17

Secure by Design and Trustworthy AI

We have covered key examples of adversarial AI attacks in significant detail. This chapter transitions from understanding the adversarial landscape of AI to embedding security and trustworthiness into AI systems from the design phase.

While we’ll focus on the technical details of attacks to help us understand them, we will take a step back and try organizing our examples and understanding around more formal definitions of threats and attacks by using categories and taxonomies devised by leading organizations such as NIST, MITRE, and OWASP. This will provide a foundation to reference the threats and attacks without getting lost in the details new variants will no doubt bring.

We will consolidate these taxonomies ...

Get Adversarial AI Attacks, Mitigations, and Defense Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.