Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 4
ASSIGNMENT-1
Class: TE (AI&ML)
Subject: AI and Cybersecurity
1. How does keystroke dynamics authentication work?
2. How can organizations dynamically adjust security measures based on an
account's reputation?
3. What are the most common types of authentication abuse?
4. What are some common algorithms that use bagging and boosting
techniques for fraud prevention?
5. What are bagging and boosting techniques, and how do they improve fraud
detection accuracy?
Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 4
ASSIGNMENT-2
Class: TE (AI&ML)
Subject: AI&Cybersecurity
1. How does bagging help reduce variance and prevent overfitting in fraud
detection models?
2. How can liveness detection prevent spoofing attacks in facial recognition?
3. How do rate-limiting and IP blacklisting help mitigate brute-force attacks?
4. What is user authentication? What are the best practices of User
authentication
5. What are the key differences between rule-based and AI-driven account
reputation scoring?
Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 4
ASSIGNMENT-3.
1. How can anomaly detection techniques be applied in fraud prevention?
2. How does session management impact authentication security?
3. What is Biometric authentication? Discuss its benefits?
4. How does AI improve the accuracy of facial recognition authentication?
5. In what ways does boosting enhance model accuracy by focusing on
misclassified instances?
Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 4
ASSIGNMENT-4
Class: TE (AI&ML)
Subject: AI&Cybersecurity
1. What are the types of biometric authentication?
2. What is multimodel biometric authentication? Discuss with an example?
3. How is anomaly detection applied in industrial IoT and predictive
maintenance?
4. What are the ethical concerns surrounding biometric authentication?
5. How do supervised and unsupervised ML models differ in fraud
detection?
Prof.Kusuma Varanasi
Subject Teacher