Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Newark
John Wiley & Sons, Incorporated
2024
|
Ausgabe: | 1st ed |
Links: | https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31718486 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Umfang: | 1 Online-Ressource (242 Seiten) |
ISBN: | 9781394254958 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV050101669 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 241218s2024 xx o|||| 00||| eng d | ||
020 | |a 9781394254958 |9 978-1-394-25495-8 | ||
035 | |a (ZDB-30-PQE)EBC31718486 | ||
035 | |a (ZDB-30-PAD)EBC31718486 | ||
035 | |a (ZDB-89-EBL)EBL31718486 | ||
035 | |a (OCoLC)1492128521 | ||
035 | |a (DE-599)BVBBV050101669 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 338.064 | |
100 | 1 | |a Brooks, Chuck |e Verfasser |4 aut | |
245 | 1 | 0 | |a Inside Cyber |b How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
250 | |a 1st ed | ||
264 | 1 | |a Newark |b John Wiley & Sons, Incorporated |c 2024 | |
264 | 4 | |c ©2024 | |
300 | |a 1 Online-Ressource (242 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity -- Five Reasons for the Increase in Cyberattacks -- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up -- Chapter 2 Cyber Threats, Targets, and Digital Convergence -- The Root of the Security Problem Explained -- Cyber Safety: The Nature of the Problem -- Cyber Solutions for the New Digital Ecosystem -- Chapter 3 Common Cyber Threats and Defensive Tools -- Social Engineering and Identity Theft -- Phishing -- Ransomware -- Botnets -- DDoS Attacks -- Chapter 4 Cyber Threat Targets -- Software Supply Chains -- Internet of Things and Mobility -- Insider Threats -- The Cloud -- Critical Infrastructure Protection -- The Convergence Supply Chain for IT and OT -- Chapter 5 Cybersecurity and Digital Transformation -- Chapter 6 Artificial Intelligence: What Is It? -- Chapter 7 Types of Artificial Intelligence -- Chapter 8 Some Subdomains of Artificial Intelligence -- Chapter 9 Big Data and Data Analytics -- Chapter 10 Generative Artificial Intelligence -- Industry Competing in Developing Generative AI -- Optimizing the Supply Chain -- Applications of AI in Supply Chain Management for Business Scalability -- Mind-Blowing Generative AI Statistics -- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics -- AI and ML for Analytics -- The State of AI in Business -- AI Priorities and Plans -- AI Market Statistics -- AI Growth -- Obstacles to AI Adoption -- Benefits of AI Adoption -- Impact of AI on Jobs and the Employment Market -- ML and AI Stats -- Voice Search and AI Stats -- Virtual Assistants -- AI in the Retail Industry -- AI in Customer Service -- Chatbots and AI Facts and Figures -- AI in Marketing and Sales | |
505 | 8 | |a Chapter 12 How Artificial Intelligence Can Help Cybersecurity -- Mitigating AI Threats -- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin -- Evolution of Threats in the Age of AI -- AI-Generated Polymorphic Malware -- The Employees, Risk of Using AI -- AI-Generated Deepfakes -- AI Is Also Being Used by Hackers to Break Passwords More Quickly -- Chapter 14 Responding to Artificial Intelligence Cyber Threats -- Generative AI for Cyber Defense -- Real-Time Threat Detection -- Improving the Awareness of Potential Threats -- Patching Security Flaws Automatically -- Enhancing the Reaction and Responses to Incidents -- AI Security at the Hardware Level -- Chapter 15 Artificial Intelligence and Privacy -- Health Care and Privacy -- Chapter 16 Artificial Intelligence and Ethics -- Computer Vision: Creating an Ethical Framework -- Governmental Roles in Regulating AI -- The US Government -- Chief Digital Officer Roles for AI -- AI and the Prospects for the Future -- Affective Computing and the Exploration of Language Models -- Mimicking Neural Networks of the Human Brain -- How Fast Will AI Advance? -- Investments in AI Are Soaring -- AI and the Fusion of Other Technologies -- Chapter 17 The Interface Between Humans and Computers -- Biology of Humans and Machines -- Chapter 18 Artificial Intelligence and Health Care -- Cyber Threats -- AI Transforming Health Care -- Chapter 19 The Internet of Things -- What Is the Internet of Things? -- Attack Vulnerability of the Internet of Things -- Standard and Regulations for IoT -- Smart Cities -- Chapter 20 5G -- Chapter 21 Quantum Computing -- Chapter 22 Quantum Technologies and Cybersecurity -- Quantum Computing Is Already Here in Some Forms -- Chapter 23 Quantum Internet of Things -- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management | |
505 | 8 | |a Chapter 25 The Urgency of Having a Cyber Risk Management Plan -- The NIST Framework -- New Securities Exchange Corporation Cybersecurity Regulations -- Risk Management Pillars for the New Technological Era -- Risk Management Strategies at the Organizational Level -- All-Inclusive Approach to Risk Management -- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography -- Digital Conversion Tools -- Cybersecurity Equals Economic Resilience -- The Need for Government and Industry Cooperation -- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future -- Notes -- Acknowledgments -- About the Author -- Index -- EULA. | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Brooks, Chuck |t Inside Cyber |d Newark : John Wiley & Sons, Incorporated,c2024 |z 9781394254941 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035438831 | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31718486 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1823675911655915520 |
---|---|
adam_text | |
any_adam_object | |
author | Brooks, Chuck |
author_facet | Brooks, Chuck |
author_role | aut |
author_sort | Brooks, Chuck |
author_variant | c b cb |
building | Verbundindex |
bvnumber | BV050101669 |
collection | ZDB-30-PQE |
contents | Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity -- Five Reasons for the Increase in Cyberattacks -- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up -- Chapter 2 Cyber Threats, Targets, and Digital Convergence -- The Root of the Security Problem Explained -- Cyber Safety: The Nature of the Problem -- Cyber Solutions for the New Digital Ecosystem -- Chapter 3 Common Cyber Threats and Defensive Tools -- Social Engineering and Identity Theft -- Phishing -- Ransomware -- Botnets -- DDoS Attacks -- Chapter 4 Cyber Threat Targets -- Software Supply Chains -- Internet of Things and Mobility -- Insider Threats -- The Cloud -- Critical Infrastructure Protection -- The Convergence Supply Chain for IT and OT -- Chapter 5 Cybersecurity and Digital Transformation -- Chapter 6 Artificial Intelligence: What Is It? -- Chapter 7 Types of Artificial Intelligence -- Chapter 8 Some Subdomains of Artificial Intelligence -- Chapter 9 Big Data and Data Analytics -- Chapter 10 Generative Artificial Intelligence -- Industry Competing in Developing Generative AI -- Optimizing the Supply Chain -- Applications of AI in Supply Chain Management for Business Scalability -- Mind-Blowing Generative AI Statistics -- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics -- AI and ML for Analytics -- The State of AI in Business -- AI Priorities and Plans -- AI Market Statistics -- AI Growth -- Obstacles to AI Adoption -- Benefits of AI Adoption -- Impact of AI on Jobs and the Employment Market -- ML and AI Stats -- Voice Search and AI Stats -- Virtual Assistants -- AI in the Retail Industry -- AI in Customer Service -- Chatbots and AI Facts and Figures -- AI in Marketing and Sales Chapter 12 How Artificial Intelligence Can Help Cybersecurity -- Mitigating AI Threats -- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin -- Evolution of Threats in the Age of AI -- AI-Generated Polymorphic Malware -- The Employees, Risk of Using AI -- AI-Generated Deepfakes -- AI Is Also Being Used by Hackers to Break Passwords More Quickly -- Chapter 14 Responding to Artificial Intelligence Cyber Threats -- Generative AI for Cyber Defense -- Real-Time Threat Detection -- Improving the Awareness of Potential Threats -- Patching Security Flaws Automatically -- Enhancing the Reaction and Responses to Incidents -- AI Security at the Hardware Level -- Chapter 15 Artificial Intelligence and Privacy -- Health Care and Privacy -- Chapter 16 Artificial Intelligence and Ethics -- Computer Vision: Creating an Ethical Framework -- Governmental Roles in Regulating AI -- The US Government -- Chief Digital Officer Roles for AI -- AI and the Prospects for the Future -- Affective Computing and the Exploration of Language Models -- Mimicking Neural Networks of the Human Brain -- How Fast Will AI Advance? -- Investments in AI Are Soaring -- AI and the Fusion of Other Technologies -- Chapter 17 The Interface Between Humans and Computers -- Biology of Humans and Machines -- Chapter 18 Artificial Intelligence and Health Care -- Cyber Threats -- AI Transforming Health Care -- Chapter 19 The Internet of Things -- What Is the Internet of Things? -- Attack Vulnerability of the Internet of Things -- Standard and Regulations for IoT -- Smart Cities -- Chapter 20 5G -- Chapter 21 Quantum Computing -- Chapter 22 Quantum Technologies and Cybersecurity -- Quantum Computing Is Already Here in Some Forms -- Chapter 23 Quantum Internet of Things -- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management Chapter 25 The Urgency of Having a Cyber Risk Management Plan -- The NIST Framework -- New Securities Exchange Corporation Cybersecurity Regulations -- Risk Management Pillars for the New Technological Era -- Risk Management Strategies at the Organizational Level -- All-Inclusive Approach to Risk Management -- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography -- Digital Conversion Tools -- Cybersecurity Equals Economic Resilience -- The Need for Government and Industry Cooperation -- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future -- Notes -- Acknowledgments -- About the Author -- Index -- EULA. |
ctrlnum | (ZDB-30-PQE)EBC31718486 (ZDB-30-PAD)EBC31718486 (ZDB-89-EBL)EBL31718486 (OCoLC)1492128521 (DE-599)BVBBV050101669 |
dewey-full | 338.064 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 338 - Production |
dewey-raw | 338.064 |
dewey-search | 338.064 |
dewey-sort | 3338.064 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050101669</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241218s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394254958</subfield><subfield code="9">978-1-394-25495-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC31718486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC31718486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL31718486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1492128521</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050101669</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">338.064</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brooks, Chuck</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Inside Cyber</subfield><subfield code="b">How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newark</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (242 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity -- Five Reasons for the Increase in Cyberattacks -- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up -- Chapter 2 Cyber Threats, Targets, and Digital Convergence -- The Root of the Security Problem Explained -- Cyber Safety: The Nature of the Problem -- Cyber Solutions for the New Digital Ecosystem -- Chapter 3 Common Cyber Threats and Defensive Tools -- Social Engineering and Identity Theft -- Phishing -- Ransomware -- Botnets -- DDoS Attacks -- Chapter 4 Cyber Threat Targets -- Software Supply Chains -- Internet of Things and Mobility -- Insider Threats -- The Cloud -- Critical Infrastructure Protection -- The Convergence Supply Chain for IT and OT -- Chapter 5 Cybersecurity and Digital Transformation -- Chapter 6 Artificial Intelligence: What Is It? -- Chapter 7 Types of Artificial Intelligence -- Chapter 8 Some Subdomains of Artificial Intelligence -- Chapter 9 Big Data and Data Analytics -- Chapter 10 Generative Artificial Intelligence -- Industry Competing in Developing Generative AI -- Optimizing the Supply Chain -- Applications of AI in Supply Chain Management for Business Scalability -- Mind-Blowing Generative AI Statistics -- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics -- AI and ML for Analytics -- The State of AI in Business -- AI Priorities and Plans -- AI Market Statistics -- AI Growth -- Obstacles to AI Adoption -- Benefits of AI Adoption -- Impact of AI on Jobs and the Employment Market -- ML and AI Stats -- Voice Search and AI Stats -- Virtual Assistants -- AI in the Retail Industry -- AI in Customer Service -- Chatbots and AI Facts and Figures -- AI in Marketing and Sales</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 12 How Artificial Intelligence Can Help Cybersecurity -- Mitigating AI Threats -- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin -- Evolution of Threats in the Age of AI -- AI-Generated Polymorphic Malware -- The Employees, Risk of Using AI -- AI-Generated Deepfakes -- AI Is Also Being Used by Hackers to Break Passwords More Quickly -- Chapter 14 Responding to Artificial Intelligence Cyber Threats -- Generative AI for Cyber Defense -- Real-Time Threat Detection -- Improving the Awareness of Potential Threats -- Patching Security Flaws Automatically -- Enhancing the Reaction and Responses to Incidents -- AI Security at the Hardware Level -- Chapter 15 Artificial Intelligence and Privacy -- Health Care and Privacy -- Chapter 16 Artificial Intelligence and Ethics -- Computer Vision: Creating an Ethical Framework -- Governmental Roles in Regulating AI -- The US Government -- Chief Digital Officer Roles for AI -- AI and the Prospects for the Future -- Affective Computing and the Exploration of Language Models -- Mimicking Neural Networks of the Human Brain -- How Fast Will AI Advance? -- Investments in AI Are Soaring -- AI and the Fusion of Other Technologies -- Chapter 17 The Interface Between Humans and Computers -- Biology of Humans and Machines -- Chapter 18 Artificial Intelligence and Health Care -- Cyber Threats -- AI Transforming Health Care -- Chapter 19 The Internet of Things -- What Is the Internet of Things? -- Attack Vulnerability of the Internet of Things -- Standard and Regulations for IoT -- Smart Cities -- Chapter 20 5G -- Chapter 21 Quantum Computing -- Chapter 22 Quantum Technologies and Cybersecurity -- Quantum Computing Is Already Here in Some Forms -- Chapter 23 Quantum Internet of Things -- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 25 The Urgency of Having a Cyber Risk Management Plan -- The NIST Framework -- New Securities Exchange Corporation Cybersecurity Regulations -- Risk Management Pillars for the New Technological Era -- Risk Management Strategies at the Organizational Level -- All-Inclusive Approach to Risk Management -- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography -- Digital Conversion Tools -- Cybersecurity Equals Economic Resilience -- The Need for Government and Industry Cooperation -- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future -- Notes -- Acknowledgments -- About the Author -- Index -- EULA.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Brooks, Chuck</subfield><subfield code="t">Inside Cyber</subfield><subfield code="d">Newark : John Wiley & Sons, Incorporated,c2024</subfield><subfield code="z">9781394254941</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035438831</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31718486</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050101669 |
illustrated | Not Illustrated |
indexdate | 2025-02-10T13:07:58Z |
institution | BVB |
isbn | 9781394254958 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035438831 |
oclc_num | 1492128521 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (242 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
spelling | Brooks, Chuck Verfasser aut Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security 1st ed Newark John Wiley & Sons, Incorporated 2024 ©2024 1 Online-Ressource (242 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity -- Five Reasons for the Increase in Cyberattacks -- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up -- Chapter 2 Cyber Threats, Targets, and Digital Convergence -- The Root of the Security Problem Explained -- Cyber Safety: The Nature of the Problem -- Cyber Solutions for the New Digital Ecosystem -- Chapter 3 Common Cyber Threats and Defensive Tools -- Social Engineering and Identity Theft -- Phishing -- Ransomware -- Botnets -- DDoS Attacks -- Chapter 4 Cyber Threat Targets -- Software Supply Chains -- Internet of Things and Mobility -- Insider Threats -- The Cloud -- Critical Infrastructure Protection -- The Convergence Supply Chain for IT and OT -- Chapter 5 Cybersecurity and Digital Transformation -- Chapter 6 Artificial Intelligence: What Is It? -- Chapter 7 Types of Artificial Intelligence -- Chapter 8 Some Subdomains of Artificial Intelligence -- Chapter 9 Big Data and Data Analytics -- Chapter 10 Generative Artificial Intelligence -- Industry Competing in Developing Generative AI -- Optimizing the Supply Chain -- Applications of AI in Supply Chain Management for Business Scalability -- Mind-Blowing Generative AI Statistics -- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics -- AI and ML for Analytics -- The State of AI in Business -- AI Priorities and Plans -- AI Market Statistics -- AI Growth -- Obstacles to AI Adoption -- Benefits of AI Adoption -- Impact of AI on Jobs and the Employment Market -- ML and AI Stats -- Voice Search and AI Stats -- Virtual Assistants -- AI in the Retail Industry -- AI in Customer Service -- Chatbots and AI Facts and Figures -- AI in Marketing and Sales Chapter 12 How Artificial Intelligence Can Help Cybersecurity -- Mitigating AI Threats -- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin -- Evolution of Threats in the Age of AI -- AI-Generated Polymorphic Malware -- The Employees, Risk of Using AI -- AI-Generated Deepfakes -- AI Is Also Being Used by Hackers to Break Passwords More Quickly -- Chapter 14 Responding to Artificial Intelligence Cyber Threats -- Generative AI for Cyber Defense -- Real-Time Threat Detection -- Improving the Awareness of Potential Threats -- Patching Security Flaws Automatically -- Enhancing the Reaction and Responses to Incidents -- AI Security at the Hardware Level -- Chapter 15 Artificial Intelligence and Privacy -- Health Care and Privacy -- Chapter 16 Artificial Intelligence and Ethics -- Computer Vision: Creating an Ethical Framework -- Governmental Roles in Regulating AI -- The US Government -- Chief Digital Officer Roles for AI -- AI and the Prospects for the Future -- Affective Computing and the Exploration of Language Models -- Mimicking Neural Networks of the Human Brain -- How Fast Will AI Advance? -- Investments in AI Are Soaring -- AI and the Fusion of Other Technologies -- Chapter 17 The Interface Between Humans and Computers -- Biology of Humans and Machines -- Chapter 18 Artificial Intelligence and Health Care -- Cyber Threats -- AI Transforming Health Care -- Chapter 19 The Internet of Things -- What Is the Internet of Things? -- Attack Vulnerability of the Internet of Things -- Standard and Regulations for IoT -- Smart Cities -- Chapter 20 5G -- Chapter 21 Quantum Computing -- Chapter 22 Quantum Technologies and Cybersecurity -- Quantum Computing Is Already Here in Some Forms -- Chapter 23 Quantum Internet of Things -- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management Chapter 25 The Urgency of Having a Cyber Risk Management Plan -- The NIST Framework -- New Securities Exchange Corporation Cybersecurity Regulations -- Risk Management Pillars for the New Technological Era -- Risk Management Strategies at the Organizational Level -- All-Inclusive Approach to Risk Management -- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography -- Digital Conversion Tools -- Cybersecurity Equals Economic Resilience -- The Need for Government and Industry Cooperation -- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future -- Notes -- Acknowledgments -- About the Author -- Index -- EULA. Erscheint auch als Druck-Ausgabe Brooks, Chuck Inside Cyber Newark : John Wiley & Sons, Incorporated,c2024 9781394254941 |
spellingShingle | Brooks, Chuck Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity -- Five Reasons for the Increase in Cyberattacks -- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up -- Chapter 2 Cyber Threats, Targets, and Digital Convergence -- The Root of the Security Problem Explained -- Cyber Safety: The Nature of the Problem -- Cyber Solutions for the New Digital Ecosystem -- Chapter 3 Common Cyber Threats and Defensive Tools -- Social Engineering and Identity Theft -- Phishing -- Ransomware -- Botnets -- DDoS Attacks -- Chapter 4 Cyber Threat Targets -- Software Supply Chains -- Internet of Things and Mobility -- Insider Threats -- The Cloud -- Critical Infrastructure Protection -- The Convergence Supply Chain for IT and OT -- Chapter 5 Cybersecurity and Digital Transformation -- Chapter 6 Artificial Intelligence: What Is It? -- Chapter 7 Types of Artificial Intelligence -- Chapter 8 Some Subdomains of Artificial Intelligence -- Chapter 9 Big Data and Data Analytics -- Chapter 10 Generative Artificial Intelligence -- Industry Competing in Developing Generative AI -- Optimizing the Supply Chain -- Applications of AI in Supply Chain Management for Business Scalability -- Mind-Blowing Generative AI Statistics -- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics -- AI and ML for Analytics -- The State of AI in Business -- AI Priorities and Plans -- AI Market Statistics -- AI Growth -- Obstacles to AI Adoption -- Benefits of AI Adoption -- Impact of AI on Jobs and the Employment Market -- ML and AI Stats -- Voice Search and AI Stats -- Virtual Assistants -- AI in the Retail Industry -- AI in Customer Service -- Chatbots and AI Facts and Figures -- AI in Marketing and Sales Chapter 12 How Artificial Intelligence Can Help Cybersecurity -- Mitigating AI Threats -- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin -- Evolution of Threats in the Age of AI -- AI-Generated Polymorphic Malware -- The Employees, Risk of Using AI -- AI-Generated Deepfakes -- AI Is Also Being Used by Hackers to Break Passwords More Quickly -- Chapter 14 Responding to Artificial Intelligence Cyber Threats -- Generative AI for Cyber Defense -- Real-Time Threat Detection -- Improving the Awareness of Potential Threats -- Patching Security Flaws Automatically -- Enhancing the Reaction and Responses to Incidents -- AI Security at the Hardware Level -- Chapter 15 Artificial Intelligence and Privacy -- Health Care and Privacy -- Chapter 16 Artificial Intelligence and Ethics -- Computer Vision: Creating an Ethical Framework -- Governmental Roles in Regulating AI -- The US Government -- Chief Digital Officer Roles for AI -- AI and the Prospects for the Future -- Affective Computing and the Exploration of Language Models -- Mimicking Neural Networks of the Human Brain -- How Fast Will AI Advance? -- Investments in AI Are Soaring -- AI and the Fusion of Other Technologies -- Chapter 17 The Interface Between Humans and Computers -- Biology of Humans and Machines -- Chapter 18 Artificial Intelligence and Health Care -- Cyber Threats -- AI Transforming Health Care -- Chapter 19 The Internet of Things -- What Is the Internet of Things? -- Attack Vulnerability of the Internet of Things -- Standard and Regulations for IoT -- Smart Cities -- Chapter 20 5G -- Chapter 21 Quantum Computing -- Chapter 22 Quantum Technologies and Cybersecurity -- Quantum Computing Is Already Here in Some Forms -- Chapter 23 Quantum Internet of Things -- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management Chapter 25 The Urgency of Having a Cyber Risk Management Plan -- The NIST Framework -- New Securities Exchange Corporation Cybersecurity Regulations -- Risk Management Pillars for the New Technological Era -- Risk Management Strategies at the Organizational Level -- All-Inclusive Approach to Risk Management -- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography -- Digital Conversion Tools -- Cybersecurity Equals Economic Resilience -- The Need for Government and Industry Cooperation -- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future -- Notes -- Acknowledgments -- About the Author -- Index -- EULA. |
title | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_auth | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_exact_search | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_full | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_fullStr | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_full_unstemmed | Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
title_short | Inside Cyber |
title_sort | inside cyber how ai 5g iot and quantum computing will transform privacy and our security |
title_sub | How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
work_keys_str_mv | AT brookschuck insidecyberhowai5giotandquantumcomputingwilltransformprivacyandoursecurity |