-
Book Overview & Buying
-
Table Of Contents
Cybersecurity Beginner's Guide
By :
A
Acceptable Use Policies (AUPs) 70
accusation audit 164
Active Directory 150
administrative controls 69
cybersecurity training program 70, 71
data breaches, preventing 70
incident response plans 71
phishing awareness training 71
security policies and procedures 69
Advanced Encryption Standard (AES) 68
advanced persistent threats (APTs) 45, 137
cyber threat intelligence market, shaping 46
naming conventions 47, 48
Advanced Research Projects Agency Network (ARPANET) 6
adversarial AI 105
adversarial image recognition 107
AI-generated phishing attacks 106
attackers 108
Deepfake technology 106
defenders 108
effectiveness 107
North Korean employment scams 107
adversarial image recognition 107
adversarial machine learning 106
data poisoning 106
evasion attacks 106
model inversion 106
AI-generated phishing attacks 106
AI/ML, in cybersecurity 102
applications 103
...