Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation

· · ·
· Springer Nature
Ebook
326
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes – which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies.

Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments’ approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.

About the author

Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate levels, full and part-time and supervised and examined research students at the MPhil and PhD levels and Doctorate in Professional Studies (DProf). Hamid’s teaching has covered a broad range of computing modules in particular information security management, information security risk and audit, digital forensics, systems design and development, telecommunications and networking, and computer systems. Hamid’s principal research area for a number of years has been in the field of information security management and digital forensics.

Dr. Gordon Bowen has a Doctorate in Business (University of Hull) and is a chartered marketer from the Chartered Institute of Marketing (UK). He is an associate professor in Management at Anglia Ruskin University and works as an associate lecturer at various universities and higher education institutions, including Warwick University, University of Gloucestershire, Northumbria University, Cumbria University, Regent’s University London, Ulster University, University of Hertfordshire, University of Wales Trinity St. David, and Grenoble Graduate Business School. His research interests are strategy, marketing, digital marketing, and SMEs, and he supervises PhD and DBA students in these areas. Gordon has many completions at PhD and DBA. Gordon has reviewed articles for journals and conferences including MDPI Sustainability, European Academy of Management Conference, and International Journal of Technology Management. He has published 5 edited books on social media and cybersecurity and AI, which are recognised internationally.

Dr. Saeed Sharif is the leader of Intelligent Technologies Research Group and a course leader for MSc Computer Science with Industrial Placement at the School of Architecture, Computing, and Engineering. He has a PhD in artificial intelligence from Brunel University London. He is working closelypolicy makers nationally and internationally to improve the strategic systems. He has led the research development of different research projects associated with many industries. He has developed his research with the goal of improving the effectiveness, and efficiency of medical and health care systems. Dr. Saeed has published a significant number of research articles in highly reputable journals, international conferences, and book chapters, such as Elsevier Applied Soft Computing, Computer Methods and Programs in Biomedicine, IEEE Access, etc.

Osama Hussein is a security engineer and cybersecurity graduate student at Northumbria University. He holds an ISC^2 CC certificate and is an IBM AI Associate with a strong academic background in network engineering from the German University in Cairo. His research interests include post-quantum secure network protocols, information governance and cyber security, wireless network security, ethical hacking, and information assurance and risk management. As a security engineer, he has experience designing and implementing network security infrastructure, including VPN tunnels, ACLs, firewalls, intrusion prevention and detection systems, antivirus, and SIEM tools. He is skilled in device security hardening, internal and external routing, and site administration and has worked with Cisco and FortiGate devices.


Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.