Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
"In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2025]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009853633406719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity
- Five Reasons for the Increase in Cyberattacks
- Cyber Wake-Up Calls, Breaches, and the Need to Catch Up
- Chapter 2 Cyber Threats, Targets, and Digital Convergence
- The Root of the Security Problem Explained
- Cyber Safety: The Nature of the Problem
- Cyber Solutions for the New Digital Ecosystem
- Chapter 3 Common Cyber Threats and Defensive Tools
- Social Engineering and Identity Theft
- Phishing
- Ransomware
- Botnets
- DDoS Attacks
- Chapter 4 Cyber Threat Targets
- Software Supply Chains
- Internet of Things and Mobility
- Insider Threats
- The Cloud
- Critical Infrastructure Protection
- The Convergence Supply Chain for IT and OT
- Chapter 5 Cybersecurity and Digital Transformation
- Chapter 6 Artificial Intelligence: What Is It?
- Chapter 7 Types of Artificial Intelligence
- Chapter 8 Some Subdomains of Artificial Intelligence
- Chapter 9 Big Data and Data Analytics
- Chapter 10 Generative Artificial Intelligence
- Industry Competing in Developing Generative AI
- Optimizing the Supply Chain
- Applications of AI in Supply Chain Management for Business Scalability
- Mind-Blowing Generative AI Statistics
- Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics
- AI and ML for Analytics
- The State of AI in Business
- AI Priorities and Plans
- AI Market Statistics
- AI Growth
- Obstacles to AI Adoption
- Benefits of AI Adoption
- Impact of AI on Jobs and the Employment Market
- ML and AI Stats
- Voice Search and AI Stats
- Virtual Assistants
- AI in the Retail Industry
- AI in Customer Service
- Chatbots and AI Facts and Figures
- AI in Marketing and Sales.
- Chapter 12 How Artificial Intelligence Can Help Cybersecurity
- Mitigating AI Threats
- Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin
- Evolution of Threats in the Age of AI
- AI-Generated Polymorphic Malware
- The Employees, Risk of Using AI
- AI-Generated Deepfakes
- AI Is Also Being Used by Hackers to Break Passwords More Quickly
- Chapter 14 Responding to Artificial Intelligence Cyber Threats
- Generative AI for Cyber Defense
- Real-Time Threat Detection
- Improving the Awareness of Potential Threats
- Patching Security Flaws Automatically
- Enhancing the Reaction and Responses to Incidents
- AI Security at the Hardware Level
- Chapter 15 Artificial Intelligence and Privacy
- Health Care and Privacy
- Chapter 16 Artificial Intelligence and Ethics
- Computer Vision: Creating an Ethical Framework
- Governmental Roles in Regulating AI
- The US Government
- Chief Digital Officer Roles for AI
- AI and the Prospects for the Future
- Affective Computing and the Exploration of Language Models
- Mimicking Neural Networks of the Human Brain
- How Fast Will AI Advance?
- Investments in AI Are Soaring
- AI and the Fusion of Other Technologies
- Chapter 17 The Interface Between Humans and Computers
- Biology of Humans and Machines
- Chapter 18 Artificial Intelligence and Health Care
- Cyber Threats
- AI Transforming Health Care
- Chapter 19 The Internet of Things
- What Is the Internet of Things?
- Attack Vulnerability of the Internet of Things
- Standard and Regulations for IoT
- Smart Cities
- Chapter 20 5G
- Chapter 21 Quantum Computing
- Chapter 22 Quantum Technologies and Cybersecurity
- Quantum Computing Is Already Here in Some Forms
- Chapter 23 Quantum Internet of Things
- Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management.
- Chapter 25 The Urgency of Having a Cyber Risk Management Plan
- The NIST Framework
- New Securities Exchange Corporation Cybersecurity Regulations
- Risk Management Pillars for the New Technological Era
- Risk Management Strategies at the Organizational Level
- All-Inclusive Approach to Risk Management
- Tools to Help Enable Cyber Risk Management: Encryption and Cryptography
- Digital Conversion Tools
- Cybersecurity Equals Economic Resilience
- The Need for Government and Industry Cooperation
- Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future
- Notes
- Acknowledgments
- About the Author
- Index
- EULA.