Beyond the algorithm : AI, security, privacy, and ethics / Omar Santos, Petar Radanliev.
By: Santos, Omar [author]
Contributor(s): Radanliev, Petar [author]
Language: English Publisher: Boston : Addison-Wesley, [2024]Copyright date: ©2024Edition: First EditionDescription: xxiii, 312 pages : illustrations; 23 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780138268459; 0138268452Other title: AI, security, privacy, and ethics [Other title]Subject(s): Artificial intelligence -- Computer programs -- Security measures | Artificial intelligence -- Moral and ethical aspects | Computer networks -- Security measures | Natural language generation (Computer science)DDC classification: 005.8 LOC classification: QA76.9.A25Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 005.8 Sa598 2024 (Browse shelf) | Available | CITU-CL-54248 |
Includes bibliographical references and index
Contents
Preface
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML)
The Story of Eva
The Origins
Advancements of Artificial Intelligence
Understanding AI and ML
Comparison of ML Algorithms
Problems to Consider When Choosing a Suitable Algorithm
Applications of ML Algorithms
Use Cases for AI and ML Algorithms
AI and ML Solutions for Creating Wealth and Resolving Global Problems
Ethical Challenges in AI and ML
Privacy and Security Challenges in AI and ML
AI and ML in Cybersecurity
Cyber Risk from AI and ML
Concluding the Story of Eva
Summary
Test Your Skills
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI
Exercise 1-2: Understanding AI and ML
Exercise 1-3: Comparison of ML Algorithms
Exercise 1-4: Assessing Applications of ML Algorithms
2 Fundamentals of AI and ML Technologies and Implementations
What Are the Leading AI and ML Technologies and Algorithms?
Supervised Learning
Unsupervised Learning
Deep Learning
Reinforcement Learning
ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications
Natural Language Generation (NLG)
Speech Recognition
Virtual Agents
Decision Management
Biometrics
Machine Learning and Peer-to-Peer Networks Convergence
Deep Learning Platforms
Introduction to Robotic Process Automation (RPA) and GPT: Exploring Their Capabilities and Applicati
Hardware Designed for Artificial Intelligence
Capabilities and Benefits of AI-Optimized Hardware in Enhancing AI Performance and Efficiency
Case Study Highlighting the Functionalities and Practical Applications of the Ten AI and ML Technolo
Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study
Reflecting on the Societal and Ethical Implications of AI Technologies
Assessing Future Trends and Emerging Developments in AI and ML Technologies
Summary
Test Your Skills
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Tec
Exercise 2-2: Exploring AI and ML Technologies
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware
Exercise 2-4: Understanding the Two Categories of AI
Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies
3 Generative AI and Large Language Models
Introduction to Generative AI and LLMs
A Personal Story from Omar
Understanding Generative AI
Generative Adversarial Networks (GANs)
Challenges in Training GANs
Tools and Libraries to Work with GANs
Variational Autoencoders (VAEs)
Autoregressive Models
Restricted Boltzmann Machines (RBMs)
Normalizing Flows
Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP)
The Transformer Architecture
OpenAI’s GPT-4 and Beyond: A Breakthrough in Large Language Models
Prompt Engineering
Hugging Face
Contributions to the NLP Landscape
Auto-GPT: A Revolutionary Step in Autonomous AI Applications
Understanding Auto-GPT
Responsibilities and Limitations
Summary
Test Your Skills
Exercise 3-1: Hugging Face
Exercise 3-2: Transformers in AI
Additional Resources
4 The Cornerstones of AI and ML Security
Recognizing the Need for AI Security
Adversarial Attacks
Exploring Real-World Examples of Adversarial Attacks
Understanding the Implications of Adversarial Attacks
Data Poisoning Attacks
Methods of Data Poisoning Attacks
Real-World Examples of Data Poisoning Attacks
OWASP Top Ten for LLMs
Prompt Injection Attacks
Insecure Output Handling
Training Data Poisoning
Model Denial of Service (DoS)
Supply Chain Vulnerabilities
Sensitive Information Disclosure
Insecure Plugin Design
Excessive Agency
Overreliance
Model Theft
Countermeasures Against Model Stealing Attacks
Membership Inference Attacks
Real-World Examples of Membership Inference Attacks
Evasion Attacks
Model Inversion Attacks
Real-World Example of Model Inversion Attacks
Mitigating Model Inversion Attacks
Backdoor Attacks
Exploring Defensive Measures
Summary
Test Your Skills
Additional Resources
5 Hacking AI Systems
Hacking FakeMedAI
MITRE ATLAS
What Are Tactics and Techniques in ATLAS?
What Is the ATLAS Navigator?
A Deep Dive into the AI and ML Attack Tactics and Techniques
Reconnaissance
Resource Development
Initial Access
AI and ML Model Access
Execution
Persistence
Defense Evasion
Discovery
Collection
AI and ML Attack Staging
Exfiltration
Impact
Exploiting Prompt Injection
Red-Teaming AI Models
Summary
Test Your Skills
Exercise 5-1: Understanding the MITRE ATT&CK Framework
Exercise 5-2: Exploring the MITRE ATLAS Framework
6 System and Infrastructure Security
The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact
Network Security Vulnerabilities
Physical Security Vulnerabilities
System Security Vulnerabilities
Software Bill of Materials (SBOM) and Patch Management
Vulnerability Exploitability eXchange (VEX)
AI BOMs
The Critical Role of AI BOMs
Key Elements of an AI BOM
Data Security Vulnerabilities
Cloud Security Vulnerabilities
Misconfigured Access Controls
Weak Authentication Processes
Insecure APIs
Data Exposure and Leakage
Insecure Integrations
Supply Chain Attacks
Account Hijacking
Cloud Metadata Exploitation
Secure Design Principles for AI Systems
Principles for Secure AI Model Development and Deployment
Best Practices for Secure AI Infrastructure Design
AI Model Security
Techniques for Securing AI Models from Attacks
Secure Model Training and Evaluation Practices
Infrastructure Security for AI Systems
Securing AI Data Storage and Processing Systems
Data Anonymization Techniques
Regular Audits and Network Security Measures for Protecting AI Infrastructure
Threat Detection and Incident Response for AI Systems
Incident Response Strategies for AI Systems
Forensic Investigations in AI System Compromises
Additional Security Technologies and Considerations for AI Systems
Summary
Test Your Skills
Additional Resources
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns?
What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Pr
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications
Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns
The Moral Tapestry of AI and ChatGPT
Threads of Fairness: Untangling Algorithmic Bias
Weaving Destiny: The Impact on Human Decision-Making and Autonomy
Navigating the Shadows: Safeguarding Privacy and Ethical Frontiers
Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT
Fictional Case Studies on Privacy Breaches by Future AI and ChatGPT Systems
Summary
Test Your Skills
Exercise 7-1: Privacy Concerns and Ethical Implications of AI
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers
8 Legal and Regulatory Compliance for AI Systems
Legal and Regulatory Landscape
Compliance with AI Legal and Regulatory Data Protection Laws
Intellectual Property Issues in Conversational AI
Patentability of AI Algorithms
Copyright Protection for AI-Generated Content
Trademark Protection for AI Systems
Trade Secret Protection for AI Development
Unraveling Liability and Accountability in the Age of AI
Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Manag
International Collaboration and Standards in AI
Future Trends and Outlook in AI Compliance
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cybe
Summary
Test Your Skills
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws
Exercise 8-2: Understanding Liability and Accountability in AI Systems
Exercise 8-3: International Collaboration and Standards in AI
Test Your Skills Answers and Solutions
Index
This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly. The book is divided into several sections, each focusing on a specific aspect of AI. It begins by introducing the fundamentals of AI technolgies, providing an overview of their history, development, and various types. This is followed by a deep dive into popular AI algorithms and large language models (LLMs), including GPT-4, that are at the forefront of AI innovation. Next, the book explores the critical security aspects of AI systems, examining the importance of security and the key challenges faced in this domain. It also delves into the common threats, vulnerabilities, and attack vectors, as well as risk assessment and management strategies. This manuscript covers data security, model security, system and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure deployment and maintenance. Another key focus of the book is privacy and ethical considerations in AI systems. Topics covered include bias and fairness, transparency and accountability, and privacy and data protection. The book also addresses legal and regulatory compliance, providing an overview of relevant regulations and guidelines, and discussing how to ensure compliance in AI systems through case studies and best practices.This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly
There are no comments for this item.