Human-Centric Cybersecurity: Integrating Conversational AI with Secure Access Protocols for Enhanced User Experience

Authors

  • Prasanthi Vallurupalli  Independent Researcher, USA

Keywords:

Conversational AI, Secure Access Protocols, Cybersecurity, User Experience, Authentication

Abstract

With threats increasing daily, strong security mechanisms will never be out of place, but these should be friendly enough for use. This paper seeks to establish the relationship between conversational AI and secure access protocols to construct a friendly user cybersecurity approach that effectively serves security purposes. Conversational AI and, through it, natural language processing, biometric verification, and behavioural analysis can thus login: decrease the authentication process's resistance without diminishing its security. Furthermore, technologies like multi-factor authentication and biometrics are fully integrated with AI techniques that ensure the best-of-breed contextual access control. The coherence of these three components also allows for constant re-identification, real-time threat identification, and user interaction. Finally, it is possible to conclude that conversational AI and secure access protocols are not simply added values but are characterised by an innovative, hybrid cybersecurity model that makes digital tools safe and comfortable for customers.

References

  1. Adeniyi, A. E., Jimoh, R. G., Awotunde, J. B., Ninan, D. O., Aworinde, H. O., Oyebade, A., ... & Babatunde, A. O. Security, Privacy, Trust, and Other Issues in Industries 4.0 and 5.0. In Computational Intelligence in Industry 4.0 and 5.0 Applications (pp. 132-160). Auerbach Publications.
  2. Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.
  3. Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772
  4. Kilaru, N. B., & Cheemakurthi, S. K. M. (2021). Techniques For Feature Engineering To Improve Ml Model Accuracy. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 194-200.
  5. Singirikonda, P., Katikireddi, P. M., & Jaini, S. (2021). Cybersecurity In Devops: Integrating Data Privacy And Ai-Powered Threat Detection For Continuous Delivery. NVEO - Natural Volatiles & Essential Oils, 8(2), 215–216. https://doi.org/https://doi.org/10.53555/nveo.v8i2.5770
  6. Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769
  7. Singirikonda, P., Jaini, S., & Vasa, Y. (2021). Develop Solutions To Detect And Mitigate Data Quality Issues In ML Models. NVEO - Natural Volatiles & Essential Oils, 8(4), 16968–16973. https://doi.org/https://doi.org/10.53555/nveo.v8i4.5771
  8. Jangampeta, S., Mallreddy, S. R., & Padamati, J. R. (2021). Data Security: Safeguarding the Digital Lifeline in an Era of Growing Threats. International Journal for Innovative Engineering and Management Research, 10(4), 630-632.
  9. Vasa, Y. (2021). Quantum Information Technologies in cybersecurity: Developing unbreakable encryption for continuous integration environments. International Journal for Research Publication and Seminar, 12(2), 482–490. https://doi.org/10.36676/jrps.v12.i2.1539

Downloads

Published

2021-06-24

Issue

Section

Research Articles

How to Cite

[1]
Prasanthi Vallurupalli, " Human-Centric Cybersecurity: Integrating Conversational AI with Secure Access Protocols for Enhanced User Experience" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp.661-666, May-June-2021.