EPQ Presentation: Invisible Battlefields
Analysing AI-Powered Cyber Attacks and How to Stop Them
Slide 1: Title Slide
Invisible Battlefields: Analysing AI-Powered Cyber Attacks and How to Stop Them
Your Name EPQ 2025
Slide 2: Research Question
"How are AI-powered cyberattacks evolving, and how effective are current defensive strategies in mitigating their threats?"
Why this matters:
- Average data breach costs: $4.88 million (IBM, 2024)
- AI-driven attacks show 15% higher success rates
- Attacks are faster, smarter, and harder to detect
Slide 3: What Are AI-Powered Attacks?
Traditional attacks: Scripted, predictable patterns
- WannaCry (2017): Infected 200,000+ computers
AI-powered attacks: Adaptive and automated
- Machine learning adapts to defenses in real-time
- Generates thousands of unique attack variants
- Learns from each attempt
Slide 4: Voice Cloning Attacks
How it works:
- AI clones voices from 3 seconds of audio
- Used in "vishing" (voice phishing) attacks
- Impersonates CEOs, executives, trusted contacts
Real example:
- 2019: Criminals used AI voice to steal €220,000
- 50%+ success rate against untrained employees
Defense: Voice authentication, verification protocols
Slide 5: Deepfake Video Attacks
The threat:
- AI creates fake video conference appearances
- Real-time impersonation of CFOs, partners
- Bypasses visual verification instincts
Real example:
- 2024: Multi-million dollar fraud via deepfake video call
Detection challenges:
- 65-70% accuracy for detection tools
- Compressed video masks synthetic indicators
Slide 6: Social Media Targeting
AI-powered social engineering:
- Analyses LinkedIn/social media profiles
- Creates personalized phishing over weeks/months
- 45% higher engagement than traditional phishing
How it works:
- AI scrapes your interests, career frustrations
- Crafts tailored job offers or opportunities
- Builds trust through consistent persona
- Introduces malicious links/attachments
Slide 7: Current Defenses - Organizations
Zero-Trust Architecture:
- No implicit trust - verify everything
- Limits lateral movement after breach
AI-Powered Tools:
- Microsoft Defender for Cloud
- IBM Security Operations Centers
- Cisco Talos (processes 1.5 trillion daily events)
Success: $1.88M lower breach costs with AI deployment
Slide 8: Defense Limitations
The Problem:
- AI attacks evolve faster than defenses
- False positives cause "alert fatigue"
- SMEs lack resources for advanced defenses
- SolarWinds (2020): Even sophisticated defenses failed
The Reality:
- Attackers have no ethical constraints
- Defenders must balance security vs. usability
- Supply chain = weakest link vulnerability
Slide 9: Key Findings
What I discovered:
✅ AI transforms attacks from scripted to adaptive ✅ Social engineering is the most dangerous vector ✅ Current defenses work BUT only for well-resourced organizations ✅ Human judgment still essential - AI can't replace it ✅ It's an ongoing arms race with no permanent winner
The gap: Small businesses create supply chain vulnerabilities
Slide 10: Conclusion & Future
The Answer: AI-powered attacks ARE evolving rapidly. Current defenses ARE partially effective, but gaps remain.
What's needed:
- Hybrid AI-human defense strategies
- Continuous adaptation, not one-time solutions
- Global cooperation and threat intelligence sharing
- Realistic expectations about AI limitations
Final thought: "AI-powered cyberattacks have redefined the invisible battlefield - only adaptive, ethical, and collaborative defenses can secure our digital future."
Presentation Tips:
- Timing: ~2 minutes per slide = 20-minute presentation
- Keep slides minimal - use bullet points, not paragraphs
- Use visuals if possible (diagrams of attacks, screenshots)
- Tell stories - the €220k voice fraud, deepfake video calls
- Engage audience - ask if anyone's received suspicious LinkedIn messages
- Practice - know your stats without reading slides
Comments
Post a Comment