Inside Cyber How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security

"In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned...

Descripción completa

Detalles Bibliográficos
Otros Autores: Brooks, Chuck (Writer of Inside cyber), author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2025]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009853633406719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity
  • Five Reasons for the Increase in Cyberattacks
  • Cyber Wake-Up Calls, Breaches, and the Need to Catch Up
  • Chapter 2 Cyber Threats, Targets, and Digital Convergence
  • The Root of the Security Problem Explained
  • Cyber Safety: The Nature of the Problem
  • Cyber Solutions for the New Digital Ecosystem
  • Chapter 3 Common Cyber Threats and Defensive Tools
  • Social Engineering and Identity Theft
  • Phishing
  • Ransomware
  • Botnets
  • DDoS Attacks
  • Chapter 4 Cyber Threat Targets
  • Software Supply Chains
  • Internet of Things and Mobility
  • Insider Threats
  • The Cloud
  • Critical Infrastructure Protection
  • The Convergence Supply Chain for IT and OT
  • Chapter 5 Cybersecurity and Digital Transformation
  • Chapter 6 Artificial Intelligence: What Is It?
  • Chapter 7 Types of Artificial Intelligence
  • Chapter 8 Some Subdomains of Artificial Intelligence
  • Chapter 9 Big Data and Data Analytics
  • Chapter 10 Generative Artificial Intelligence
  • Industry Competing in Developing Generative AI
  • Optimizing the Supply Chain
  • Applications of AI in Supply Chain Management for Business Scalability
  • Mind-Blowing Generative AI Statistics
  • Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics
  • AI and ML for Analytics
  • The State of AI in Business
  • AI Priorities and Plans
  • AI Market Statistics
  • AI Growth
  • Obstacles to AI Adoption
  • Benefits of AI Adoption
  • Impact of AI on Jobs and the Employment Market
  • ML and AI Stats
  • Voice Search and AI Stats
  • Virtual Assistants
  • AI in the Retail Industry
  • AI in Customer Service
  • Chatbots and AI Facts and Figures
  • AI in Marketing and Sales.
  • Chapter 12 How Artificial Intelligence Can Help Cybersecurity
  • Mitigating AI Threats
  • Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin
  • Evolution of Threats in the Age of AI
  • AI-Generated Polymorphic Malware
  • The Employees, Risk of Using AI
  • AI-Generated Deepfakes
  • AI Is Also Being Used by Hackers to Break Passwords More Quickly
  • Chapter 14 Responding to Artificial Intelligence Cyber Threats
  • Generative AI for Cyber Defense
  • Real-Time Threat Detection
  • Improving the Awareness of Potential Threats
  • Patching Security Flaws Automatically
  • Enhancing the Reaction and Responses to Incidents
  • AI Security at the Hardware Level
  • Chapter 15 Artificial Intelligence and Privacy
  • Health Care and Privacy
  • Chapter 16 Artificial Intelligence and Ethics
  • Computer Vision: Creating an Ethical Framework
  • Governmental Roles in Regulating AI
  • The US Government
  • Chief Digital Officer Roles for AI
  • AI and the Prospects for the Future
  • Affective Computing and the Exploration of Language Models
  • Mimicking Neural Networks of the Human Brain
  • How Fast Will AI Advance?
  • Investments in AI Are Soaring
  • AI and the Fusion of Other Technologies
  • Chapter 17 The Interface Between Humans and Computers
  • Biology of Humans and Machines
  • Chapter 18 Artificial Intelligence and Health Care
  • Cyber Threats
  • AI Transforming Health Care
  • Chapter 19 The Internet of Things
  • What Is the Internet of Things?
  • Attack Vulnerability of the Internet of Things
  • Standard and Regulations for IoT
  • Smart Cities
  • Chapter 20 5G
  • Chapter 21 Quantum Computing
  • Chapter 22 Quantum Technologies and Cybersecurity
  • Quantum Computing Is Already Here in Some Forms
  • Chapter 23 Quantum Internet of Things
  • Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management.
  • Chapter 25 The Urgency of Having a Cyber Risk Management Plan
  • The NIST Framework
  • New Securities Exchange Corporation Cybersecurity Regulations
  • Risk Management Pillars for the New Technological Era
  • Risk Management Strategies at the Organizational Level
  • All-Inclusive Approach to Risk Management
  • Tools to Help Enable Cyber Risk Management: Encryption and Cryptography
  • Digital Conversion Tools
  • Cybersecurity Equals Economic Resilience
  • The Need for Government and Industry Cooperation
  • Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future
  • Notes
  • Acknowledgments
  • About the Author
  • Index
  • EULA.