**5. Conclusion**

Cyber security should employ a variety of security concepts such as threat modeling techniques to safeguard asset, environment and organization from being attacked. Five essential components of threat modeling process which are threat intelligence, asset identification, mitigation capability, risk assessment, and threat mapping are pivotal to mitigating security threat that are based on IUI design while taking into cognizance the baseline design principles. There must be proper application of different threat model methods at the requirement and design stages of the project life-cycle using a well-formulated Software Development Life Cycle (SDLC) model. The design of Intelligent User Interfaces requires incorporation of Artificial Intelligence (AI) to analyze various user interactions to detect anomalies such as phishing, spamming, fake news/hate posts, among others. To achieve this, predicative analytics must be institutionalized to further improve the intelligence of the design. Deep leaning can be used for sentimental analysis to determine expressions that can aid in qualifying potentially new type of attacks or threats. AI-driven User Interface (UI) design must be user-centered instead of technology-centered to give lasting UX which cannot be derived or experienced with the traditional UI Design. HCI provides design techniques for User Interfaces that are efficient and the AI components are used to embed intelligence into those interfaces. Therefore, appropriate IUI Design Methods, models coupled with AI-Based UI and UX Prototyping Tools are crucial for developing efficient cyber security threat modeling applications. This is highly essential because in the IUI design, direct manipulation method of design has low predictability which does not guarantee effective cyber threat mitigation.

*Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling DOI: http://dx.doi.org/10.5772/intechopen.96534*
