Running head: ARTIFICIAL INTELLIGENCEArtificial IntelligenceName of the StudentName of the UniversityAuthor’s Note:
1ARTIFICIAL INTELLIGENCEExecutive SummaryThe main objective of this report is to mitigate the various threats and vulnerabilities ofartificial intelligence or AI present in the Gigantic Corporation. The various kinds of threatsmainly include denial of service information, hacking, destruction of computer systems andbreaching of data. All of these threats could cause several potential damages to thecompany’s data or systems. Several challenges are faced by them to control these attacks.The report will be providing various countermeasure strategies for the mitigation of threatsin artificial intelligence of Gigantic Corporation.
2ARTIFICIAL INTELLIGENCETable of ContentsIntroduction...............................................................................................................................3Discussion...................................................................................................................................3Identification of Threats and Attacks.....................................................................................3Potential Damages Caused by Threats...................................................................................4Challenges or Issues Faced.....................................................................................................4Mitigation or Countermeasure Strategies.............................................................................4Conclusion..................................................................................................................................5References..................................................................................................................................6
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Artificial Intelligence in Accounting | Reportlg...
|21
|5051
|34
Network Security Analysis: Cyber Securitylg...
|10
|1925
|30
Network security - Sample Assignmentlg...
|10
|2195
|122
IT Risk Management: Threats, Vulnerabilities and Prevention Methodslg...
|21
|4785
|434
Machine Learning for Cyber Security Threat Predictionlg...
|8
|2087
|217
IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporationlg...