NetSecLaw: Dedicated to events, news and trends in technology law. XML Feed

12.2.25

discussion board 3 part 1 CS875

Hello professor and class, one key trend that I looked up on on the Horizon Report by EDUCAUSE is how important it is to have data privacy with cyber security. This topic discussed the use of Artificial Intelligence being integrated into cyber security software. It was interesting reading and watching videos on these trends because some of these trends are in correlation to my dissertation research project. I am filling a specific gap in research mentioning a area like thumb drive security and explainable Artificial Intelligence to mention how the technology is being used so that cyber security professionals will know how the software is protecting their sensitive information of flash drives. We are in a time period of great change. Higher education in information security and data privacy professionals need to find new inquiries based on what needs to be executed to maintain security for academic institutions and its students. 

With the technology of cyber-security being used in academic institutions these personnel have to deal with the force of education and learning because these students and professionals need to find new inquiries based on what needs to be executed to maintain security for academic institutions and its students. It is important that the education force is respected because all students and cyber security professionals need to learn AI-supported cyber security training while implementing information technology governance. Another force that affects the implementation of this technology is the growing threat of cyber crime and the law that is being broken. It is important that we all abide by government and international information and cyber laws to prevent financial loss and data breaches. 

Two forces that impact the trend and technology are the environment,and legislation that makes information technology governance laws. The environment is a force of concern because most resources and hardware equipment used for Artificial Intelligence data management are hazardous to the environment so it is imperative to use less of these hazardous materials or use environmental friendly alternatives to save data integrated with a machine learning system. Allowing information systems to be more "Green" or environmental friendly is crucial because the technology is expected to be used a lot and its important to recycle the environmentally hazardous equipment to prevent legacy systems from hurting the environment. Legal and ethical considerations need to be taken into considerations need to be taken into consideration when using machine learning with data protection because if there is unauthorized access or if the Artificial Intelligence technology gets into the wrong hands leading to a major data breach or cyber attacks. 

Laws on data governance may restrict the strength or possibilities of machine learning for cyber security because if not regulated the technology can be really damaging if in the wrong hands or in the reach of a criminal. I would appreciate it if I received feedback from the professor or classmates on this discussion board post. Please do not feel obligated to respond but your critique or feedback is very much appreciated.

Figure 1. Attached image Unit3DiscussionBoardCS875.png

This following image shows how Artificial Intelligence can be used to implement cyber security and data privacy for the government and academic institutions. This attached diagram explains the process of how machine learning and shows how it works in tandem with the existing information technology system.

References:

Robert, J., Reeves, J., McCormack, M., Arbinmo, N., & Muscanell, N., (2024, September 30). 2024 EDUCAUSE Horizon Report Cyber security and privacy edition. EDUCAUSE Library. https://library.educause.edu/resources/2024/9/2024-educause-horizon-report- cyber security-and-privacy-edition

Takyar, A. (2024, November 25). AI in Cyber security: Use cases, Implementation, Solution and development, Leeway Hertz, https://www.leewayhertz.com/ai-in-cybersecurity/

Steven Christopher Wong

Doctoral of Computer Science Student

Colorado Technical University 

Attached Files
Unit3DiscussionBoardCS875.pngDownload
Similarity Score (Error)

0 Comments:

Post a Comment

<< Home