語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The cybersecurity trinityartificial ...
~
SpringerLink (Online service)
The cybersecurity trinityartificial intelligence, automation, and active cyber defense /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The cybersecurity trinityby Donnie W. Wendt.
其他題名:
artificial intelligence, automation, and active cyber defense /
作者:
Wendt, Donnie W.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xxvi, 396 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/979-8-8688-0947-7
ISBN:
9798868809477$q(electronic bk.)
The cybersecurity trinityartificial intelligence, automation, and active cyber defense /
Wendt, Donnie W.
The cybersecurity trinity
artificial intelligence, automation, and active cyber defense /[electronic resource] :by Donnie W. Wendt. - Berkeley, CA :Apress :2024. - xxvi, 396 p. :ill., digital ;24 cm.
Chapter 1: AI is Everywhere -- Chapter 2: Overview of AI and ML -- Chapter 3: AI for Defense -- Chapter 4: ML in an Adversarial Environment -- Chapter 5: Combatting AI Threats -- Chapter 6: The Need for Speed - The Driving Forces of Security Automation -- Chapter 7: The OODA Loop -- Chapter 8: Common SOAR Use Cases -- Chapter 9: Strategies for Success (and Failure) -- Chapter 10: Active Cyber Defense -- Chapter 11: The OODA Loop Revisited -- Chapter 12: Deception -- Chapter 13: The Cybersecurity Trinity.
This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker.
ISBN: 9798868809477$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0947-7doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
The cybersecurity trinityartificial intelligence, automation, and active cyber defense /
LDR
:04598nmm a2200349 a 4500
001
673719
003
DE-He213
005
20241212120758.0
006
m d
007
cr nn 008maaau
008
250422s2024 cau s 0 eng d
020
$a
9798868809477$q(electronic bk.)
020
$a
9798868809460$q(paper)
024
7
$a
10.1007/979-8-8688-0947-7
$2
doi
035
$a
979-8-8688-0947-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W473 2024
100
1
$a
Wendt, Donnie W.
$3
987312
245
1 4
$a
The cybersecurity trinity
$h
[electronic resource] :
$b
artificial intelligence, automation, and active cyber defense /
$c
by Donnie W. Wendt.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxvi, 396 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: AI is Everywhere -- Chapter 2: Overview of AI and ML -- Chapter 3: AI for Defense -- Chapter 4: ML in an Adversarial Environment -- Chapter 5: Combatting AI Threats -- Chapter 6: The Need for Speed - The Driving Forces of Security Automation -- Chapter 7: The OODA Loop -- Chapter 8: Common SOAR Use Cases -- Chapter 9: Strategies for Success (and Failure) -- Chapter 10: Active Cyber Defense -- Chapter 11: The OODA Loop Revisited -- Chapter 12: Deception -- Chapter 13: The Cybersecurity Trinity.
520
$a
This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker.
650
0
$a
Computer security.
$3
184416
650
0
$a
Artificial intelligence
$x
Security measures.
$3
925009
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Artificial Intelligence.
$3
212515
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0947-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000250359
電子館藏
1圖書
電子書
EB QA76.9.A25 W473 2024 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0947-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入