Generative AI
Phishing And Cybersecurity Metrics
Seiten
2024
CRC Press (Verlag)
978-1-032-82268-6 (ISBN)
CRC Press (Verlag)
978-1-032-82268-6 (ISBN)
- Noch nicht erschienen (ca. Oktober 2024)
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book.
The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks.
But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it is almost to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website.
But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:
Ø A review of Phishing
Ø A review of AI, Neural Networks, and Machine Learning
Ø A review of Natural Language Processing, Generative AI, and the Digital Person
Ø A Proposed Solution as to how Generative AI can combat Phishing Attacks, as they relate to Privileged Access Accounts.
The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks.
But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it is almost to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website.
But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:
Ø A review of Phishing
Ø A review of AI, Neural Networks, and Machine Learning
Ø A review of Natural Language Processing, Generative AI, and the Digital Person
Ø A Proposed Solution as to how Generative AI can combat Phishing Attacks, as they relate to Privileged Access Accounts.
Ravi Das is a technical writer in the Cybersecurity realm. He also does Cybersecurity consulting on the side through his private practice, M L Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC(2).
Acknowledgements. Chapter 1 INTRODUCTION TO PHISHING. Chapter 2 AN OVERVIEW INTO ARTIFICIAL INTELLIGENCE, NEURALNETWORKS, AND MACHINE LEARNING. Chapter 3 INTRODUCTION TO GENERATIVE AI, NATURAL LANGUAGE PROCESSING, AND THE DIGITAL PERSON. Chapter 4 REVIEW OF CYBERSECURITY METRICS. Chapter 5 CONCLUSIONS. Index.
Erscheint lt. Verlag | 10.10.2024 |
---|---|
Reihe/Serie | Cyber Shorts |
Zusatzinfo | 13 Line drawings, black and white; 13 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
ISBN-10 | 1-032-82268-6 / 1032822686 |
ISBN-13 | 978-1-032-82268-6 / 9781032822686 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
das umfassende Handbuch für den Einstieg in die Netzwerktechnik
Buch | Hardcover (2023)
Rheinwerk (Verlag)
29,90 €
Dateiformate, Übertragungsprotokolle und ihre Nutzung in …
Buch | Softcover (2024)
Springer Vieweg (Verlag)
19,99 €