Beyond the algorithm : AI, security, privacy, and ethics / Omar Santos, Petar Radanliev.

By: Santos, Omar [author]
Contributor(s): Radanliev, Petar [author]
Language: English Publisher: Boston : Addison-Wesley, [2024]Copyright date: ©2024Edition: First EditionDescription: xxiii, 312 pages : illustrations; 23 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780138268459; 0138268452Other title: AI, security, privacy, and ethics [Other title]Subject(s): Artificial intelligence -- Computer programs -- Security measures | Artificial intelligence -- Moral and ethical aspects | Computer networks -- Security measures | Natural language generation (Computer science)DDC classification: 005.8 LOC classification: QA76.9.A25
Contents:
Contents Preface 1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML) The Story of Eva The Origins Advancements of Artificial Intelligence Understanding AI and ML Comparison of ML Algorithms Problems to Consider When Choosing a Suitable Algorithm Applications of ML Algorithms Use Cases for AI and ML Algorithms AI and ML Solutions for Creating Wealth and Resolving Global Problems Ethical Challenges in AI and ML Privacy and Security Challenges in AI and ML AI and ML in Cybersecurity Cyber Risk from AI and ML Concluding the Story of Eva Summary Test Your Skills Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI Exercise 1-2: Understanding AI and ML Exercise 1-3: Comparison of ML Algorithms Exercise 1-4: Assessing Applications of ML Algorithms 2 Fundamentals of AI and ML Technologies and Implementations What Are the Leading AI and ML Technologies and Algorithms? Supervised Learning Unsupervised Learning Deep Learning Reinforcement Learning ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications Natural Language Generation (NLG) Speech Recognition Virtual Agents Decision Management Biometrics Machine Learning and Peer-to-Peer Networks Convergence Deep Learning Platforms Introduction to Robotic Process Automation (RPA) and GPT: Exploring Their Capabilities and Applicati Hardware Designed for Artificial Intelligence Capabilities and Benefits of AI-Optimized Hardware in Enhancing AI Performance and Efficiency Case Study Highlighting the Functionalities and Practical Applications of the Ten AI and ML Technolo Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types Leveraging AI and ML to Tackle Real-World Challenges: A Case Study Reflecting on the Societal and Ethical Implications of AI Technologies Assessing Future Trends and Emerging Developments in AI and ML Technologies Summary Test Your Skills Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Tec Exercise 2-2: Exploring AI and ML Technologies Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware Exercise 2-4: Understanding the Two Categories of AI Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies 3 Generative AI and Large Language Models Introduction to Generative AI and LLMs A Personal Story from Omar Understanding Generative AI Generative Adversarial Networks (GANs) Challenges in Training GANs Tools and Libraries to Work with GANs Variational Autoencoders (VAEs) Autoregressive Models Restricted Boltzmann Machines (RBMs) Normalizing Flows Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP) The Transformer Architecture OpenAI’s GPT-4 and Beyond: A Breakthrough in Large Language Models Prompt Engineering Hugging Face Contributions to the NLP Landscape Auto-GPT: A Revolutionary Step in Autonomous AI Applications Understanding Auto-GPT Responsibilities and Limitations Summary Test Your Skills Exercise 3-1: Hugging Face Exercise 3-2: Transformers in AI Additional Resources 4 The Cornerstones of AI and ML Security Recognizing the Need for AI Security Adversarial Attacks Exploring Real-World Examples of Adversarial Attacks Understanding the Implications of Adversarial Attacks Data Poisoning Attacks Methods of Data Poisoning Attacks Real-World Examples of Data Poisoning Attacks OWASP Top Ten for LLMs Prompt Injection Attacks Insecure Output Handling Training Data Poisoning Model Denial of Service (DoS) Supply Chain Vulnerabilities Sensitive Information Disclosure Insecure Plugin Design Excessive Agency Overreliance Model Theft Countermeasures Against Model Stealing Attacks Membership Inference Attacks Real-World Examples of Membership Inference Attacks Evasion Attacks Model Inversion Attacks Real-World Example of Model Inversion Attacks Mitigating Model Inversion Attacks Backdoor Attacks Exploring Defensive Measures Summary Test Your Skills Additional Resources 5 Hacking AI Systems Hacking FakeMedAI MITRE ATLAS What Are Tactics and Techniques in ATLAS? What Is the ATLAS Navigator? A Deep Dive into the AI and ML Attack Tactics and Techniques Reconnaissance Resource Development Initial Access AI and ML Model Access Execution Persistence Defense Evasion Discovery Collection AI and ML Attack Staging Exfiltration Impact Exploiting Prompt Injection Red-Teaming AI Models Summary Test Your Skills Exercise 5-1: Understanding the MITRE ATT&CK Framework Exercise 5-2: Exploring the MITRE ATLAS Framework 6 System and Infrastructure Security The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact Network Security Vulnerabilities Physical Security Vulnerabilities System Security Vulnerabilities Software Bill of Materials (SBOM) and Patch Management Vulnerability Exploitability eXchange (VEX) AI BOMs The Critical Role of AI BOMs Key Elements of an AI BOM Data Security Vulnerabilities Cloud Security Vulnerabilities Misconfigured Access Controls Weak Authentication Processes Insecure APIs Data Exposure and Leakage Insecure Integrations Supply Chain Attacks Account Hijacking Cloud Metadata Exploitation Secure Design Principles for AI Systems Principles for Secure AI Model Development and Deployment Best Practices for Secure AI Infrastructure Design AI Model Security Techniques for Securing AI Models from Attacks Secure Model Training and Evaluation Practices Infrastructure Security for AI Systems Securing AI Data Storage and Processing Systems Data Anonymization Techniques Regular Audits and Network Security Measures for Protecting AI Infrastructure Threat Detection and Incident Response for AI Systems Incident Response Strategies for AI Systems Forensic Investigations in AI System Compromises Additional Security Technologies and Considerations for AI Systems Summary Test Your Skills Additional Resources 7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns? What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Pr The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns The Moral Tapestry of AI and ChatGPT Threads of Fairness: Untangling Algorithmic Bias Weaving Destiny: The Impact on Human Decision-Making and Autonomy Navigating the Shadows: Safeguarding Privacy and Ethical Frontiers Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT Fictional Case Studies on Privacy Breaches by Future AI and ChatGPT Systems Summary Test Your Skills Exercise 7-1: Privacy Concerns and Ethical Implications of AI Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI Exercise 7-4: Safeguarding Privacy and Ethical Frontiers 8 Legal and Regulatory Compliance for AI Systems Legal and Regulatory Landscape Compliance with AI Legal and Regulatory Data Protection Laws Intellectual Property Issues in Conversational AI Patentability of AI Algorithms Copyright Protection for AI-Generated Content Trademark Protection for AI Systems Trade Secret Protection for AI Development Unraveling Liability and Accountability in the Age of AI Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Manag International Collaboration and Standards in AI Future Trends and Outlook in AI Compliance Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cybe Summary Test Your Skills Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws Exercise 8-2: Understanding Liability and Accountability in AI Systems Exercise 8-3: International Collaboration and Standards in AI Test Your Skills Answers and Solutions Index
Summary: This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly. The book is divided into several sections, each focusing on a specific aspect of AI. It begins by introducing the fundamentals of AI technolgies, providing an overview of their history, development, and various types. This is followed by a deep dive into popular AI algorithms and large language models (LLMs), including GPT-4, that are at the forefront of AI innovation. Next, the book explores the critical security aspects of AI systems, examining the importance of security and the key challenges faced in this domain. It also delves into the common threats, vulnerabilities, and attack vectors, as well as risk assessment and management strategies. This manuscript covers data security, model security, system and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure deployment and maintenance. Another key focus of the book is privacy and ethical considerations in AI systems. Topics covered include bias and fairness, transparency and accountability, and privacy and data protection. The book also addresses legal and regulatory compliance, providing an overview of relevant regulations and guidelines, and discussing how to ensure compliance in AI systems through case studies and best practices.This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
BOOK BOOK COLLEGE LIBRARY
COLLEGE LIBRARY
SUBJECT REFERENCE
005.8 Sa598 2024 (Browse shelf) Available CITU-CL-54248
Total holds: 0

Includes bibliographical references and index

Contents
Preface
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML)
The Story of Eva
The Origins
Advancements of Artificial Intelligence
Understanding AI and ML
Comparison of ML Algorithms
Problems to Consider When Choosing a Suitable Algorithm
Applications of ML Algorithms
Use Cases for AI and ML Algorithms
AI and ML Solutions for Creating Wealth and Resolving Global Problems
Ethical Challenges in AI and ML
Privacy and Security Challenges in AI and ML
AI and ML in Cybersecurity
Cyber Risk from AI and ML
Concluding the Story of Eva
Summary
Test Your Skills
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI
Exercise 1-2: Understanding AI and ML
Exercise 1-3: Comparison of ML Algorithms
Exercise 1-4: Assessing Applications of ML Algorithms
2 Fundamentals of AI and ML Technologies and Implementations
What Are the Leading AI and ML Technologies and Algorithms?
Supervised Learning
Unsupervised Learning
Deep Learning
Reinforcement Learning
ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications
Natural Language Generation (NLG)
Speech Recognition
Virtual Agents
Decision Management
Biometrics
Machine Learning and Peer-to-Peer Networks Convergence
Deep Learning Platforms
Introduction to Robotic Process Automation (RPA) and GPT: Exploring Their Capabilities and Applicati
Hardware Designed for Artificial Intelligence
Capabilities and Benefits of AI-Optimized Hardware in Enhancing AI Performance and Efficiency
Case Study Highlighting the Functionalities and Practical Applications of the Ten AI and ML Technolo
Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study
Reflecting on the Societal and Ethical Implications of AI Technologies
Assessing Future Trends and Emerging Developments in AI and ML Technologies
Summary
Test Your Skills
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Tec
Exercise 2-2: Exploring AI and ML Technologies
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware
Exercise 2-4: Understanding the Two Categories of AI
Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies
3 Generative AI and Large Language Models
Introduction to Generative AI and LLMs
A Personal Story from Omar
Understanding Generative AI
Generative Adversarial Networks (GANs)
Challenges in Training GANs
Tools and Libraries to Work with GANs
Variational Autoencoders (VAEs)
Autoregressive Models
Restricted Boltzmann Machines (RBMs)
Normalizing Flows
Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP)
The Transformer Architecture
OpenAI’s GPT-4 and Beyond: A Breakthrough in Large Language Models
Prompt Engineering
Hugging Face
Contributions to the NLP Landscape
Auto-GPT: A Revolutionary Step in Autonomous AI Applications
Understanding Auto-GPT
Responsibilities and Limitations
Summary
Test Your Skills
Exercise 3-1: Hugging Face
Exercise 3-2: Transformers in AI
Additional Resources
4 The Cornerstones of AI and ML Security
Recognizing the Need for AI Security
Adversarial Attacks
Exploring Real-World Examples of Adversarial Attacks
Understanding the Implications of Adversarial Attacks
Data Poisoning Attacks
Methods of Data Poisoning Attacks
Real-World Examples of Data Poisoning Attacks
OWASP Top Ten for LLMs
Prompt Injection Attacks
Insecure Output Handling
Training Data Poisoning
Model Denial of Service (DoS)
Supply Chain Vulnerabilities
Sensitive Information Disclosure
Insecure Plugin Design
Excessive Agency
Overreliance
Model Theft
Countermeasures Against Model Stealing Attacks
Membership Inference Attacks
Real-World Examples of Membership Inference Attacks
Evasion Attacks
Model Inversion Attacks
Real-World Example of Model Inversion Attacks
Mitigating Model Inversion Attacks
Backdoor Attacks
Exploring Defensive Measures
Summary
Test Your Skills
Additional Resources
5 Hacking AI Systems
Hacking FakeMedAI
MITRE ATLAS
What Are Tactics and Techniques in ATLAS?
What Is the ATLAS Navigator?
A Deep Dive into the AI and ML Attack Tactics and Techniques
Reconnaissance
Resource Development
Initial Access
AI and ML Model Access
Execution
Persistence
Defense Evasion
Discovery
Collection
AI and ML Attack Staging
Exfiltration
Impact
Exploiting Prompt Injection
Red-Teaming AI Models
Summary
Test Your Skills
Exercise 5-1: Understanding the MITRE ATT&CK Framework
Exercise 5-2: Exploring the MITRE ATLAS Framework
6 System and Infrastructure Security
The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact
Network Security Vulnerabilities
Physical Security Vulnerabilities
System Security Vulnerabilities
Software Bill of Materials (SBOM) and Patch Management
Vulnerability Exploitability eXchange (VEX)
AI BOMs
The Critical Role of AI BOMs
Key Elements of an AI BOM
Data Security Vulnerabilities
Cloud Security Vulnerabilities
Misconfigured Access Controls
Weak Authentication Processes
Insecure APIs
Data Exposure and Leakage
Insecure Integrations
Supply Chain Attacks
Account Hijacking
Cloud Metadata Exploitation
Secure Design Principles for AI Systems
Principles for Secure AI Model Development and Deployment
Best Practices for Secure AI Infrastructure Design
AI Model Security
Techniques for Securing AI Models from Attacks
Secure Model Training and Evaluation Practices
Infrastructure Security for AI Systems
Securing AI Data Storage and Processing Systems
Data Anonymization Techniques
Regular Audits and Network Security Measures for Protecting AI Infrastructure
Threat Detection and Incident Response for AI Systems
Incident Response Strategies for AI Systems
Forensic Investigations in AI System Compromises
Additional Security Technologies and Considerations for AI Systems
Summary
Test Your Skills
Additional Resources
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns?
What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Pr
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications
Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns
The Moral Tapestry of AI and ChatGPT
Threads of Fairness: Untangling Algorithmic Bias
Weaving Destiny: The Impact on Human Decision-Making and Autonomy
Navigating the Shadows: Safeguarding Privacy and Ethical Frontiers
Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT
Fictional Case Studies on Privacy Breaches by Future AI and ChatGPT Systems
Summary
Test Your Skills
Exercise 7-1: Privacy Concerns and Ethical Implications of AI
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers
8 Legal and Regulatory Compliance for AI Systems
Legal and Regulatory Landscape
Compliance with AI Legal and Regulatory Data Protection Laws
Intellectual Property Issues in Conversational AI
Patentability of AI Algorithms
Copyright Protection for AI-Generated Content
Trademark Protection for AI Systems
Trade Secret Protection for AI Development
Unraveling Liability and Accountability in the Age of AI
Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Manag
International Collaboration and Standards in AI
Future Trends and Outlook in AI Compliance
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cybe
Summary
Test Your Skills
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws
Exercise 8-2: Understanding Liability and Accountability in AI Systems
Exercise 8-3: International Collaboration and Standards in AI
Test Your Skills Answers and Solutions
Index

This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly. The book is divided into several sections, each focusing on a specific aspect of AI. It begins by introducing the fundamentals of AI technolgies, providing an overview of their history, development, and various types. This is followed by a deep dive into popular AI algorithms and large language models (LLMs), including GPT-4, that are at the forefront of AI innovation. Next, the book explores the critical security aspects of AI systems, examining the importance of security and the key challenges faced in this domain. It also delves into the common threats, vulnerabilities, and attack vectors, as well as risk assessment and management strategies. This manuscript covers data security, model security, system and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure deployment and maintenance. Another key focus of the book is privacy and ethical considerations in AI systems. Topics covered include bias and fairness, transparency and accountability, and privacy and data protection. The book also addresses legal and regulatory compliance, providing an overview of relevant regulations and guidelines, and discussing how to ensure compliance in AI systems through case studies and best practices.This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly

There are no comments for this item.

to post a comment.