Prix bas
CHF35.10
Habituellement expédié sous 2 à 4 semaines.
Auteur
CHUCK BROOKS is a seasoned executive and consultant with over 25 years' experience in cybersecurity, emerging technologies, marketing, business development, and government relations. He is also an Adjunct Professor at Georgetown University, where he teaches graduate courses on risk management, homeland security, and cybersecurity.
Texte du rabat
A FASCINATING EXPLORATION OF THE IMPACT OF THE LATEST TECH ON MODERN COMMERCE In Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security, author Chuck Brooks, a distinguished executive and consultant, offers a compelling guide to the forefront of technology. As innovation accelerates at an unprecedented pace, Brooks demystifies the explosive growth of technologies such as artificial intelligence, blockchain, and quantum computing, among others. This book delves into how these advancements are reshaping industries, posing new challenges, and unveiling unprecedented opportunities. Brooks skillfully navigates the complexities of the digital age, shedding light on the potential disruptions to commerce and the critical infrastructures at the heart of society. He addresses the pivotal cybersecurity concerns that businesses, from startups to multinational corporations, must anticipate in the face of rapid technological evolution. With an emphasis on clarity and comprehension, Inside Cyber eschews technical jargon, making the subject matter accessible to a broad audience, including managers, directors, technology enthusiasts, and anyone intrigued by the interplay between technology, business, and society. This insightful exploration serves not only as an indispensable resource for business leaders and entrepreneurs but also as a vital addition to the collection of anyone eager to understand the dynamics of digital transformation in our world today
Contenu
Preface ix
Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity 1
Five Reasons for the Increase in Cyberattacks 3
Cyber Wake-Up Calls, Breaches, and the Need to Catch Up 6
Chapter 2 Cyber Threats, Targets, and Digital Convergence 9
The Root of the Security Problem Explained 9
Cyber Safety: The Nature of the Problem 10
Cyber Solutions for the New Digital Ecosystem 12
Chapter 3 Common Cyber Threats and Defensive Tools 15
Social Engineering and Identity Theft 16
Phishing 18
Ransomware 21
Botnets 24
DDoS Attacks 26
Chapter 4 Cyber Threat Targets 29
Software Supply Chains 29
Internet of Things and Mobility 31
Insider Threats 32
The Cloud 34
Critical Infrastructure Protection 36
The Convergence Supply Chain for IT and OT 39
Chapter 5 Cybersecurity and Digital Transformation 43
Chapter 6 Artificial Intelligence: What Is It? 47
Chapter 7 Types of Artificial Intelligence 49
Chapter 8 Some Subdomains of Artificial Intelligence 51
Chapter 9 Big Data and Data Analytics 55
Chapter 10 Generative Artificial Intelligence 59
Industry Competing in Developing Generative AI 61
Optimizing the Supply Chain 62
Applications of AI in Supply Chain Management for Business Scalability 63
Mind-Blowing Generative AI Statistics 64
Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics 67
AI and ML for Analytics 68
The State of AI in Business 70
Chapter 12 How Artificial Intelligence Can Help Cybersecurity 79
Mitigating AI Threats 83
Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin 89
Evolution of Threats in the Age of AI 90
AI-Generated Polymorphic Malware 94
The Employees, Risk of Using AI 96
AI-Generated Deepfakes 96
AI Is Also Being Used by Hackers to Break Passwords More Quickly 100
Chapter 14 Responding to Artificial Intelligence Cyber Threats 103
Generative AI for Cyber Defense 110
AI Security at the Hardware Level 112
Chapter 15 Artificial Intelligence and Privacy 115
Health Care and Privacy 117
Chapter 16 Artificial Intelligence and Ethics 119
Computer Vision: Creating an Ethical Framework 121
Governmental Roles in Regulating AI 122
AI and the Prospects for the Future 130
Chapter 17 The Interface Between Humans and Computers 141
Biology of Humans and Machines 144
Chapter 18 Artificial Intelligence and Health Care 147
Cyber Threats 147
AI Transforming Health Care 148
Chapter 19 The Internet of Things 151
What Is the Internet of Things? 151
Attack Vulnerability of the Internet of Things 153
Standard and Regulations for IoT 154
Smart Cities 155
Chapter 20 5g 159
Chapter 21 Quantum Computing 163
Chapter 22 Quantum Technologies and Cybersecurity 167
Quantum Computing Is Already Here in Some Forms 169
Chapter 23 Quantum Internet of Things 173
Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management 177
Chapter 25 The Urgency of Having a Cyber Risk Management Plan 181
The NIST Framework 183
New Securities Exchange Corporation Cybersecurity Regulations 183
Risk Management Pillars for the New Technological Era 184
Risk Management Strategies at the Organizational Level 187
All-Inclusive Approach to Risk Management 188
Tools to Help Enable Cyber Risk Management: Encryption and Cryptography 189
Digital Conversion Tools 189
Cybersecurity Equals Economic Resilience 190
The Need for Government and Industry Cooperation 191
Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future 195
Notes 197
Acknowledgments 217
About the Author 219
Index 221