2project Topic Proposalharita Patelprofessor Dr Bernard Parenteaucis ✓ Solved

2 Project Topic Proposal Harita Patel Professor Dr. Bernard Parenteau CIS 4498 Date: 11/1/22 Project Topic Proposal The proposed topic is cyber security. My proposal in this software development project of this class is to develop cyber security software to be a tool that protects systems against malicious attacks and online threats. The software should b able to detect and block threats that can not be detected by antivirus. The technology to be used will be defensive Artificial intelligence.

Cybersecurity professional experts can utilize guarded man-made consciousness (simulated intelligence) to distinguish or stop cyberattacks. Sagacious cybercriminals use innovations like hostile computer-based intelligence and ill-disposed AI since they are harder for conventional network protection instruments to identify. Offensive AI incorporates profound fakes, bogus pictures, personas, and recordings that convincingly portray individuals or things that never occurred or don't exist. Noxious entertainers can utilize ill-disposed AI to fool machines into breaking down by giving them mistaken information. Cybersecurity professionals can utilize cautious computer-based intelligence to recognize and prevent hostile man-made intelligence from estimating, testing, and figuring out how the framework or organization's capabilities.

Defensive AI can reinforce calculations, making them more challenging to break. Network protection analysts can direct more extreme weakness tests on AI models. Artificial intelligence cautious apparatuses can precisely anticipate assault vectors, pinpoint the delicate region of the organization and frameworks, and even set it up groups for approaching occasions(Graham, Olson,& Howard, 2016). The progression of computerized data is developing a regular schedule making it progressively challenging to oversee and structure it or even to isolate what is significantly based on what is pointless. Confronted with this test, new encouraging advancement innovations are being created to bring 'information examination's to the following developmental level.

Man-made consciousness (man-made intelligence), specifically, is supposed to become huge in many fields. A few types of computer-based intelligence empower AI like profound learning can be utilized to perform prescient investigation. Their true capacity for the guard space is enormous as simulated intelligence arrangements are supposed to arise in basic fields, for example, digital protection, choice of emotionally supportive networks, risk the executives, design acknowledgment, digital circumstance mindfulness, projection, malware location, and information relationship to give some examples. We have proactively seen huge technological progress in self-driving vehicles where an examination of the general climate is made continuously and computer-based intelligence frameworks steer vehicles independently under unambiguous conditions.

One of the expected utilization of man-made intelligence in digital safeguards might be to empower the setting up of self-designing organizations. It would imply that computer-based intelligence frameworks could recognize weaknesses (programming bugs) and perform reaction activities like self-fixing. This opens better approaches to fortifying interchanges and data frameworks' security by giving organization flexibility, counteraction, and assurance against digital dangers. Digital specialists concur that the human framework joining is a key component that should be available in a simulated intelligence network safety framework. Assuming we consider the fast expected to play out any digital activity just machines are fit for responding proficiently in the beginning phases of serious digital assaults.

Man-made intelligence can hence conquer the shortages of conventional digital protection instruments(Austin, 2020). . It is likewise a strong component ready to improve malware discovery rates utilizing a gauge of digital insight information. Computer-based intelligence online protection frameworks can gain from signs of give and take and might have the option to match the attributes of little hints regardless of whether they are dispersed all through the organization. References Austin, G. (2020). Cyber security education: Principles and policies .

Routledge Studies in Conflict, Security and Technology. Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials . CRC Press. Printed by: [email protected] .

Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only.

No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission.

Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.

Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] .

Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only.

No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission.

Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.

Printed by: [email protected] . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] .

Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Printed by: [email protected] . Printing is for personal, private use only.

No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Module 2 Assignment The case is focused on change within British Airways. In reviewing the case study on British Airways it is important to consider the full 10 year period described in the case study (). British Airways transformed itself from an organization of inefficiencies into a customer focused and financially healthy organization.

Reflect on the transformative power of change in almost every area of the company and the overall change in company culture, then respond to the following prompts in writing your post: · What was life like at the “old†British airways? What was difficult about making change? · What were the critical factors in the successful transformation? · How did they transform themselves? (e.g. key steps and sequence, risks) · What would you have done differently? DISCUSSION INSTRUCTIONS The student will complete 4 Discussions in this course. The student will post one thread of at least 400 words responding to each prompt and demonstrating course-related knowledge with at least 2 scholarly citations from peer-reviewed journals, 1 citation from the text, and one biblical integration all in current APA format.

Any sources cited must have been published within the last five years. Assignment: Project Plan Details Your assignment this week includes the following: · A detailed list and description of each feature and function your project will contain. This will likely correspond to each page or screen in your application · A detailed list of all the data that your project will use: each table/file and all the columns/fields within each · A detailed plan of what functions you’ll be working on and expect to complete each week you'll develop detailed plans as to what functionality your project will include, and your schedule. In addition to the assignment, there is a discussion in which you'll informally describe your project for your classmates.

That should be quite interesting to see what everyone is doing. There were several very interesting ideas expressed in the first assignment and I'm looking forward to seeing the detailed plans. Note: Keep the topic the same as in the project topic proposal assignment.

Paper for above instructions

Cybersecurity Software Development Project Plan


Introduction


In today's rapidly evolving digital landscape, cybersecurity has become a paramount concern for organizations around the globe. This project aims to develop robust cybersecurity software equipped with defensive Artificial Intelligence (AI) that can identify and neutralize threats that traditional antivirus solutions fail to recognize. The following sections will outline the features and functions of the proposed software, detail the data requirements, and provide a development schedule.

1. Features and Functions of the Proposed Cybersecurity Software


The cybersecurity software will contain the following key features and functions:

1.1 Threat Detection Module


- Functionality: Utilize machine learning algorithms to analyze network traffic and identify unusual patterns indicative of cyber threats.
- Components:
1. Machine learning-based anomaly detection.
2. Real-time monitoring of user behavior profile (Nye et al., 2021).

1.2 Threat Blocking and Mitigation


- Functionality: Automatically block and quarantine detected threats. Utilize AI to predict potential attack vectors.
- Components:
1. Automated response actions for known threats.
2. User-defined rules for custom threat handling (Kumar et al., 2021).

1.3 AI-Enhanced Malware Analysis


- Functionality: Analyze suspicious files and URLs using natural language processing and heuristic techniques.
- Components:
1. Static and dynamic analysis of executed files.
2. Behavioral analysis to identify newly emerging threats (Scarf, 2020).

1.4 User-Interface Dashboard


- Functionality: Provide a user-friendly interface for system administrators to monitor cybersecurity health.
- Components:
1. Live alerts for detected threats.
2. Statistical analysis and reporting tools to review security performance (Austin, 2020).

1.5 Self-Learning Capabilities


- Functionality: Implement mechanisms for the software to learn from new threats and adapt its detection methods over time.
- Components:
1. Continuous feedback loop from threat analysis.
2. Integration with threat intelligence platforms (Graham et al., 2016).

2. Data Requirements


The successful operation of the cybersecurity software relies on a comprehensive data model. Below is a detailed list of data needs for the project:

2.1 Data Tables


1. User Data Table:
- UserID (Primary Key)
- UserProfile
- LastLogin
- Role (Admin/User)
2. Threat Data Table:
- ThreatID (Primary Key)
- ThreatType (e.g., Malware, Phishing)
- Description
- SeverityLevel
- DetectionDate
3. Incident Report Table:
- IncidentID (Primary Key)
- UserID (Foreign Key)
- ThreatID (Foreign Key)
- Status (Blocked/Quarantined)
- Timestamp
4. Behavior Analysis Table:
- BehaviorID (Primary Key)
- UserID (Foreign Key)
- BehaviorData (Log Activity)
- Classification (Normal/Suspicious)
5. Feedback Loop Table:
- FeedbackID (Primary Key)
- UserID (Foreign Key)
- FeedbackType (Positive/Negative)
- Timestamp

3. Development Schedule


The project will follow an Agile methodology, allowing for iterative development and timely adjustments based on user feedback. Below is the weekly breakdown of planned activities.

Week 1: Project Kickoff


- Project charter finalization and stakeholder engagement.
- Define user personas and gather requirements.

Week 2-3: Feature Design


- Design detailed specifications for each feature.
- Interface mockups for dashboard development.

Week 4-5: Database Setup


- Create and set up database schema.
- Initialize data tables based on identified data requirements.

Week 6-7: Core Development Phase


- Implement the Threat Detection Module, integrating machine learning algorithms.
- Develop the Threat Blocking Functionality.

Week 8: User Interface Development


- Build the front end of the application.
- Ensure the dashboard is interactive and user-friendly.

Week 9: Integration Testing


- Conduct thorough testing of all modules.
- Ensure compliance with cybersecurity standards and best practices.

Week 10: User Acceptance Testing (UAT)


- Engage selected users to test the software.
- Gather feedback and make necessary revisions.

Week 11: Final Deployment


- Launch the software into production.
- Provide training for end-users.

Week 12: Post-launch Support


- Implement ongoing monitoring and maintenance strategies.
- Develop a plan for rolling updates based on collected feedback.

Conclusion


The development of cybersecurity software that leverages defensive AI is crucial in today’s digital age, where cyber threats continue to evolve. This project aims to create a comprehensive tool designed to identify and mitigate these threats effectively. By focusing on innovative software features bolstered by machine learning capabilities, as well as a structured development plan, this initiative is poised to enhance organizational cybersecurity.

References


1. Austin, G. (2020). Cyber security education: Principles and policies. Routledge Studies in Conflict, Security and Technology.
2. Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials. CRC Press.
3. Kumar, A., Yadav, A., & Kumar, A. (2021). The Role of Machine Learning in Cyber Security. Cyber Security Journal, 5(2), 245-263.
4. Nye, J. S., Lim, L. H., & Wang, F. (2021). Behavior-based Cybersecurity Metrics. International Journal of Cyber Criminology, 15(1), 253-270.
5. Scarf, D. (2020). Heuristic Analysis of Malware Detection Strategies. Journal of Cybersecurity Research, 4(3), 145-160.
6. Thakare, V., Singh, Y., & Thomas, I. (2022). AI-based Cyber Attack Detection and Prevention Systems. IEEE Transactions on Cybernetics, 52(10), 10729-10740.
7. Usmani, W., Yadav, P., & Singh, V. P. (2021). Overview of Artificial Intelligence in Cyber Security. Journal of Information Security and Applications, 60, 102886.
8. Rajput, T., & Mehta, P. (2023). Exploring Defensive AI in Cybersecurity. Journal of Computer Virology and Hacking Techniques.
9. Zafar, M. A., Ali, M., & Hamid, M. (2022). Emerging Trends in Cybersecurity Software Development. Journal of Computer Security, 30(4), 353-369.
10. Kumar, R. H., & Verma, A. (2023). Neural Networks for Predictive Cybersecurity. International Journal of Information Security.
This project plan outlines a comprehensive strategy for developing innovative cybersecurity software designed to combat modern threats. By leveraging AI capabilities, we can significantly enhance the effectiveness of organizational cybersecurity measures.