5
Hacking AI Systems
After reading this chapter and completing the exercises, you will be able to do the following:
Understand the different stages involved in an AI attack, including the steps from initial reconnaissance to the final impact.
Identify and describe the different types of AI attack tactics and techniques used by attackers.
Explain how attackers can develop resources and gain initial access to a system, including their methods for evading defenses and persisting within an environment.
Evaluate the vulnerabilities of AI and ML models to unauthorized access and manipulation, as well as the potential impacts of such breaches.
Illustrate how an AI attack is executed and how data is collected, staged, exfiltrated, and used for malicious ...
Get Beyond the Algorithm: AI, Security, Privacy, and Ethics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.