{"title":"最小化生成式人工智能的风险,最大化其机遇","authors":"Ben Walker","doi":"10.12968/s1353-4858(24)70022-1","DOIUrl":null,"url":null,"abstract":"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Minimising the risks and maximising the opportunities of generative AI\",\"authors\":\"Ben Walker\",\"doi\":\"10.12968/s1353-4858(24)70022-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"7 10\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(24)70022-1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.12968/s1353-4858(24)70022-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Minimising the risks and maximising the opportunities of generative AI
It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.