WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

SHIELDING THE COMPUTING INFRASTRUCTURE WITH CYBER SECURITY EMBEDDING AUTOMATION

Julian Menezes Rathinam Menezes Rathinam

Download Paper

Paper Contents

Abstract

The terminology which is defined as Artificial Intelligence pin points to the imitation of the intelligence of a Human Being on to a particular Machinery, which in turn are coded to contemplate as a normal individual and ditto the activities of the same persona. The afore mentioned terminology may get plastered on to any sort of a machinery that has the idiosyncrasy relevant to an Individual like that of the art of learning coupled with the solving of problems. The archetype trait of the terminology Artificial Intelligence lies in the competence of extenuating as well as undergoing rigorous game plan for accomplishing a particular objective. The terminology defined as Cyber Security relates to the technological advancement, procedures as well as the exercises and game plan blueprinted to cast a net of protection over the network of Computers, Routers, Switches, Hubs, Applications as well as the digital 0's and 1's from stealth activities, physical swap, or any sort of unwanted intrusion. The security which is associated with the Cyber Domain is also christened as Information Technology oriented Security. Security with relevance to the Defense, Governance, Finance, IT sector and last but not the least the Health Sector gather, work on the data as well as pile up remarkable digital 0's and 1's on the Metallic HDDs as well as other trivial contraptions. The yesteryears had laborers to perform any sort of a task. The invention of wheel to the present day machinery revolutionized the task put forth as a challenge to the Individuals. Stationing a guard 247 is quite a herculean task for safe guarding an entity from any sort of a mishap. The revolution in the Surveillance to the Monitoring Sector has brought forth the inclusion of Technology to make the safeguarding task much easier and efficient for Individuals to protect and preserve entities, which are deemed valuable. The Security systems which are based out of the entity Artificial Intelligence tend to use entities like Big Data and other competitive Computer Algorithms for the purpose of Automating the task of Managing the Security associated with an entity. Several Methodologies get utilized, but one among them termed Case Studies get employed for scrutinizing the appropriate clout of the security clubbed with Artificial Intelligence in a Cyber Environment. The denouement exposes the comparison between Systems based out of Signature and with the Systems rooted upon Artificial Intelligence. The aftermath of the comparison denotes that the latter technology possess three trivial qualities like competence, authenticity, as well as trustworthiness. The reason behind the above statement is that the systems associated with Security are sound enough to scrutinize as well as equate with voluminous digital 0s and 1s for expediting the disclosure as well as the acknowledgement to the fulminations.

Copyright

Copyright © 2024 Julian Menezes Rathinam. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS40300005945
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us