Secure Intelligent Machines: Protecting AI from Cyberattack

Secure Intelligent Machines

Protecting AI from Cyberattack

We are poised on the edge of the greatest transformation in our world since the industrial revolution. Artificial intelligence, with its long and turbulent past, is fast approaching a critical mass that will drive innovation previously only seen in the realm of science fiction into an everyday reality. Caught up in the race to an AI-enabled future, businesses, institutions, and nation-states are pressured to keep up or risk falling behind and losing competitive edge. This momentum is leading many organizations on a path where artificial intelligence adoption will outpace legal, ethical, and technological risk mitigations. A reality not lost on cyber criminals and other nefarious actors that are on a parallel track to develop tactics for compromising, subverting, and exploiting AI-enabled technologies.

This book combines years of practical cyber program development experience with innovative artificial intelligence research to forge a first-of-its-kind guide to establishing an enterprise AI cybersecurity program. Secure Intelligent Machines arms decision makers, technology leaders, and cybersecurity practitioners with the knowledge needed to solidify a path forward where an AI-Infused world is built on a foundation of trust and cyber resiliency that rise above the threats orchestrated by ill-intent threat actors.

  • How artificial intelligence represents a fundamental shift in technology warranting a new cybersecurity approach.
  • How to engage executive leaders and the broader workforce in AI cyber risk governance.
  • Provides a holistic, risk-based approach to establishing AI cyber protections.
  • Provides policy insights and workforce consideration for adapting to an AI-enabled future.
  • Defines current-state and anticipated future-state AI attack tactics with corresponding defensive strategies.


1143863836
Secure Intelligent Machines: Protecting AI from Cyberattack

Secure Intelligent Machines

Protecting AI from Cyberattack

We are poised on the edge of the greatest transformation in our world since the industrial revolution. Artificial intelligence, with its long and turbulent past, is fast approaching a critical mass that will drive innovation previously only seen in the realm of science fiction into an everyday reality. Caught up in the race to an AI-enabled future, businesses, institutions, and nation-states are pressured to keep up or risk falling behind and losing competitive edge. This momentum is leading many organizations on a path where artificial intelligence adoption will outpace legal, ethical, and technological risk mitigations. A reality not lost on cyber criminals and other nefarious actors that are on a parallel track to develop tactics for compromising, subverting, and exploiting AI-enabled technologies.

This book combines years of practical cyber program development experience with innovative artificial intelligence research to forge a first-of-its-kind guide to establishing an enterprise AI cybersecurity program. Secure Intelligent Machines arms decision makers, technology leaders, and cybersecurity practitioners with the knowledge needed to solidify a path forward where an AI-Infused world is built on a foundation of trust and cyber resiliency that rise above the threats orchestrated by ill-intent threat actors.

  • How artificial intelligence represents a fundamental shift in technology warranting a new cybersecurity approach.
  • How to engage executive leaders and the broader workforce in AI cyber risk governance.
  • Provides a holistic, risk-based approach to establishing AI cyber protections.
  • Provides policy insights and workforce consideration for adapting to an AI-enabled future.
  • Defines current-state and anticipated future-state AI attack tactics with corresponding defensive strategies.


48.0 In Stock
Secure Intelligent Machines: Protecting AI from Cyberattack

Secure Intelligent Machines: Protecting AI from Cyberattack

by Joel D Yonts
Secure Intelligent Machines: Protecting AI from Cyberattack

Secure Intelligent Machines: Protecting AI from Cyberattack

by Joel D Yonts

eBook

$48.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Secure Intelligent Machines

Protecting AI from Cyberattack

We are poised on the edge of the greatest transformation in our world since the industrial revolution. Artificial intelligence, with its long and turbulent past, is fast approaching a critical mass that will drive innovation previously only seen in the realm of science fiction into an everyday reality. Caught up in the race to an AI-enabled future, businesses, institutions, and nation-states are pressured to keep up or risk falling behind and losing competitive edge. This momentum is leading many organizations on a path where artificial intelligence adoption will outpace legal, ethical, and technological risk mitigations. A reality not lost on cyber criminals and other nefarious actors that are on a parallel track to develop tactics for compromising, subverting, and exploiting AI-enabled technologies.

This book combines years of practical cyber program development experience with innovative artificial intelligence research to forge a first-of-its-kind guide to establishing an enterprise AI cybersecurity program. Secure Intelligent Machines arms decision makers, technology leaders, and cybersecurity practitioners with the knowledge needed to solidify a path forward where an AI-Infused world is built on a foundation of trust and cyber resiliency that rise above the threats orchestrated by ill-intent threat actors.

  • How artificial intelligence represents a fundamental shift in technology warranting a new cybersecurity approach.
  • How to engage executive leaders and the broader workforce in AI cyber risk governance.
  • Provides a holistic, risk-based approach to establishing AI cyber protections.
  • Provides policy insights and workforce consideration for adapting to an AI-enabled future.
  • Defines current-state and anticipated future-state AI attack tactics with corresponding defensive strategies.



Product Details

ISBN-13: 9798987789711
Publisher: Secure Robotics Inc.
Publication date: 09/15/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 400
File size: 10 MB

About the Author

Cybersecurity thought leader, researcher, strategist, and advisor, Joel Yonts is a seasoned security executive with more than 30 years of technology, cybersecurity, and artificial intelligence experience. His credentials include active certifications in digital forensics, incident response, malware reverse engineering, application penetration, security leadership, ethical hacking, and artificial intelligence engineering. Yonts has more than 15 years of experience building and leading multi-national Fortune 500 cyber programs as an executive CISO. His contributions to the research community include fundamental research in protecting emerging platforms and mapping future attack strategies of cyber adversaries.

Table of Contents

PREFACE


1. DAWN OF A NEW ERA

1.1 Event Horizon

1.2 Confidence in Uncertainty

1.3 Cybersecurity in the AI Age

1.4 Cyber Governance

1.5 Managing Intelligence Risk

1.6 AI Cybersecurity Control Frameworks

1.7 AI Compliance

1.8 Summary


2. DEFINING INTELLIGENCE

2.1 Artificial Intelligence

2.2 Machine Learning

2.3 Knowledge Management

2.4 Decisioning Systems

2.5 Natural Language Processing

2.6 Computer Vision and Sound Recognition

2.7 Robotics

2.8 Generative AI

2.9 Summary


3. DISCOVERING INTELLIGENCE

3.1 Intelligence Inventory

3.2 AI Data Assets

3.3 Intelligence Services

3.4 Infrastructure Mapping

3.5 Business Criticality

3.6 Asset Registry

3.7 Summary


4. HEADWATERS INTELLIGENCE

4.1 AI Datasets

4.2 Transformations and Pipelines

4.3 Production Data Feeds

4.4 Data vs. Knowledge

4.5 Data-Layer Attacks

4.6 Protecting AI Data

4.7 Summary


5. CREATING INTELLIGENCE

5.1 AI Development Methodology

5.2 Data Exploration

5.3 Supervised Learning

5.4 Unsupervised Learning

5.5 Compromising ML Development

5.6 Attacking AI Decisioning Development

5.7 Training Intelligent Robots

5.8 Summary


6. OPERATIONAL INTELLIGENCE

6.1 Operational Anatomy

6.2 Attacking AI Operations

6.3 Automated Decision System Attacks

6.4 Subjugated Robotics

6.5 Resilient AI Operations

6.6 Acquiring Intelligence

6.7 Summary


7. FUTURE INTELLIGENCE RISK

7.1 Securing the AI Workforce

7.2 Rising Tide of AI Cyber Attacks

7.3 Concluding Remarks


BIBLIOGRAPHY

ABOUT THE AUTHOR


From the B&N Reads Blog

Customer Reviews