Abstract

In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.

Highlights

  • Cyber Security protect Information Technology (IT) assets, devices, data, programs, and networks from digital attacks or damage using processes, technologies, and practices to mitigate unauthorized access [1, 2]

  • Cyber security employs a variety of security concepts such as threat modeling to safeguard user’s asset, Software Usability environment and organization from being attacked

  • Cyber security should employ a variety of security concepts such as threat modeling techniques to safeguard asset, environment and organization from being attacked

Read more

Summary

Introduction

Cyber Security protect Information Technology (IT) assets, devices, data, programs, and networks from digital attacks or damage using processes, technologies, and practices to mitigate unauthorized access [1, 2]. Neglecting the security designers in cyber security and focusing only on human factors in cyber attacks [4] give room for wide penetration to sensitive systems through social engineering. This could pose threats to physical machines and human manipulation via social engineering which is the most important aspect of information security. This ascertains the fact that the issue of cyber attack is progressively becoming a threat that militarizes information technology assets

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.