Atjaunināt sīkdatņu piekrišanu

E-grāmata: Generative AI: Phishing and Cybersecurity Metrics

(President, HTG Solutions, IL, USA)
  • Formāts: 175 pages
  • Sērija : Cyber Shorts
  • Izdošanas datums: 10-Oct-2024
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781040128107
  • Formāts - PDF+DRM
  • Cena: 31,30 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks. But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now usesomething like ChatGPT to craft the content for Phishing Emails that are so convincing that it difficult to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book"--

The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.

The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.

But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:

  • A review of phishing
  • A review of AI, Neural Networks, and Machine Learning
  • A review of Natural Language Processing, Generative AI, and the Digital Person
  • A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts



The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book.

Acknowledgements.
Chapter 1 Introduction to Phishing.
Chapter 2 Overview
of Artificial Intelligence, Neural Networks, and Machine Learning.
Chapter 3
Introduction to Generative AI, Natural Language Processing, and the Digital
Person.
Chapter 4 Review of Cybersecurity Metrics.
Chapter 5 Conclusions.
Index.
Ravi Das is a technical writer in the Cybersecurity realm. He also does Cybersecurity consulting on the side through his private practice, M L Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC(2).