Dydaktyka Informatyki T. 19 (2024)
URI dla tej Kolekcjihttps://repozytorium.ur.edu.pl/handle/item/11088
Przeglądaj
Przeglądanie Dydaktyka Informatyki T. 19 (2024) według Autor "Wołoszyn, Jacek"
Aktualnie wyświetlane 1 - 3 z 3
- Wyniki na stronie
- Opcje sortowania
Pozycja Evolution and Impact of Artificial Intelligence on Advanced Defense Strategies in Cybersecurity(Wydawnictwo Uniwersytetu Rzeszowskiego, 2024-12) Wołoszyn, JacekThis article presents a detailed analysis of the use of AI in various aspects of cybersecurity, from training, threat detection and response, through identity and access management, to future directions and inherent challenges. It examines how this technology is transforming the field of digital security. The aim is not only to present the opportunities offered by AI, but also to draw attention to the need for a conscious and responsible approach to its implementation and exploitation.Pozycja Integrating Artificial Intelligence in Cybersecurity Detection and Response(Wydawnictwo Uniwersytetu Rzeszowskiego, 2024-12) Wołoszyn, JacekThe article presents the possibilities of using artificial intelligence in the context of cybersecurity. It outlines the role of artificial intelligence in the face of increasing threats to network infrastructure. Section 1 discusses the justification for using artificial intelligence in cybersecurity, while Sections 2 and 3 explore the concept of detecting and preventing incidents using incident response automation. Meanwhile, Section 4 is dedicated to identity and access management in the context of accessing organizational resources.Pozycja Using Nmap and Python for an automated network security audit(Wydawnictwo Uniwersytetu Rzeszowskiego, 2024-12) Wołoszyn, Jacek; Wołoszyn, MichałThis article describes how the practical application of Nmap and Python can revolutionize the approach to cybersecurity, offering insight into specific techniques, scripts, and strategies for using these tools to enhance network security. Through in-depth analysis and use cases, this article aims not only to demonstrate the potential of combining these two powerful tools, but also to inspire you to use them to build more secure, resilient environments. The following sections describe the basics of Nmap, Python integrations, and the use case.