机读格式显示(MARC)
- 000 02133cam a2200361 i 4500
- 008 250421s2025 flua e b 001 0 eng
- 020 __ |a 9781032822686 |q (paperback)
- 020 __ |a 1032822686 |q (paperback)
- 020 __ |a 9781032820965 |q (hardback)
- 020 __ |a 1032820969 |q (hardback)
- 020 __ |z 9781003503781 |q (ebook)
- 040 __ |a DLC |b eng |e rda |c DLC |d OCLCO |d IG# |d IHY |d WBT
- 050 00 |a QA76.9.A25 |b D346 2025
- 082 00 |a 005.8 |2 23/eng/20240725
- 100 1_ |a Das, Ravindra, |e author.
- 245 10 |a Generative AI : |b phishing and cybersecurity metrics / |c Ravindra Das.
- 260 __ |a Boca Raton : |b CRC Press, |c 2025.
- 300 __ |a ix, 165 pages : |b illustrations ; |c 24 cm.
- 336 __ |a text |b txt |2 rdacontent
- 337 __ |a unmediated |b n |2 rdamedia
- 338 __ |a volume |b nc |2 rdacarrier
- 504 __ |a Includes bibliographical references and index.
- 520 __ |a "The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks. But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it difficult to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book"-- |c Provided by publisher.
- 650 _0 |a Computer security.
- 650 _0 |a Phishing |x Prevention.
- 650 _0 |a Artificial intelligence.