Sunday, December 8, 2019

Artificial Intelligence for Pearson Education- myassignmenthelp

Question Discuss about theArtificial Intelligence for Pearson Education Limited. Answer: Introduction The main responsibility of an IT Security Consultant is to look over the overall security of any organization. Gigantic Corporation recently has hired an IT Security Consultant for securing their artificial intelligence. AI or artificial intelligence is the area of computer science, which focuses on creating intelligent machines, working as well as reacting like human beings [5]. The major task of this security consultant is to cooperate with the technologists and business stakeholders. Moreover, he would be translating the potential threats that are faced by this organization. This report will be highlighting on the security threats or attacks that can affect the artificial intelligence with their proper countermeasure strategies. Discussion Identification of Threats and Attacks Artificial intelligence is considered as one of the most important advancements in the cyber world. It is the perfect simulation of the intelligence of human beings that is being processed by various machines and especially by computer systems [4]. All these processes mainly involve learning, i.e. the proper acquisition of any information or rules to utilize the information, self correction and reasoning, i.e. utilizing all the rules for reaching definite or approximate conclusions. The most significant applications of this artificial intelligence are machine vision, speech recognition and expert systems. The organization of Gigantic Corporation has various important machines of artificial intelligence. Thus, they are concerned about the threats or attacks. The probable threats and attacks to the artificial intelligence of their company are as follows: i) Denial of service information: The first and the foremost threat to the expert system of artificial intelligence is the denial of service information. Since, the expert system is responsible for emulating the ability for decision making of a human expert; it is always vulnerable to this type of cyber attack [6]. Denial of service information is the type of interruption that restricts the access of the computer system. The decision making ability of this particular artificial intelligence system is stopped by this threat and thus important information could not be retrieved. This often becomes a major issue for the organization as they cannot take the significant decisions for the betterment of their company. ii) Data Breaching: The second important threat or attack that can affect the artificial intelligence of Gigantic Corporation organization is the breaching of data [2]. The expert system is the piece of software that works as a database and stores various vital information regarding the decisions of the organization. If any type of breaching occurs within that information, the company would be in grave danger as all the important information or data would be taken by the attackers. Hacking: The third type of threat that can occur within the artificial intelligence is hacking [3]. The hacker or the attacker gets into the system for the purpose of acquiring all the important and confidential information and thus changing or altering the data integrity. This is again one of the most basic types of threats in AI. iv) Destructing Systems: The systems could also be attacked by means of destructing physically. Natural disruption and physical disruption are the most common types of this attack [8]. Potential Damages Caused by Threats The threats could be extremely dangerous for the organization of Gigantic Corporation and they should be careful about their artificial intelligence. The potential damages that could be caused by all the above mentioned attacks and threats are as follows: i) Denial of service information: The potential damage due to this particular threat is the loss of confidential information. The decisions that the expert system of the organization would be taking fall under this type of threat or attack [5]. The hacker denies the service and whenever they try to make any decision, they are interrupted. ii) Data Breaching: The information is breached by the hacker with this type of attack and the organization can suffer through various tough situations. Hacking: The damage that can occur due to this losing of confidential information and the information falling in the hands of a wrong person. iv) Destructing Systems: The physical destruction can completely destroy the expert system and if this type of situation arises, the organization will not only lose the information by also suffer through financial losses [1]. Challenges or Issues Faced Gigantic Corporation has faced various issues or challenges while controlling the threats and attacks. They are given below: i) Lack of People: The main challenge that they had faced is the lack of people. The man power that is required is extremely higher than any other system and thus the organization often undergoes several tough situations. ii) One Track Minds: The next challenge that they faced was one track minds. While dealing with the expert system problems, they observed that it was one track minds [3]. Mitigation or Countermeasure Strategies The various mitigation strategies for reducing the threats and attacks of artificial intelligence are as follows: i) Capability Controls: It is the most basic strategy for reducing AI threats. The steps of the AI machine should be restricted or checked so that it is not utilized by all. The strict restriction to access would eventually stop the entry of unauthorized uses to a major level. ii) Black Box Motivational Control: The second strategy for reducing the AI threats or attacks is black box motivational control [7]. The reinforcement learning often enables programs in internalising the complex concepts. Conclusion Therefore, conclusion can be drawn that artificial intelligence is the specific type of intelligence that is demonstrated by various machines. It is the kind of device that helps any organization to perceive its environment and also takes up several actions for maximizing the chance of achieving goals and objectives successfully. Some of the most important and significant activities of computers working with AI or artificial intelligence mainly include problem solving, speech recognition and learning. Gigantic Corporation is worried about their artificial intelligence and thus they have recruited an IT Security Consultant for their organization. The above report has properly outlined the probable threats to the artificial intelligence of the company with probable damages. Countermeasure strategies are also provided here. References [1] Russell, Stuart J., and Peter Norvig.Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited,, 2016. [2] Michalski, Ryszard S., Jaime G. Carbonell, and Tom M. Mitchell, eds.Machine learning: An artificial intelligence approach. Springer Science Business Media, 2013. [3] Nilsson, Nils J.Principles of artificial intelligence. Morgan Kaufmann, 2014. [4] Cohen, Paul R., and Edward A. Feigenbaum, eds.The handbook of artificial intelligence. Vol. 3. Butterworth-Heinemann, 2014. [5] Wenger, Etienne.Artificial intelligence and tutoring systems: computational and cognitive approaches to the communication of knowledge. Morgan Kaufmann, 2014. [6] Hovy, Eduard, Roberto Navigli, and Simone Paolo Ponzetto. "Collaboratively built semi-structured content and Artificial Intelligence: The story so far."Artificial Intelligence194 (2013): 2-27. [7] Bond, Alan H., and Les Gasser, eds.Readings in distributed artificial intelligence. Morgan Kaufmann, 2014. [8] Spiro, Rand J., Bertram C. Bruce, and William F. Brewer, eds.Theoretical issues in reading comprehension: Perspectives from cognitive psychology, linguistics, artificial intelligence and education. Vol. 11. Routledge, 2017.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.