Discover how to navigate the intersection of tech, cybersecurity, and commerce
In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
In the book, you'll:
- Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world
- Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress
- Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value
Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide.
Table of Contents
Preface ix
Chapter 1 An Overview of Our Merged Physical and Digital Worlds and Cybersecurity 1
Five Reasons for the Increase in Cyberattacks 3
Cyber Wake-Up Calls, Breaches, and the Need to Catch Up 6
Chapter 2 Cyber Threats, Targets, and Digital Convergence 9
The Root of the Security Problem Explained 9
Cyber Safety: The Nature of the Problem 10
Cyber Solutions for the New Digital Ecosystem 12
Chapter 3 Common Cyber Threats and Defensive Tools 15
Social Engineering and Identity Theft 16
Phishing 18
Ransomware 21
Botnets 24
DDoS Attacks 26
Chapter 4 Cyber Threat Targets 29
Software Supply Chains 29
Internet of Things and Mobility 31
Insider Threats 32
The Cloud 34
Critical Infrastructure Protection 36
The Convergence Supply Chain for IT and OT 39
Chapter 5 Cybersecurity and Digital Transformation 43
Chapter 6 Artificial Intelligence: What Is It? 47
Chapter 7 Types of Artificial Intelligence 49
Chapter 8 Some Subdomains of Artificial Intelligence 51
Chapter 9 Big Data and Data Analytics 55
Chapter 10 Generative Artificial Intelligence 59
Industry Competing in Developing Generative AI 61
Optimizing the Supply Chain 62
Applications of AI in Supply Chain Management for Business Scalability 63
Mind-Blowing Generative AI Statistics 64
Chapter 11 The State of Artificial Intelligence and Smart Cybersecurity: Some Insights and Statistics 67
AI and ML for Analytics 68
The State of AI in Business 70
Chapter 12 How Artificial Intelligence Can Help Cybersecurity 79
Mitigating AI Threats 83
Chapter 13 The Other Side of the Artificial Intelligence Cyber Coin 89
Evolution of Threats in the Age of AI 90
AI-Generated Polymorphic Malware 94
The Employees, Risk of Using AI 96
AI-Generated Deepfakes 96
AI Is Also Being Used by Hackers to Break Passwords More Quickly 100
Chapter 14 Responding to Artificial Intelligence Cyber Threats 103
Generative AI for Cyber Defense 110
AI Security at the Hardware Level 112
Chapter 15 Artificial Intelligence and Privacy 115
Health Care and Privacy 117
Chapter 16 Artificial Intelligence and Ethics 119
Computer Vision: Creating an Ethical Framework 121
Governmental Roles in Regulating AI 122
AI and the Prospects for the Future 130
Chapter 17 The Interface Between Humans and Computers 141
Biology of Humans and Machines 144
Chapter 18 Artificial Intelligence and Health Care 147
Cyber Threats 147
AI Transforming Health Care 148
Chapter 19 The Internet of Things 151
What Is the Internet of Things? 151
Attack Vulnerability of the Internet of Things 153
Standard and Regulations for IoT 154
Smart Cities 155
Chapter 20 5g 159
Chapter 21 Quantum Computing 163
Chapter 22 Quantum Technologies and Cybersecurity 167
Quantum Computing Is Already Here in Some Forms 169
Chapter 23 Quantum Internet of Things 173
Chapter 24 The Holy Digital Grail: Cybersecurity Risk Management 177
Chapter 25 The Urgency of Having a Cyber Risk Management Plan 181
The NIST Framework 183
New Securities Exchange Corporation Cybersecurity Regulations 183
Risk Management Pillars for the New Technological Era 184
Risk Management Strategies at the Organizational Level 187
All-Inclusive Approach to Risk Management 188
Tools to Help Enable Cyber Risk Management: Encryption and Cryptography 189
Digital Conversion Tools 189
Cybersecurity Equals Economic Resilience 190
The Need for Government and Industry Cooperation 191
Conclusion: Emerging Technologies, Cybersecurity, and Our Digital Future 195
Notes 197
Acknowledgments 217
About the Author 219
Index 221