Accessing the Role of Artificial Intelligence in Information Security Risk Management

This thesis looks at how Artificial Intelligence (AI), especially large language models (LLMs) like GPT and RoBERTa, can help improve cybersecurity by detecting threats and managing risks. Examples of these cyber threats include phishing and malware. Traditional systems that rely on fixed rules ofte...

Full description

Bibliographic Details
Main Author: Baig, Ashiq
Other Authors: Faculty of Information Technology, Informaatioteknologian tiedekunta, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:eng
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/98988
_version_ 1826225705373925376
author Baig, Ashiq
author2 Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_facet Baig, Ashiq Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto Baig, Ashiq Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_sort Baig, Ashiq
datasource_str_mv jyx
description This thesis looks at how Artificial Intelligence (AI), especially large language models (LLMs) like GPT and RoBERTa, can help improve cybersecurity by detecting threats and managing risks. Examples of these cyber threats include phishing and malware. Traditional systems that rely on fixed rules often don’t work well enough. The study examines how well AI-based models can identify these threats in test settings, focusing on how quickly and reliably they detect issues. Data for training and testing the models came from sources like the PhishTank Phishing Database and the Common Vulnerabilities and Exposures (CVE) list. The results show that LLMs can accurately identify known threats, but they struggle with threats that are vague or uncommon. This research gives insights into using AI in Information Security but notes that these technologies still need improvement to reduce false alarms and allow more customization for specific industries. Keywords: Artificial Intelligence, AI, InfoSec, Information Security, Cybersecurity, Threat Detection, Large Language Models, Information Security, GPT, RoBERTa
first_indexed 2024-12-13T21:01:46Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "M\u00e4kitalo, Niko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Baig, Ashiq", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-13T06:57:26Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-13T06:57:26Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98988", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis looks at how Artificial Intelligence (AI), especially large language models (LLMs) like GPT and RoBERTa, can help improve cybersecurity by detecting threats and managing risks. Examples of these cyber threats include phishing and malware. Traditional systems that rely on fixed rules often don\u2019t work well enough.\n\nThe study examines how well AI-based models can identify these threats in test settings, focusing on how quickly and reliably they detect issues. Data for training and testing the models came from sources like the PhishTank Phishing Database and the Common Vulnerabilities and Exposures (CVE) list. The results show that LLMs can accurately identify known threats, but they struggle with threats that are vague or uncommon.\n\nThis research gives insights into using AI in Information Security but notes that these technologies still need improvement to reduce false alarms and allow more customization for specific industries.\n\nKeywords: Artificial Intelligence, AI, InfoSec, Information Security, Cybersecurity, Threat Detection, Large Language Models, Information Security, GPT, RoBERTa", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-12-13T06:57:26Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-13T06:57:26Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "63", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Accessing the Role of Artificial Intelligence in Information Security Risk Management", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412137810", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Information Systems", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Information Systems", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_98988
language eng
last_indexed 2025-02-18T10:56:35Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/0345fa9c-50d8-4dc1-9426-4b0ecd5c0388\/download","text":"URN:NBN:fi:jyu-202412137810.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Baig, Ashiq Accessing the Role of Artificial Intelligence in Information Security Risk Management Master's Degree Programme in Information Systems
title Accessing the Role of Artificial Intelligence in Information Security Risk Management
title_full Accessing the Role of Artificial Intelligence in Information Security Risk Management
title_fullStr Accessing the Role of Artificial Intelligence in Information Security Risk Management Accessing the Role of Artificial Intelligence in Information Security Risk Management
title_full_unstemmed Accessing the Role of Artificial Intelligence in Information Security Risk Management Accessing the Role of Artificial Intelligence in Information Security Risk Management
title_short Accessing the Role of Artificial Intelligence in Information Security Risk Management
title_sort accessing the role of artificial intelligence in information security risk management
title_txtP Accessing the Role of Artificial Intelligence in Information Security Risk Management
topic Master's Degree Programme in Information Systems
topic_facet Master's Degree Programme in Information Systems
url https://jyx.jyu.fi/handle/123456789/98988 http://www.urn.fi/URN:NBN:fi:jyu-202412137810
work_keys_str_mv AT baigashiq accessingtheroleofartificialintelligenceininformationsecurityriskmanagement