LEADER 06025nam 22006615 450 001 996465447703316 005 20220208220752.0 010 $a3-030-35746-5 024 7 $a10.1007/978-3-030-35746-7 035 $a(CKB)4100000011208615 035 $a(MiAaPQ)EBC6167093 035 $a(DE-He213)978-3-030-35746-7 035 $a(PPN)243761562 035 $a(EXLCZ)994100000011208615 100 $a20200406d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Defence in the Age of AI, Smart Societies and Augmented Humanity$b[electronic resource] /$fedited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (viii, 450 pages) $cillustrations 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 311 $a3-030-35745-7 320 $aIncludes bibliographical references. 327 $aForeword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building?s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat. 330 $aThis publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touching on the tactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 606 $aArtificial intelligence 606 $aBig data 606 $aComputer security 606 $aSystem safety 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aBig Data$3https://scigraph.springernature.com/ontologies/product-market-codes/I29120 606 $aPrivacy$3https://scigraph.springernature.com/ontologies/product-market-codes/I28010 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aArtificial intelligence. 615 0$aBig data. 615 0$aComputer security. 615 0$aSystem safety. 615 14$aArtificial Intelligence. 615 24$aBig Data. 615 24$aPrivacy. 615 24$aSecurity Science and Technology. 676 $a005.8 702 $aJahankhani$b Hamid$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKendzierskyj$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChelvachandran$b Nishan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIbarra$b Jaime$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465447703316 996 $aCyber Defence in the Age of AI, Smart Societies and Augmented Humanity$92004358 997 $aUNISA