Description |
1 online resource (x, 301 pages) : illustrations (some color) |
Contents |
Intro -- Preface -- Contents -- Contributors -- Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- 1 Introduction -- 2 Artificial Intelligence and Machine Learning -- 3 Cybersecurity -- 4 Artificial Intelligence and Cybersecurity Solutions -- 4.1 AI2 -- 4.2 CylanceProtect -- 4.3 Darktrace -- 4.3.1 Darktrace Enterprise Immune System (EIS) -- 4.3.2 Darktrace Cyber AI Analyst -- 4.3.3 Darktrace Antigena -- 4.4 Amazon Macie -- 4.5 Deep Instinct -- 4.6 SparkCognition DeepArmor -- 4.7 Vectra Cognito Threat Detection and Response Platform |
|
4.8 IBM Maas360 -- 4.9 IBM QRadar Advisor with Watson -- 4.10 IBM QRadar UBA -- 5 Conclusion -- References -- A Review of Cyber Threat (Artificial) Intelligence in Security Management -- 1 Introduction -- 2 Security Management -- 3 Overview of Cyber Threat Intelligence -- 3.1 Cyber Threat Sources: Gathering the Haystacks -- 3.2 Artificial Intelligence and Cyber Threats: Finding the Needles -- 4 Security Management with AI-Driven CTI -- 4.1 Strategic -- 4.2 Operational -- 4.3 Tactical -- 5 Future Directions -- 6 Conclusion -- References |
|
Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components -- 1 Introduction -- 2 Defining the Threat -- 2.1 Security Modeling Considerations -- 2.1.1 Adversarial Capabilities -- 2.1.2 Adversarial Goals -- 2.1.3 Security Goals -- 2.2 Adversarial Destabilization of Military AI Systems -- 2.3 Model Driven Engineering for Safety and Security -- 3 A Model Driven Methodology for Resilience -- 3.1 A Metamodel for Basic Resilience Modelling -- 3.2 Simple Example -- 4 Case Study -- 4.1 Case Study Definition |
|
4.2 Resilience Models for the Case Study -- 5 Conclusion and Discussion -- References -- Automation of Cybersecurity Work -- 1 Introduction -- 2 Cybersecurity Automation Research -- 2.1 Variables That Influence Automation in General -- 2.2 Variables That Influence Automation of Cybersecurity Work -- 3 Method -- 3.1 The Content of Cybersecurity Tasks -- 3.2 Assessment Criteria -- 3.3 Assessment Process -- 3.4 Aggregation and Analysis -- 4 Results -- 4.1 Scenarios -- 5 Discussion -- 5.1 Limitations -- 5.1.1 Descriptions of Cybersecurity Work -- 5.1.2 The Assessments -- 5.1.3 The Aggregation |
|
5.2 Other Important Variables -- 5.2.1 Market Potential -- 5.2.2 Intent and Ability -- 5.2.3 Ethical and Legal Issues -- 5.3 Will Automation Improve Cybersecurity? -- 5.4 Effects on the Labor Market -- 6 Conclusions -- 6.1 What Variables Affect How Hard a Cybersecurity Role Is to Automate? -- 6.2 How Likely Is It That Current Cybersecurity Roles Will Be Automated? -- 6.3 What Variables Constrain the Potential for Automation of Today's Cybersecurity Roles? -- References -- Artificial Intelligence for Cybersecurity Education and Training -- 1 Introduction -- 2 Cybersecurity Education and Training |
Summary |
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed December 30, 2022) |
Subject |
Artificial intelligence -- Industrial applications
|
|
Computer security.
|
|
Artificial intelligence -- Industrial applications
|
|
Computer security
|
Form |
Electronic book
|
Author |
Sipola, Tuomo, editor
|
|
Kokkonen, Tero, editor
|
|
Karjalainen, Mika, editor.
|
ISBN |
9783031150302 |
|
3031150309 |
|