Abbildung von: Secure Intelligent Machines - Secure Robotics Inc.

Secure Intelligent Machines

Protecting AI from Cyberattack
Joel D Yonts(Autor*in)
Secure Robotics Inc. (Verlag)
1. Auflage
Erschienen am 15. September 2023
400 Seiten
E-Book
ePUB mit Adobe-DRM
979-8-9877897-1-1 (ISBN)
50,49 €inkl. 7% MwSt.
Systemvoraussetzungen
für ePUB mit Adobe-DRM
E-Book Einzellizenz
Als Download verfügbar

Secure Intelligent Machines

Protecting AI from Cyberattack

We are poised on the edge of the greatest transformation in our world since the industrial revolution. Artificial intelligence, with its long and turbulent past, is fast approaching a critical mass that will drive innovation previously only seen in the realm of science fiction into an everyday reality. Caught up in the race to an AI-enabled future, businesses, institutions, and nation-states are pressured to keep up or risk falling behind and losing competitive edge. This momentum is leading many organizations on a path where artificial intelligence adoption will outpace legal, ethical, and technological risk mitigations. A reality not lost on cyber criminals and other nefarious actors that are on a parallel track to develop tactics for compromising, subverting, and exploiting AI-enabled technologies.

This book combines years of practical cyber program development experience with innovative artificial intelligence research to forge a first-of-its-kind guide to establishing an enterprise AI cybersecurity program. Secure Intelligent Machines arms decision makers, technology leaders, and cybersecurity practitioners with the knowledge needed to solidify a path forward where an AI-Infused world is built on a foundation of trust and cyber resiliency that rise above the threats orchestrated by ill-intent threat actors.

  • How artificial intelligence represents a fundamental shift in technology warranting a new cybersecurity approach.
  • How to engage executive leaders and the broader workforce in AI cyber risk governance.
  • Provides a holistic, risk-based approach to establishing AI cyber protections.
  • Provides policy insights and workforce consideration for adapting to an AI-enabled future.
  • Defines current-state and anticipated future-state AI attack tactics with corresponding defensive strategies.


Cybersecurity thought leader, researcher, strategist, and advisor, Joel Yonts is a seasoned security executive with more than 30 years of technology, cybersecurity, and artificial intelligence experience. His credentials include active certifications in digital forensics, incident response, malware reverse engineering, application penetration, security leadership, ethical hacking, and artificial intelligence engineering. Yonts has more than 15 years of experience building and leading multi-national Fortune 500 cyber programs as an executive CISO. His contributions to the research community include fundamental research in protecting emerging platforms and mapping future attack strategies of cyber adversaries.

PREFACE


1. DAWN OF A NEW ERA

1.1 Event Horizon

1.2 Confidence in Uncertainty

1.3 Cybersecurity in the AI Age

1.4 Cyber Governance

1.5 Managing Intelligence Risk

1.6 AI Cybersecurity Control Frameworks

1.7 AI Compliance

1.8 Summary


2. DEFINING INTELLIGENCE

2.1 Artificial Intelligence

2.2 Machine Learning

2.3 Knowledge Management

2.4 Decisioning Systems

2.5 Natural Language Processing

2.6 Computer Vision and Sound Recognition

2.7 Robotics

2.8 Generative AI

2.9 Summary


3. DISCOVERING INTELLIGENCE

3.1 Intelligence Inventory

3.2 AI Data Assets

3.3 Intelligence Services

3.4 Infrastructure Mapping

3.5 Business Criticality

3.6 Asset Registry

3.7 Summary


4. HEADWATERS INTELLIGENCE

4.1 AI Datasets

4.2 Transformations and Pipelines

4.3 Production Data Feeds

4.4 Data vs. Knowledge

4.5 Data-Layer Attacks

4.6 Protecting AI Data

4.7 Summary


5. CREATING INTELLIGENCE

5.1 AI Development Methodology

5.2 Data Exploration

5.3 Supervised Learning

5.4 Unsupervised Learning

5.5 Compromising ML Development

5.6 Attacking AI Decisioning Development

5.7 Training Intelligent Robots

5.8 Summary


6. OPERATIONAL INTELLIGENCE

6.1 Operational Anatomy

6.2 Attacking AI Operations

6.3 Automated Decision System Attacks

6.4 Subjugated Robotics

6.5 Resilient AI Operations

6.6 Acquiring Intelligence

6.7 Summary


7. FUTURE INTELLIGENCE RISK

7.1 Securing the AI Workforce

7.2 Rising Tide of AI Cyber Attacks

7.3 Concluding Remarks


BIBLIOGRAPHY

ABOUT THE AUTHOR


Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

  • Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
  • Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
  • E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer  E-Book Hilfe.