Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Generative AI: Phishing and Cybersecurity Metrics/ Ravindra Das.

By: Material type: TextTextPublisher: Boca Raton: CRC Press, ©2025Edition: 1st editionDescription: xv, 280 p. : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781032822686
Subject(s): DDC classification:
  • 23 005.8 DRG
Contents:
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Main library Computers & Information Technology ( General ) 005.8 DRG (Browse shelf(Opens below)) C.1 Available 00017628

The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.

The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.

But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:

A review of phishing
A review of AI, Neural Networks, and Machine Learning
A review of Natural Language Processing, Generative AI, and the Digital Person
A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts

Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.

There are no comments on this title.

to post a comment.