Generative AI: Phishing and Cybersecurity Metrics
The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For exam...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; Abingdon
CRC Press, Taylor & Francis
[2025]
|
Schriftenreihe: | Cyber Shorts Series
|
Schlagworte: | |
Zusammenfassung: | The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:- A review of phishing- A review of AI, Neural Networks, and Machine Learning- A review of Natural Language Processing, Generative AI, and the Digital Person- A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts |
Beschreibung: | 165 Seiten 326 gr |
ISBN: | 9781032822686 9781032820965 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049916785 | ||
003 | DE-604 | ||
005 | 20241119 | ||
007 | t| | ||
008 | 241021s2025 xx |||| 00||| eng d | ||
020 | |a 9781032822686 |c pbk |9 978-1-032-82268-6 | ||
020 | |a 9781032820965 |9 978-1-032-82096-5 | ||
024 | 3 | |a 9781032822686 | |
035 | |a (DE-599)BVBBV049916785 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Das, Ravindra |e Verfasser |0 (DE-588)1100570306 |4 aut | |
245 | 1 | 0 | |a Generative AI |b Phishing and Cybersecurity Metrics |c Ravindra Das |
264 | 1 | |a Boca Raton ; Abingdon |b CRC Press, Taylor & Francis |c [2025] | |
300 | |a 165 Seiten |c 326 gr | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Cyber Shorts Series | |
520 | |a The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:- A review of phishing- A review of AI, Neural Networks, and Machine Learning- A review of Natural Language Processing, Generative AI, and the Digital Person- A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts | ||
650 | 4 | |a bicssc / Artificial intelligence | |
650 | 4 | |a bicssc / Legal aspects of IT | |
650 | 4 | |a bicssc / Computer architecture & logic design | |
650 | 4 | |a bicssc / Computer networking & communications | |
650 | 4 | |a bicssc / Automatic control engineering | |
650 | 4 | |a bicssc / Criminology - legal aspects | |
650 | 4 | |a bicssc / Causes & prevention of crime | |
650 | 4 | |a bisacsh / COMPUTERS / Artificial Intelligence / General | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Network Security | |
650 | 4 | |a bisacsh / COMPUTERS / Internet / Online Safety & Privacy | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 0 | 2 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-003-50378-1 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035255442 |
Datensatz im Suchindex
_version_ | 1816163536022274048 |
---|---|
adam_text | |
any_adam_object | |
author | Das, Ravindra |
author_GND | (DE-588)1100570306 |
author_facet | Das, Ravindra |
author_role | aut |
author_sort | Das, Ravindra |
author_variant | r d rd |
building | Verbundindex |
bvnumber | BV049916785 |
ctrlnum | (DE-599)BVBBV049916785 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049916785</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241119</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241021s2025 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032822686</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-032-82268-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032820965</subfield><subfield code="9">978-1-032-82096-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032822686</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049916785</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Ravindra</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1100570306</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Generative AI</subfield><subfield code="b">Phishing and Cybersecurity Metrics</subfield><subfield code="c">Ravindra Das</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; Abingdon</subfield><subfield code="b">CRC Press, Taylor & Francis</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">165 Seiten</subfield><subfield code="c">326 gr</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cyber Shorts Series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:- A review of phishing- A review of AI, Neural Networks, and Machine Learning- A review of Natural Language Processing, Generative AI, and the Digital Person- A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer architecture & logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer networking & communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Automatic control engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Criminology - legal aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Causes & prevention of crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Artificial Intelligence / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-003-50378-1</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035255442</subfield></datafield></record></collection> |
id | DE-604.BV049916785 |
illustrated | Not Illustrated |
indexdate | 2024-11-19T15:01:58Z |
institution | BVB |
isbn | 9781032822686 9781032820965 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035255442 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | 165 Seiten 326 gr |
publishDate | 2025 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press, Taylor & Francis |
record_format | marc |
series2 | Cyber Shorts Series |
spelling | Das, Ravindra Verfasser (DE-588)1100570306 aut Generative AI Phishing and Cybersecurity Metrics Ravindra Das Boca Raton ; Abingdon CRC Press, Taylor & Francis [2025] 165 Seiten 326 gr txt rdacontent n rdamedia nc rdacarrier Cyber Shorts Series The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:- A review of phishing- A review of AI, Neural Networks, and Machine Learning- A review of Natural Language Processing, Generative AI, and the Digital Person- A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts bicssc / Artificial intelligence bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Automatic control engineering bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Phishing (DE-588)7515821-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Phishing (DE-588)7515821-8 s Künstliche Intelligenz (DE-588)4033447-8 s DE-604 Erscheint auch als Online-Ausgabe 978-1-003-50378-1 |
spellingShingle | Das, Ravindra Generative AI Phishing and Cybersecurity Metrics bicssc / Artificial intelligence bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Automatic control engineering bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)7515821-8 (DE-588)4274324-2 |
title | Generative AI Phishing and Cybersecurity Metrics |
title_auth | Generative AI Phishing and Cybersecurity Metrics |
title_exact_search | Generative AI Phishing and Cybersecurity Metrics |
title_full | Generative AI Phishing and Cybersecurity Metrics Ravindra Das |
title_fullStr | Generative AI Phishing and Cybersecurity Metrics Ravindra Das |
title_full_unstemmed | Generative AI Phishing and Cybersecurity Metrics Ravindra Das |
title_short | Generative AI |
title_sort | generative ai phishing and cybersecurity metrics |
title_sub | Phishing and Cybersecurity Metrics |
topic | bicssc / Artificial intelligence bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Automatic control engineering bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | bicssc / Artificial intelligence bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Automatic control engineering bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz Phishing Computersicherheit |
work_keys_str_mv | AT dasravindra generativeaiphishingandcybersecuritymetrics |