Written Assignment 2 COS-4950 Capstone

docx

School

Thomas Edison State College *

*We aren’t endorsed by this school

Course

4950

Subject

Communications

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by SuperHumanBookStingray38

Report
Written Assignment 2 Randy Barham Thomas Edison State University LIB-4950 Liberal Arts Capstone January 21, 2024
Introduction: Technology is constantly advancing at a rapid pace, and a recent example is generative AI. The integration of generative AI into cybersecurity and “hacking” has emerged as an important topic of concern. This project explores just how generative AI will shape future defensive strategies in cybersecurity and innovation in hacking. It advocates for understanding just how transformational this technology will have on digital security, and aims to empower future cybersecurity professionals to address emerging threats. The Need for Exploration: As technology advances, so do the methods both cybersecurity pros and malicious hackers use. Generative AI introduces a paradigm shift in preventing attacks, but also introduces an almost unlimited supply of them. Hackers have more opportunities to exploit vulnerabilities—and more ways to execute their malicious campaigns. Fortunately, the opposite is also true: Generative AI can fortify business defense (IBM, 2023). The choice to investigate how generative AI will affect our digital security is based on how transformative the technology has already been in other industries, and how much it will further transform society in the near future. Topic Selection and Rationale: I’ve had a lifelong fascination with computers, starting with BASIC programming on a Commodore 64 as a child. I later dived into the intriguing online world of hacker subculture after seeing how popular it was in the online gaming community. This early interest has become a cornerstone of my connection to the research of this project. Over the decades, my passion has only grown, as well as my understanding of the complexities of technology.
Relevance to Professional Life: As a computer science major, my academic journey aligns with my personal interests. As artificial intelligence and cybersecurity are advanced sub-fields in the computer science realm, I seek to further increase my understanding by pursuing a lifelong career in academia. My ultimate goal is to become an adjunct professor so I can get paid to work with the subject I’m so passionate about. I have other related pursuits, such as expanding my limited liability company to include legal investigation, that share a lot of overlap with cybersecurity. Keywords: Generative AI, Cybersecurity, Hacking, Defensive Strategies, Offensive Tactics, Information Security, Technology Impact. Purpose of the Paper: The purpose of this project is to advocate for a deeper understanding of just how generative AI influences every aspect of digital security. The goal is to educate students and enlighten cybersecurity professionals with new insights that will enable them to harness the potential generative AI offers while simultaneously teaching them of the risks it has. The project also aims to contribute knowledge to the academic realm. Intended Audience: The intended audience for this project includes other university students, general readers with an interest in tech trends, and professionals in cybersecurity, information technology, and ethical hacking. Writer's Voice: The voice of the project is one of an advocate for understanding so readers can harness generative AI while learning about its impact on cybersecurity and hacking. The tone is urgent, advocating for proactive
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
measures to secure readers’ digital environments. The third-person perspective is used to maintain objectivity. Key Points and Main Question: Some of the key points of this project involve understanding how generative AI works, how cybersecurity uses the technology, and how malicious actors can use it for nefarious tasks. The main question is: How will generative AI be used to influence cybersecurity practices positively, what dangers does it cause, and how can professionals thwart them? Preliminary Problem Statement: With technology constantly advancing at a rapid pace, the cyber threat landscape is ever evolving. This study aims to address the question of how generative AI will redefine the future of cybersecurity and hacking. The preliminary problem statement addresses the potential benefits and challenges introduced by this technology. Since cybersecurity has both defensive and offensive contexts, it will be difficult to use AI to bolster one side of the proverbial coin without affecting the other. This technology is already in use by cyber professionals in every industry, by governments and militaries in cyber warfare and espionage, and by the hacker community in various ways, mostly benign but with the potential for catastrophic damage. Summary: In summary, this research project advocates for understanding the future transformational impact generative AI will have on our digital lives. The technology is capable of defending entire companies almost by itself, but has the potential to cause catastrophic damage if placed in the wrong hands. The writer’s motivation comes from a lifelong fascination with technology, a connection to hacker culture, and a commitment to academic research in the field.
References: IBM (2023). The CEO’s Guide to Generative AI. Page number. https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/ceo-generative-ai/ cybersecurity