Agile Security Operations by Hinne Hettema
Author:Hinne Hettema
Language: eng
Format: epub
Publisher: Packt Publishing Pvt Ltd
Published: 2021-12-15T00:00:00+00:00
After going through data controls as a root of trust, let's look at algorithmic integrity as a root of trust.
Algorithmic integrity as a root of trust
Algorithms are what transform data into other data. Increasingly, algorithmic integrity is becoming important as a factor in how we make decisions with big data and AI attacks. AI attacks are a new category of cyberattacks that focuses on subverting the AI algorithm itself.
Algorithmic integrity focuses on whether we can trust our algorithm to work as planned. For most algorithms, this can be verified as a matter of code integrity and functionality testing under varying scenarios. With AI attacks, risks to algorithmic integrity consist of the following:
Bias: Bias can be introduced when and where an attacker influences or modifies the dataset that an algorithm is being trained on. Bias often occurs in AI on its own, when the creators of models do not take a sufficient variety of inputs into account.
Input modification: AI algorithms, at a very abstract level, are black boxes that take inputs (data) and produce outputs (verdicts, decisions, and actions). Because of their black-box nature, it can be hard to relate inputs to outputs, and an attacker who can take control of an input stream can influence the output.
Model poisoning: Model poisoning focuses on the learning stage of AI and aims to subvert the learning of the model to make it produce an output desired by the attacker.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4127)
Ego Is the Enemy by Ryan Holiday(3982)
Offensive Shellcode from Scratch by Rishalin Pillay(3619)
Exploring Deepfakes by Bryan Lyon and Matt Tora(3180)
Robo-Advisor with Python by Aki Ranin(2952)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(2839)
Speed Up Your Python with Rust by Maxwell Flitton(2831)
Liar's Poker by Michael Lewis(2806)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(2784)
Agile Security Operations by Hinne Hettema(2781)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(2780)
Extreme DAX by Michiel Rozema & Henk Vlootman(2777)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2717)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(2710)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2626)
Python for ArcGIS Pro by Silas Toms Bill Parker(2622)
Cryptography Algorithms by Massimo Bertaccini(2614)
Distributed .NET with Microsoft Orleans by Bhupesh Guptha Muthiyalu Suneel Kumar Kunani(2609)
Incident Response Techniques for Ransomware Attacks by Oleg Skulkin(2608)