All-Ukrainian Scientific and Practical Conference "Innovative Technologies", 16-17
November 2022
TRENDS IN THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE FOR
THE PROTECTION OF BUSINESS FROM CYBERATTACKS IN THE
CONDITIONS OF WAR
Pohorila V. M., Klymenko D. V.
National Aviation University, Kyiv
Supervisor – __________________________
“Using cloud services is not only a legitimate, but also an effective solution to
many standard problems,” says Andriy Borenkow. – “Entrepreneurs face new
strategic and tactical problems, and the terms “digitalization” or “digital
transformation” can be heard more and more often. We are talking about deep
business transformation that uses digital technologies to simplify business processes,
increase business productivity and improve customer interaction”[1].
Every day, security companies discover new threats to business and consumer
data. Even if your business is not high-tech, your business partners can expose you to
digital dangers. Banks, credit agencies and large retail companies have already
released their customer data. AI-powered cybersecurity can provide better protection
than other types of software. Instead of dealing with threats after the fact, AI-based
security programs are focused on finding unusual activity. They can stop attacks or
alert about a threat[2].
What do you need first: Professional software; Electronic flow of documents;
Cybersecurity. With the rise of automation and the move to cloud data storage, the
problem of cyber security is becoming more acute as the number of cyber threats
increases significantly every year. Gone are the days when simple firewalls and
antivirus programs were the only measure of network security. Companies of all sizes
are regularly affected by cybersecurity incidents that cause irreparable damage to the
company's reputation and integrity[1].
Artificial intelligence is perfect for solving some of our most complex
problems, and cybersecurity certainly falls into that category. The rise of cyber attacks
and the proliferation of devices enable the use of machine learning and artificial
intelligence, which automate threat detection and response more effectively than
traditional software approaches[1].
How is the attack surface monitored?
ImmuniWeb Discovery identifies the internet situation by company name: how many
servers, websites, APIs, mobile apps, code repositories, CDNs and public clouds are
exposed to the network and the DarkNet. The products - ImmuniWeb On-Demand,
ImmuniWeb MobileSuite and ImmuniWeb Continuous - provide penetration testing
for applications.
ImmuniWeb On-Demand is a one-time web application with no SLA or API
penetration test with false positives, unlimited patch scanning and full DevSecOps
integration.
All-Ukrainian Scientific and Practical Conference "Innovative Technologies", 16-17
November 2022
ImmuniWeb MobileSuite is similar to On-Demand, but for mobile
applications and their API points.
ImmuniWeb Continuous monitors your applications 24/7 and detects new or
changed code. As soon as there are even minor changes that may affect the security or
integrity of the application, experts immediately test them and provide users with cost-
effective and timely penetration tests.
The most difficult problem we face today is the lack of transparency when
people do not know how many digital assets they have and the cyber security risks
associated with them. Is it a web application; server connected to the Internet; VPN
server that allows employees to work from home; an external company that has access
to your data and therefore stores and processes your data; or public cloud storage. The
IT infrastructure is becoming so complex, so intertwined, so intricate that it is almost
impossible to see who has access to your data, why and how it is processed, while
most data intrusions are due to incomplete transparency and unclear understanding of
Cyber Threats are emerging[1].
There are several security risks that companies should be aware of if using
artificial intelligence to enhance business operations. Third-party attackers can target
AI systems. Attacks can both target the large amounts of data companies are
processing and others can target the resulting analysis and predictions. Many AI
models that companies use for specific analysis are “pretrained”, and how that has
been done is easily learned by third parties, and thus potentially more at risk of attack
or manipulation. Companies without solid policies and processes around data
management can also be at risk of unauthorized access or theft of the data, or, even
before the data is collected, there may be legal noncompliance if users are not
accurately informed about how their data may be used[3].
Artificial intelligence have revolutionized and will continue to revolutionize
businesses for many years to come. From IT operations to sales, implementing AI into
business environments cuts down on time spent on repetitive tasks, improves
employee productivity, and enhances the overall customer experience. It also helps
avoid mistakes and detect potential crises at a level unattainable to humans[4].
References:
1. Штучний інтелект для захисту вашого бізнес. – 30.06.2020. – URL:
https://www.bdo.ua/uk-ua/news-2/2020/artificial-intelligence-to-protect-your-business.
2. Lisa Steinmann. Застосування штучного інтелекту для малого бізнесу. –
23.10.2019. – URL: https://www.microsoft.com/uk-ua/microsoft-365/business-insights-ideas/
resources/how-ai-help-small-business.
3. Usercentrics. - Artificial intelligence (AI) and data privacy. – 12.05.2022. – URL:
https://usercentrics.com/knowledge-hub/data-privacy-artificial-intelligence/#what-are-the-
potential-security-threats-with-the-use-of-artificial-intelligence.
4. Hanna Kleinings. – 7 Applications of Artificial Intelligence in Business. 4.10.2022. –
URL: https://levity.ai/blog/8-uses-ai-business.