificial intelligence and tutoring systems: computational and
cognitive approaches to the communication of knowledge. Morgan Kaufmann, 2014.
[6] Hovy, Eduard, Roberto Navigli, and Simone Paolo Ponzetto. "Collaboratively built semi-
structured content and Artificial Intelligence: The story so far." Artificial Intelligence 194
(2013): 2-27.
[7] Bond, Alan H., and Les Gasser, eds. Readings in distributed artificial intelligence. Morgan
Kaufmann, 2014.
[8] Spiro, Rand J., Bertram C. Bruce, and William F. Brewer, eds. Theoretical issues in reading
comprehension: Perspectives from cognitive psychology, linguistics, artificial intelligence and
education. Vol. 11. Routledge, 2017.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.