The Impact of AI on Cybersecurity: Emerging Threats and Solutions

Authors

  • Oluebube Princess Egbuna Engineering Lead, WellBeyond Water, Texas, United States Author

Keywords:

Artificial Intelligence, Cybersecurity, Emerging Threats, Machine Learning, AI-driven Attacks, Security Solutions, Threat Detection, Malware Detection, Vulnerability Management,, Data Privacy

Abstract

The impact of artificial intelligence (AI) on cybersecurity is examined in this paper, emphasizing new risks and countermeasures. The primary goals are to explore the difficulties presented by AI-driven cyber threats and study how AI improves threat detection, incident response, and vulnerability management. A thorough examination of secondary data, including case studies and real-world applications from various industries, including e-commerce, healthcare, and finance, is part of the process. Important discoveries show that artificial intelligence (AI) dramatically enhances endpoint security, automates incident response, and increases the capacity to identify advanced persistent threats (APTs), insider threats, and zero-day exploits. However, AI makes it possible to attack more complexly, such as malware with AI capabilities and hostile approaches. Future perspectives emphasize the significance of creating strong adversarial defenses and explainable AI (XAI) and the possibilities of increased threat intelligence, autonomous security systems, and quantum computing integration. The policy implications emphasize the necessity of all-encompassing legal frameworks to guarantee data privacy, accountability, and ethical AI use. They also highlight the importance of encouraging public-private partnerships and funding AI research. Based on responsible AI use and addressing associated problems, this study indicates that AI can build a digital ecosystem that is more resilient and safe.

Downloads

Download data is not yet available.

Downloads

Published

10-04-2021

How to Cite

[1]
O. Princess Egbuna, “The Impact of AI on Cybersecurity: Emerging Threats and Solutions”, J. Sci. Tech., vol. 2, no. 2, pp. 43–67, Apr. 2021, Accessed: Mar. 07, 2026. [Online]. Available: https://thesciencebrigade.org/jst/article/view/232

Most read articles by the same author(s)