The role of artificial intelligence in information security: a review of its application in the cyber industry
DOI:
https://doi.org/10.15381/risi.v16i1.25390Keywords:
information security, artificial intelligence, information technologies, cybersecurityAbstract
At present, the implementation of information technologies in organizations is increasingly common, since it benefits the development and automation of the processes they carry out; however, it is important to take into account that the incorporation of these technological solutions may affect the security of your systems and the information contained in them. This is where artificial intelligence can help organizations improve their ability to protect their sensitive information against possible cybersecurity threats, while reducing the workload on the teams in charge of it; however, executing this strategy comes with its own drawbacks, which organizations implementing it will need to address. The objective of this article is to determine and analyze the benefits and limitations offered by artificial intelligence applied to information security, for which a systematic review of the articles and papers published in the Scopus, Scielo and Alicia databases was carried out. during the last 5 years (2019 - 2023), with the intention of giving priority to current publications on the subject. The results obtained show us that Artificial Intelligence (AI) provides benefits in terms of detecting attacks in real time and preventing threats, having as limitations its implementation complexity, the need for broad access to data, the distrust generated by its independent interpretation and the lack of privacy towards user data.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Josue Eduardo David Chavez Flores, Jean Carlos Joel Pacheco Guzmán, Alberto Carlos Mendoza de los Santos

This work is licensed under a Creative Commons Attribution 4.0 International License.
AUTHORS RETAIN THEIR RIGHTS:
a. Authors retain their trade mark rights and patent, and also on any process or procedure described in the article.
b. Authors retain their right to share, copy, distribute, perform and publicly communicate their article (eg, to place their article in an institutional repository or publish it in a book), with an acknowledgment of its initial publication in the Revista de investigación de Sistemas e Informática.
c. Authors retain theirs right to make a subsequent publication of their work, to use the article or any part thereof (eg a compilation of his papers, lecture notes, thesis, or a book), always indicating its initial publication in the Revista de investigación de Sistemas e Informática (the originator of the work, journal, volume, number and date).