5

Hacking AI Systems

After reading this chapter and completing the exercises, you will be able to do the following:

  • Understand the different stages involved in an AI attack, including the steps from initial reconnaissance to the final impact.

  • Identify and describe the different types of AI attack tactics and techniques used by attackers.

  • Explain how attackers can develop resources and gain initial access to a system, including their methods for evading defenses and persisting within an environment.

  • Evaluate the vulnerabilities of AI and ML models to unauthorized access and manipulation, as well as the potential impacts of such breaches.

  • Illustrate how an AI attack is executed and how data is collected, staged, exfiltrated, and used for malicious ...

Get Beyond the Algorithm: AI, Security, Privacy, and Ethics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.