CHAPTER 1

Introduction

  • Target audience
  • What do you get from the book?
  • What this book covers?
  • This book’s mind map
  • Organization of chapters
    • Artificial intelligence (AI) project architecture and design
    • Introduction to risk
    • Introduction to security
    • Introduction to the AI knowledge base
    • How AI, risk, and security come together
    • Business use cases
    • AI solutions for risk
    • AI solutions for security
    • Industry domain
    • Functional domain
    • Futuristic AI
  • Conclusion
  • References

Chapter Outline

  • Book introduction
  • Organization of the book
  • Chapter introduction

Key Learning Points

  • Learn and understand introduction

Target Audience

This book mainly focuses on how AI can be applied to risk and security management. This book follows current trends of AI in the branch of natural language processing, natural language question and answering systems of AI, conversational AI in risk and security domains, AI supporting drones, AI Cybersecurity, Internet of Things devices, and use cases.

Applicable AI topics are targeted toward:

  • Corporate top executives, founders, chief technology officers, chief information officers, chief data officers, chief security officers, chief risk officers, data scientists, data architects, AI designers, AI engineers, project managers, and consultants to understand how to manage risk and security using AI.
  • Students, teachers, and developers will find this book useful and practical. It will provide an overview of many AI components and introduce how AI can be used in large, medium, and small corporate environments.
  • Anybody who strives to understand how AI can be used for risk and security.

What Do You Get From the Book?

  • Understand and learn how to apply AI to risk and security.
  • Design and apply knowledge-based AI solutions to solve risk and security problems.
  • Architecture and design of AI systems relies on the following:
    • Subject matter experts: This means having a practical view of how solutions can be used, not just developed. Case studies of risk and security are used as examples in the book.
    • Appropriately applied mathematics and algorithms are used in this book. Do not skip the mathematical equations if you have the need to study them. AI relies heavily on mathematics.
    • Applied physics and usage into hardware systems and futuristic approaches from quantum computers to parallel processing of network of quantum computer handlings. AI is still evolving. Give your full attention to new concepts and applied creative ideas in the futuristic AI chapter.
    • Decision theory, decision-making process, and the Markov decision process algorithm (Gupta and Katarya 2018).

What This Book Covers

This book introduces how AI is applied to corporations; start-ups; and large, medium, and small companies to help automate the tedious jobs of maintaining risk and security. Automation helps the working environment of the organizations by applying AI and machine learning to aid human experts.

  • How does a company get true value from AI?
  • What are the business use cases for AI with visionary?
  • How do I identify the best business case for AI adoption and evaluate opportunities?
  • Should I build or buy an AI platform?
  • How do I find and recruit top AI talent for my enterprise?
  • How will I bring AI into my business to increase revenue or decrease costs?
  • How can I facilitate AI adoption within my organization?

Dealing with data includes data collection, data preparation, data transformation, securing the data, using the data to align with an organization’s AI use case, and much more.

A mind map for the book introduction is provided in Figure 1.1. This gives the reader a direction of what is covered in the book and organization of chapters.

Image

Figure 1.1 Mind map of the book

See Figure 1.2. This gives the reader a direction of what risk areas are covered with AI solutions in the book.

Image

See Figure 1.3. This gives the reader a direction of what security areas are covered with AI solutions in the book.

Image

Figure 1.3 Mind map of AI solutions for security

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset