Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Spencer Bower and Handley: Res Judicata

Spencer Bower and Handley: Res Judicata

Price: £449.99

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION Pre-order The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Generative AI: Phishing And Cybersecurity Metrics


ISBN13: 9781032822686
To be Published: October 2024
Publisher: CRC Press
Country of Publication: USA
Format: Paperback
Price: £19.99



The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks.

But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it is almost to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website.

But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:

  • A review of Phishing
  • A review of AI, Neural Networks, and Machine Learning
  • A review of Natural Language Processing, Generative AI, and the Digital Person
  • A Proposed Solution as to how Generative AI can combat Phishing Attacks, as they relate to Privileged Access Accounts.

Subjects:
IT, Internet and Artificial Intelligence Law
Contents:
Chapter 1 INTRODUCTION TO PHISHING
Chapter 2 AN OVERVIEW INTO ARTIFICIAL INTELLIGENCE, NEURALNETWORKS, AND MACHINE LEARNING
Chapter 3 INTRODUCTION TO GENERATIVE AI, NATURAL LANGUAGE PROCESSING, AND THE DIGITAL PERSON
Chapter 4 REVIEW OF CYBERSECURITY METRICS
Chapter 5 CONCLUSIONS
Index