Book
Licensed
Unlicensed
Requires Authentication
Combating Cyberattacks Targeting the AI Ecosystem
Assessing Threats, Risks, and Vulnerabilities
Language:
English
Published/Copyright:
2024
About this book
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and applications utilizing the intelligence gathered from real-world case studies. Lastly, the book presents a very detailed discussion of the defense mechanisms and practical solutions to secure LLMs, GenAI applications, and the AI infrastructure. The chapters are structured with a granular framework, starting with AI concepts, followed by practical assessment techniques based on real-world intelligence, and concluding with required security defenses. Artificial Intelligence (AI) and cybersecurity are deeply intertwined and increasingly essential to modern digital defense strategies. The book is a comprehensive resource for IT professionals, business leaders, and cybersecurity experts for understanding and defending against AI-driven cyberattacks.
Author / Editor information
Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 16 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Empirical Cloud Security 2/E (Mercury Learning) and Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as Black Hat, RSA, APWG, DEFCON, Virus Bulletin, and others.
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
Contents
vii -
Download PDFPublicly Available
Preface
xiii -
Download PDFPublicly Available
Acknowledgments
xix -
Download PDFPublicly Available
About the Author
xxi -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 1: Introduction to AI: LLMs, GenAI Applications, and the AI Infrastructure
1 -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 2: AI Trust, Compliance, and Security
43 -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 3: The AI Threat Landscape: Dissecting the Risks and Attack Vectors
65 -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies
103 -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure
135 -
Download PDFRequires Authentication UnlicensedLicensed
Chapter 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks
197 -
Download PDFRequires Authentication UnlicensedLicensed
Appendix: Machine Learning /AI Terms
219 -
Download PDFRequires Authentication UnlicensedLicensed
Index
227
Publishing information
Pages and Images/Illustrations in book
eBook published on:
November 18, 2024
eBook ISBN:
9781501520549
Paperback published on:
November 8, 2024
Paperback ISBN:
9781501523243
Pages and Images/Illustrations in book
Main content:
234
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com