Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution

I. Bala, Maad M. Mijwil, Guma Ali, Emre Sadıkoğlu
{"title":"Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution","authors":"I. Bala, Maad M. Mijwil, Guma Ali, Emre Sadıkoğlu","doi":"10.58496/mjbd/2023/009","DOIUrl":null,"url":null,"abstract":"In recent years, the significance and efficiency of business performance have become dependent heavily on digitization, as jobs in companies are seeking to be transformed into digital jobs based on smart systems and applications of the fourth industrial revolution. Cybersecurity systems must interact and continuously cooperate with authorized users through the Internet of Things and benefit from corporate services that allow users to interact in a secure environment free from electronic attacks. Artificial intelligence methods contribute to the design of the Fourth Industrial Revolution principles, including interoperability, information transparency, technical assistance, and decentralized decisions. Through this design, security gaps may be generated that attackers can exploit in order to be able to enter systems, control them, or manipulate them. In this paper, the role of automated systems for digital operations in the fourth industrial revolution era will be examined from the perspective of artificial intelligence and cybersecurity, as well as the most significant practices of artificial intelligence methods. This paper concluded that artificial intelligence methods play a significant role in defending and protecting cybersecurity and the Internet of Things, preventing electronic attacks, and protecting users' privacy.","PeriodicalId":325612,"journal":{"name":"Mesopotamian Journal of Big Data","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjbd/2023/009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, the significance and efficiency of business performance have become dependent heavily on digitization, as jobs in companies are seeking to be transformed into digital jobs based on smart systems and applications of the fourth industrial revolution. Cybersecurity systems must interact and continuously cooperate with authorized users through the Internet of Things and benefit from corporate services that allow users to interact in a secure environment free from electronic attacks. Artificial intelligence methods contribute to the design of the Fourth Industrial Revolution principles, including interoperability, information transparency, technical assistance, and decentralized decisions. Through this design, security gaps may be generated that attackers can exploit in order to be able to enter systems, control them, or manipulate them. In this paper, the role of automated systems for digital operations in the fourth industrial revolution era will be examined from the perspective of artificial intelligence and cybersecurity, as well as the most significant practices of artificial intelligence methods. This paper concluded that artificial intelligence methods play a significant role in defending and protecting cybersecurity and the Internet of Things, preventing electronic attacks, and protecting users' privacy.
从网络安全角度分析人工智能与工业4.0的联系:捍卫智能革命
近年来,企业绩效的重要性和效率在很大程度上依赖于数字化,因为企业的工作正在寻求以第四次工业革命的智能系统和应用为基础的数字化工作。网络安全系统必须通过物联网与授权用户进行交互并持续合作,并受益于允许用户在不受电子攻击的安全环境中进行交互的企业服务。人工智能方法有助于第四次工业革命原则的设计,包括互操作性、信息透明度、技术援助和分散决策。通过这种设计,可能会产生安全漏洞,攻击者可以利用这些漏洞进入系统、控制系统或操纵系统。本文将从人工智能和网络安全的角度,以及人工智能方法的最重要实践,来研究第四次工业革命时代数字操作自动化系统的作用。本文认为,人工智能方法在防御和保护网络安全和物联网、防止电子攻击、保护用户隐私方面发挥着重要作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信