Generative AI Generative AI
Cyber Shorts

Generative AI

Phishing and Cybersecurity Metrics

    • ¥4,800
    • ¥4,800

発行者による作品情報

The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.

The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.

But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:
A review of phishing A review of AI, Neural Networks, and Machine Learning A review of Natural Language Processing, Generative AI, and the Digital Person
A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts

ジャンル
コンピュータ/インターネット
発売日
2024年
10月10日
言語
EN
英語
ページ数
175
ページ
発行者
CRC Press
販売元
Taylor & Francis Group
サイズ
3.3
MB
Generative AI and Digital Forensics Generative AI and Digital Forensics
2024年
A Reference Manual for Data Privacy Laws and Cyber Frameworks A Reference Manual for Data Privacy Laws and Cyber Frameworks
2024年
Generative AI and Cyberbullying Generative AI and Cyberbullying
2024年
The Zero Trust Framework and Privileged Access Management (PAM) The Zero Trust Framework and Privileged Access Management (PAM)
2024年
The Science of Biometrics The Science of Biometrics
2018年
Adopting Biometric Technology Adopting Biometric Technology
2017年
Security Technologies for Law Enforcement Agencies Security Technologies for Law Enforcement Agencies
2025年
Public Key Cryptosystems Public Key Cryptosystems
2024年
Offensive and Defensive Cyber Security Strategies Offensive and Defensive Cyber Security Strategies
2024年
A Reference Manual for Data Privacy Laws and Cyber Frameworks A Reference Manual for Data Privacy Laws and Cyber Frameworks
2024年