This qualitative grounded theory explored countermeasures to defend against Artificial Intelligence (AI)-powered malware exploiting facial recognition software for malicious intent. The basic taxonomy of facial recognition software and AI-generated malware was examined to understand their mechanisms and build the foundation of this study. Based on the review of AI-generated malware and facial recognition software, three categories of countermeasures were proposed. The recommended countermeasures were assessed through the frameworks. The NIST Cybersecurity Framework was selected to evaluate the proposed countermeasure to identify, protect, detect, and prevent the threat of AI-generated malware. The results of the study showed the threat of AI-generated malware can be reduced or mitigated by implementing appropriate countermeasures. The recommended technical and non-technical measures, along with the security awareness program, can be integrated into the cybersecurity framework and customized to address an organization’s objectives and to combat the AI-enabled malware exploiting facial recognition.
|Advisor:||Butler, William H., Perry, Alexander K.|
|Commitee:||McAndrew, Ian, Fain, Michael R.|
|School:||Capitol Technology University|
|School Location:||United States -- Maryland|
|Source:||DAI-A 82/3(E), Dissertation Abstracts International|
|Subjects:||Artificial intelligence, Science education, Information science|
|Keywords:||Weaponized AI malware, Facial recognition, Countermeasures|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be