Russian Federation
Russian Federation
Abstract. In modern conditions, companies need to introduce new technologies in a timely manner and monitor compliance with information security requirements in order to effectively counter modern threats. Access control systems are one of the main tools that ensure an adequate level of information security at the enterprise and simplify control over the provision of access to the organization’s resources. The main goal: to explore the possibilities of using artificial intelligence for access control systems, highlighting its importance in the context of increasing the level of information security of the organization and the effectiveness of access rights management. Research method: analysis of modern tools and technologies, including artificial intelligence and large language models, as well as assessment of practical cases of AI implementation in access control systems. Both the advantages and risks associated with automated access control using AI are considered. Practical significance: the results of the work can be used by organizations to improve the security and efficiency of access management to information resources. The identified risks and recommendations for the introduction of AI technologies will allow companies to take a more conscious approach to improving information security processes.
access control system, information security, information protection, identification, authentication, access rights control, automation, role model, IDM, IAM, IGA
1. Nosova V. I. Iskusstvennyy intellekt v obrazovanii // Molodoy uchenyy. 2023. № 49 (496). S. 190–192.
2. AI-Driven Decision Support Systems in Management: Enhancing Strategic Planning and Execution / S. Dodda [et al.] // International Journal on Recent and Innovation Trends in Computing and Communication. 2024. Vol. 12 (1). P. 1.
3. Csaszar F. A., Ketkar H., Kim H. Artificial Intelligence and Strategic Decision-Making: Evidence from Entrepreneurs and Investors. 2024.
4. IBM Planning Analytics. URL: https://www.ibm.com/products/planning-analytics?lnk=STW_UK_PHP_SP4_BLK\ &psrc=NONE&pexp=DEF&lnk2=trial_PlanningAnalytics
5. IBM Planning Analytics 2.0 URL: //https://www.ibm.com/docs/en/planning-analytics/2.0.0
6. Baking in AI and Analytics to Meet Rising Demand. URL: https://www.ibm.com/case-studies/vaasan
7. A “Revolution” in Financial Reporting Brings Faster and Deeper Insights. URL: https://www.ibm.com/case-studies/ solar-coca-col
8. Blyum V. S., Grigor'eva D. A. Sistema upravleniya dostupom kak sovremennyy sposob obespecheniya informacionnoy bezopasnosti v organizacii // Aktual'nye problemy ekonomiki i upravleniya. 2024. № 2 (42). S. 27–33.
9. Administering Oracle Identity Role Intelligence. URL: https://docs.oracle.com/en/middleware/idm/identity-roleintelligence/ amiri/overview-oracle-identity-role-intelligence.html#GUID-3D761974-3533-4051-B939-1B45E4ACC3CD
10. Introducing Okta AI. URL: https://www.okta.com/products/okta-ai/
11. Sevast'yanova L. Upravlenie dostupom: razvitie tehnologiy, processov, mashinnogo obucheniya // Solar: 2024. URL: https://rt-solar.ru/events/blog/4080/
12. AI Hype as a Cyber Security Risk: the Moral Responsibility of Implementing Generative AI in Business / D. Humphreys [et al.] // AI Ethics. 2024. No. 4. P. 791–804.
13. Comprehensive, Comparable, Country-Level Data. URL: https://www.global-index.ai/Countries
14. Rosstat provodit monitoring sozdaniya i rezul'tatov primeneniya tehnologiy iskusstvennogo intellekta // Soyuz «Odincovskaya TPP»: oficial'nyy sayt. URL: https://odintsovo.tpprf.ru/ru/mobile/news/538587/