- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization's cyber defenses to meet today's evolving threat landscape
In The AI Cybersecurity Handbook, author Caroline Wong examines AI's impact on both offensive and defensive cybersecurity strategies. Wong explains how artificial intelligence has transformed the way cyberattacks are carried out and how technology professionals prepare for and defend against them.
On the offensive side, the author explores how AI is being used to automate, accelerate, and personalize attacks against targets. She shows you how these technologies make cyberattacks cheaper to carry out, harder to detect, and easier to automate at scale--broadening the impact beyond initial targets to include partners, third parties, and critical connected systems.
For defenders, this book demonstrates how to use AI to evolve past traditional, rules-based cybersecurity defense to an adaptive model that evolves in real-time to counteract emergent risks and novel attack vectors. These new systems rely on continuously updated data inputs and form resilient bulwarks against formidable threats.
Inside the book:
Hands-on strategies for minimizing operational barriers to AI implementation to enable new capabilities for defenders and allow for the use of powerful tools, like smart data enrichment, AI-powered query engines, and self-initiating security actions
Up-to-date discussions of how to use AI to accelerate your cybersecurity responses while improving their accuracy, including anomaly detection, threat identification, and dynamic mitigation processes
Expert advice for building resilient AI-enabled cybersecurity without compromising on AI ethics
Perfect for cybersecurity professionals, IT managers, developers and business leaders looking for actionable guidance on the integration of AI into their IT security practices, The AI Cybersecurity Handbook offers accessible strategies well-suited to people with varying levels of technical expertise. It's a must-read book for everyone with a stake in safeguarding digital assets.
Contents
Preface xi
Acknowledgments xiii
Introduction xv
PART I: CYBER'S NEW PLAYER: AI ON BOTH TEAMS 1
Chapter 1: The Age of Adaptive Adversaries: AI's Impact on the Security Balance of Power 3
Chapter 2: Smarter, Faster, Cheaper Recon: What Hackers Know Before You Even Notice 15
Chapter 3: Polymorphic to Predictive: How AI Supercharges Malware at Machine Speed 31
Chapter 4: Breaking the Rules: Novel Attacks and the Limits of Signature Detection 53
Chapter 5: Hyper-real, Hyper-targeted: Deepfakes, Phishing, and AI-powered Deception 79
PART II: BUILDING RESILIENCE WITH AI 97
Chapter 6: Patterns of Life: Learning What's Normal and Spotting What's Not 99
Chapter 7: From Alert to Containment—AI-augmented Incident Response 127
Chapter 8: The Illusion of Trust: Poisoned Data, Tampered Models, and AI Supply Chain Risk 153
Chapter 9: Building Secure Model Supply Chains with AI-augmented Security Teams 181
PART III: STAYING GROUNDED: TRUST, RISK, AND ACCOUNTABILITY 205
Chapter 10: Human Values, Machine Decisions: The Ethics of AI in Security 207
Chapter 11: The Human Advantage: Leadership, Learning, and the Future of AI Security 225
Index 239



