{"id":1491,"date":"2024-09-28T15:10:09","date_gmt":"2024-09-28T13:10:09","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=1491"},"modified":"2024-09-29T11:12:20","modified_gmt":"2024-09-29T09:12:20","slug":"few-words-about-ai-security","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2024\/09\/28\/few-words-about-ai-security\/","title":{"rendered":"Few words about AI Security"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1491\" class=\"elementor elementor-1491\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9b2e274 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b2e274\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fb62ae\" data-id=\"3fb62ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-032efbb elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"032efbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;exclude_headings_by_selector&quot;:[],&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;,&quot;h6&quot;],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__032efbb\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__032efbb\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__032efbb\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d05b28b elementor-widget elementor-widget-heading\" data-id=\"d05b28b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36bb648 elementor-widget elementor-widget-text-editor\" data-id=\"36bb648\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hello,<\/p><p>I started a Linkedin post couple of weeks ago with the same words like what&#8217;s the subject of this post. Anyway this post intend to be an introduction to AI security of things I have found. There are much more things around the world but since I don&#8217;t have much freetime I have prioritized it to these topics and because I&#8217;m interested in those.\u00a0<\/p><p>In this shortishh post I will try to introduce some frameworks, methods, techniques what are the biggest actors in this area and where you can start if you want to find out more. Like always I start with basics.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f542be elementor-widget elementor-widget-text-editor\" data-id=\"4f542be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI Security involves using artificial intelligence to enhance an organization&#8217;s security posture. This includes automating threat detection, prevention, and remediation to better combat cyberattacks and data breaches. AI systems can analyze vast amounts of data, such as traffic trends, app usage, and network activity, to discover patterns and establish a security baseline. Any activity outside that baseline is flagged as an anomaly and potential cyber threat, allowing for swift remediation.<\/p><p>AI security tools often use machine learning and deep learning to analyze data and generative AI to convert security data into plain text recommendations, streamlining decision-making for security teams.\u00a0<\/p><p>Another aspect of AI Security is securing AI systems themselves from cyber threats. This involves understanding how threat actors can use AI to improve existing cyberattacks or exploit new attack surfaces. For example, large language models can help attackers create more personalized and sophisticated phishing attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cc8842 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0cc8842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79e4f1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79e4f1c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cb2f31\" data-id=\"2cb2f31\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d8c92c9 elementor-widget elementor-widget-heading\" data-id=\"d8c92c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OWASP &amp; TOP TEN<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8d22cb elementor-widget elementor-widget-text-editor\" data-id=\"c8d22cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span dir=\"ltr\">&#8220;The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. They have entered (thankfully) also to AI sector and have released couple of new Top Tens.<\/span><\/p><p><span dir=\"ltr\">The <span style=\"text-decoration: underline;\"><a href=\"http:\/\/owasptopten.org\" target=\"_blank\" rel=\"noopener\">OWASP Top Ten<\/a><\/span> is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It was started in 2003 to help organizations and developer with a starting point for secure development. Over the years it&#8217;s grown into a pseudo standard that is used as a baseline for compliance, education, and vendor tools. &#8220;<br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5fd651 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5fd651\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cfac55e\" data-id=\"cfac55e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b6ef9f elementor-widget elementor-widget-heading\" data-id=\"5b6ef9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Large Language Model Applications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d79937e elementor-widget elementor-widget-text-editor\" data-id=\"d79937e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Founded in May 2023, the <a href=\"https:\/\/github.com\/OWASP\/www-project-top-10-for-large-language-model-applications\/wiki\/Charter\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">OWASP Top 10 for LLM Applications Working Group<\/span><\/a> set out to create a definitive guide on vulnerabilities, mitigations, and best practices for LLM applications. Released in August 2023, the guide received widespread acclaim, marking the beginning of a dynamic and expanding initiative. With over 1,000 members, the group has updated the core document, translated it into multiple languages, and developed additional resources like &#8220;The LLM AI Cybersecurity &amp; Governance Checklist.&#8221; Engagement with standards bodies such as NIST and MITRE has further established the group&#8217;s role in shaping cybersecurity practices.<\/p><p>The <a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">OWASP Top 10 for Large Language Model Applications<\/span><\/a> project aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs). The project provides a list of the top 10 most critical vulnerabilities often seen in LLM applications, highlighting their potential impact, ease of exploitation, and prevalence in real-world applications.\u00a0<\/p><p>The LLM AI Security and Governance Checklist is available as <a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/llm-top-10-governance-doc\/LLM_AI_Security_and_Governance_Checklist-v1.1.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">PDF<\/span><\/a>.\u00a0<\/p><p>One of the important features of that report is the AI Threat Map which illustrates the challenge of balancing the different types of threats.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a74c24 elementor-widget elementor-widget-image\" data-id=\"7a74c24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_threat_map_ver1_0\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUxOSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDlcL2FpX3RocmVhdF9tYXBfdmVyMV8wLnBuZyJ9\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"307\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?fit=640%2C307&amp;ssl=1\" class=\"attachment-large size-large wp-image-1519\" alt=\"AI Threat Map version 1.0\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?w=886&amp;ssl=1 886w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?resize=300%2C144&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?resize=768%2C368&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_threat_map_ver1_0.png?resize=850%2C408&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Taken from PDF above and more later in coming blogs....<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a832c23 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a832c23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d09ba02 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d09ba02\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8c5cfb\" data-id=\"a8c5cfb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57c3efc elementor-widget elementor-widget-heading\" data-id=\"57c3efc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Machine Learning Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-090c568 elementor-widget elementor-widget-text-editor\" data-id=\"090c568\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;The primary aim of of the <a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">OWASP Machine Learning Security Top 10<\/span><\/a> project is to deliver an overview of the top 10 security issues of machine learning systems. As such, a major goal of this project is to develop a high quality deliverable, reviewed by industry peers.<\/p><p>This project will provide an overview of the top 10 security issues of machine learning systems. Due to the rapid adoption of machine learning systems, there are related projects within OWASP and other organisations, that may have narrower or broader scope than this project. As an example, while adversarial attacks is a category of threats, this project will also cover non-adversarial scenarios, such as security hygiene of machine learning operational and engineering workflows.&#8221;-The Charter of the Machine Learning Security.<\/p><p><strong>NOTE &#8211; The project version is currently <a href=\"https:\/\/mltop10.info\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">DRAFT 0.3<\/span><\/a>.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db414cb elementor-widget elementor-widget-image\" data-id=\"db414cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"131\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_1.png?fit=640%2C131&amp;ssl=1\" class=\"attachment-large size-large wp-image-1523\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_1.png?w=1009&amp;ssl=1 1009w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_1.png?resize=300%2C61&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_1.png?resize=768%2C157&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_1.png?resize=850%2C174&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a8aea58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a8aea58\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7fc7f9\" data-id=\"f7fc7f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45f65e3 elementor-widget elementor-widget-heading\" data-id=\"45f65e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML01:2023 Input Manipulation Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d672d7 elementor-widget elementor-widget-text-editor\" data-id=\"0d672d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML01_2023-Input_Manipulation_Attack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Input Manipulation Attacks<\/span><\/a> is an umbrella term, which include Adversarial Attacks, a type of attack in which an attacker deliberately alters input data to mislead the model.<\/p><p><strong>Example attack:<\/strong><\/p><p>A deep learning model is trained to classify images into different categories, such as dogs and cats. An attacker manipulates the original image that is very similar to a legitimate image of a cat, but with small, carefully crafted perturbations that cause the model to misclassify it as a dog. When the model is deployed in a real-world setting, the attacker can use the manipulated image to bypass security measures or cause harm to the system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c53ee6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c53ee6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2fa37a2\" data-id=\"2fa37a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-365227b elementor-widget elementor-widget-heading\" data-id=\"365227b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML02:2023 Data Poisoning Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07a8f03 elementor-widget elementor-widget-text-editor\" data-id=\"07a8f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\">Data Poisoning Attacks<\/span> occur when an attacker manipulates the training data to cause the model to behave in an undesirable way.<\/p><p><strong>Example attack:<\/strong><\/p><p>An attacker poisons the training data for a deep learning model that classifies emails as spam or not spam. The attacker executed this attack by injecting the maliciously labeled spam emails into the training data set. This could be done by compromising the data storage system, for example by hacking into the network or exploiting a vulnerability in the data storage software. The attacker could also manipulate the data labeling process, such as by falsifying the labeling of the emails or by bribing the data labelers to provide incorrect labels.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2503625 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2503625\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-303a52f\" data-id=\"303a52f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2436326 elementor-widget elementor-widget-heading\" data-id=\"2436326\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML03:2023 Model Inversion Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffb027d elementor-widget elementor-widget-text-editor\" data-id=\"ffb027d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML03_2023-Model_Inversion_Attack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Model Inversion Attack<\/span><\/a> occur when an attacker reverse-engineers the model to extract information from it.<\/p><p><strong>Example attack:<\/strong><\/p><p>An advertiser wants to automate their advertising campaigns by using bots to perform actions such as clicking on ads and visiting websites. However, online advertising platforms use bot detection models to prevent bots from performing these actions. To bypass these models, the advertiser trains a deep learning model for bot detection and uses it to invert the predictions of the bot detection model used by the online advertising platform. The advertiser inputs their bots into the model and is able to make the bots appear as human users, allowing them to bypass the bot detection and successfully execute their automated advertising campaigns.<\/p><p>The advertiser executed this attack by training their own bot detection model and then using it to reverse the predictions of the bot detection model used by the online advertising platform. They were able to access this other model through a vulnerability in its implementation or by using an API. The end result of the attack was the advertiser successfully automating their advertising campaigns by making their bots appear as human users.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-427ecfd elementor-widget elementor-widget-image\" data-id=\"427ecfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"131\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_2.png?fit=640%2C131&amp;ssl=1\" class=\"attachment-large size-large wp-image-1524\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_2.png?w=1009&amp;ssl=1 1009w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_2.png?resize=300%2C61&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_2.png?resize=768%2C157&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_2.png?resize=850%2C174&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fdfece elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0fdfece\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87f56f9\" data-id=\"87f56f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac0eb44 elementor-widget elementor-widget-heading\" data-id=\"ac0eb44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML04:2023 Membership Inference Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2633221 elementor-widget elementor-widget-text-editor\" data-id=\"2633221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML04_2023-Membership_Inference_Attack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">ML04:2023 Membership Inference Attack<\/span><\/a> occur when an attacker manipulates the model\u2019s training data in order to cause it to behave in a way that exposes sensitive information.<\/p><p><strong>Example attack:<\/strong><\/p><p>A malicious attacker wants to gain access to sensitive financial information of individuals. They do this by training a machine learning model on a dataset of financial records and using it to query whether or not a particular individual\u2019s record was included in the training data. The attacker can then use this information to infer the financial history and sensitive information of individuals.<\/p><p>The attacker executed this attack by training a machine learning model on a dataset of financial records obtained from a financial organization. They then used this model to query whether or not a particular individual&#8217;s record was included in the training data, allowing them to infer sensitive financial information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a718c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a718c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65a4a9b\" data-id=\"65a4a9b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2061a83 elementor-widget elementor-widget-heading\" data-id=\"2061a83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML05:2023 Model Theft Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c81ecb elementor-widget elementor-widget-text-editor\" data-id=\"1c81ecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML05_2023-Model_Theft.html\" target=\"_blank\" rel=\"noopener\">ML05:2023 Model Theft<\/a><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML05_2023-Model_Theft.html\" target=\"_blank\" rel=\"noopener\"> Attack<\/a>s<\/span> \u00a0occur when an attacker gains access to the model\u2019s parameters.<\/p><p><strong>Example attack:<\/strong><\/p><p>A malicious attacker is working for a competitor of a company that has developed a valuable machine learning model. The attacker wants to steal this model so that their company can gain a competitive advantage and start using it for their own purposes.<\/p><p>The attacker executed this attack by reverse engineering the company\u2019s machine learning model, either by disassembling the binary code or by accessing the model\u2019s training data and algorithm. Once the attacker has reverse engineered the model, they can use this information to recreate the model and start using it for their own purposes. This can result in significant financial loss for the original company, as well as damage to their reputation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c0bba21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0bba21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f3c395\" data-id=\"0f3c395\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-970f0eb elementor-widget elementor-widget-heading\" data-id=\"970f0eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML06:2023 AI Supply Chain Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d401609 elementor-widget elementor-widget-text-editor\" data-id=\"d401609\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML06_2023-AI_Supply_Chain_Attacks.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">In AI Supply Chain Attacks<\/span><\/a>\u00a0threat actors target the supply chain of ML models. This category is broad and important, as software supply chain in Machine Learning includes even more elements than in the case of classic software. It consists of specific elements such as MLOps platforms, data management platforms, model management software, model hubs and other specialized types of software that enable ML engineers to effectively test and deploy software.<\/p><p><strong>Example attack:<\/strong><\/p><p>The attacker, that wants to compromise a Machine Learning project, knows that the project relies on several open-source packages and libraries.<\/p><p>During the attack, they modify the code of one of the packages that the project relies on, such as NumPy or Scikit-learn. The modified version of the package is then uploaded to a public repository, such as PyPI, making it available for others to download and use. When the victim organization downloads and installs the package, the malicious code is also installed and can be used to compromise the project.<\/p><p>This type of attack can be particularly dangerous as it can go unnoticed for a long time, since the victim may not realize that the package they are using has been compromised. The attacker\u2019s malicious code can be used to steal sensitive information, modify results, or lead the machine learning model to return erroneous predictions.<\/p><p>The attacker targets a Machine Learning project that relies on several open-source packages and libraries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eec5f1 elementor-widget elementor-widget-image\" data-id=\"9eec5f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"131\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_3.png?fit=640%2C131&amp;ssl=1\" class=\"attachment-large size-large wp-image-1525\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_3.png?w=1007&amp;ssl=1 1007w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_3.png?resize=300%2C61&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_3.png?resize=768%2C157&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_evils_3.png?resize=850%2C174&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c168ae4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c168ae4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56235b5\" data-id=\"56235b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76be75c elementor-widget elementor-widget-heading\" data-id=\"76be75c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML07:2023 Transfer Learning Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a91ce91 elementor-widget elementor-widget-text-editor\" data-id=\"a91ce91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML07_2023-Transfer_Learning_Attack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Transfer Learning Attack<\/span><\/a>s occur when an attacker trains a model on one task and then fine-tunes it on another task to cause it to behave in an undesirable way.<\/p><p><strong>Example attack:<\/strong><\/p><p>An attacker trains a machine learning model on a malicious dataset that contains manipulated images of faces. The attacker wants to target a face recognition system used by a security firm for identity verification.<\/p><p>The attacker then transfers the model\u2019s knowledge to the target face recognition system. The target system starts using the attacker\u2019s manipulated model for identity verification.<\/p><p>As a result, the face recognition system starts making incorrect predictions, allowing the attacker to bypass the security and gain access to sensitive information. For example, the attacker could use a manipulated image of themselves and the system would identify them as a legitimate user.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4181f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4181f2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b52a9f1\" data-id=\"b52a9f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-099548f elementor-widget elementor-widget-heading\" data-id=\"099548f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML08:2023 Model Skewing Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2609193 elementor-widget elementor-widget-text-editor\" data-id=\"2609193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML08_2023-Model_Skewing.html\" target=\"_blank\" rel=\"noopener\">Model Skewing Attacks<\/a><\/span> occur when an attacker manipulates the distribution of the training data to cause the model to behave in an undesirable way.<\/p><p><strong>Example attack:<\/strong><\/p><p>A financial institution is using a machine learning model to predict the creditworthiness of loan applicants, and the model\u2019s predictions are integrated into their loan approval process. An attacker wants to increase their chances of getting a loan approved, so they manipulate the feedback loop in the MLOps system. The attacker provides fake feedback data to the system, indicating that high-risk applicants have been approved for loans in the past, and this feedback is used to update the model\u2019s training data. As a result, the model\u2019s predictions are skewed towards low-risk applicants, and the attacker\u2019s chances of getting a loan approved are significantly increased.<\/p><p>This type of attack can compromise the accuracy and fairness of the model, leading to unintended consequences and potential harm to the financial institution and its customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a19da88 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a19da88\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf56e75\" data-id=\"cf56e75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96274ff elementor-widget elementor-widget-heading\" data-id=\"96274ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML09:2023 Output Integrity Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c7ed1 elementor-widget elementor-widget-text-editor\" data-id=\"d2c7ed1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In <a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML09_2023-Output_Integrity_Attack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Output Integrity Attack<\/span><\/a>\u00a0scenario, an attacker aims to modify or manipulate the output of a machine learning model in order to change its behavior or cause harm to the system it is used in.<\/p><p><strong>Example attack:<\/strong><\/p><p>An attacker has gained access to the output of a machine learning model that is being used to diagnose diseases in a hospital. The attacker modifies the output of the model, making it provide incorrect diagnoses for patients. As a result, patients are given incorrect treatments, leading to further harm and potentially even death.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca68557 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca68557\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a393c39\" data-id=\"a393c39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc36356 elementor-widget elementor-widget-heading\" data-id=\"dc36356\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ML10:2023 Model Poisoning Attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af9177a elementor-widget elementor-widget-text-editor\" data-id=\"af9177a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/owasp.org\/www-project-machine-learning-security-top-10\/docs\/ML10_2023-Model_Poisoning.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Model Poisoning Attacks <\/span><\/a> occur when an attacker manipulates the model&#8217;s parameters to cause it to behave in an undesirable way.<\/p><p><strong>Example attack:<\/strong><\/p><p>Consider a scenario where a bank is using a machine learning model to identify handwritten characters on cheques to automate their clearing process. The model has been trained on a large dataset of handwritten characters, and it has been designed to accurately identify the characters based on specific parameters such as size, shape, slant, and spacing.<\/p><p>An attacker who wants to poison a machine learning model may manipulate the parameters of the model by altering the images in the training dataset or directly modifying the parameters in the model. This can result in the model being reprogrammed to identify characters differently. For example, the attacker could change the parameters so that the model identifies the character \u201c5\u201d as the character \u201c2\u201d, leading to incorrect amounts being processed.<\/p><p>The attacker can exploit this vulnerability by introducing forged cheques into the clearing process, which the model will process as valid due to the manipulated parameters. This can result in significant financial loss to the bank.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-559c148 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"559c148\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-968527a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"968527a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f819456\" data-id=\"f819456\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06140d1 elementor-widget elementor-widget-text-editor\" data-id=\"06140d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Everyone know or should know MITRE ATT&amp;CK &amp; DEFENCE Frameworks.<\/p><p>Ladies and gentlemen let me introduce <strong>MITRE ATLAS<\/strong>.<strong><br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40df280 elementor-widget elementor-widget-image\" data-id=\"40df280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/mitre_atlas_fin_flag-e1727528058705.jpg?fit=500%2C420&#038;ssl=1\" title=\"mitre_atlas_fin_flag\" alt=\"mitre_atlas_fin_flag\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aaa9b4d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aaa9b4d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1d5828\" data-id=\"f1d5828\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-659c747 elementor-widget elementor-widget-heading\" data-id=\"659c747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MITRE ATLAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea44bef elementor-widget elementor-widget-text-editor\" data-id=\"ea44bef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/atlas.mitre.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">MITRE&#8217;s ATLAS<\/span> <\/a>(Adversarial Threat Landscape for Artificial-Intelligence Systems) is a globally accessible, living knowledge base of adversary tactics and techniques against Al-enabled systems based on real-world attack observations and realistic demonstrations from Al red teams and security groups.<\/p><p>The ATLAS Matrix shows the progression of <a href=\"https:\/\/atlas.mitre.org\/tactics\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">tactics<\/span><\/a> used in attacks as columns from left to right, with ML <a href=\"https:\/\/atlas.mitre.org\/techniques\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">techniques<\/span><\/a> belonging to each tactic below &amp; indicates an adaption from ATT&amp;CK.<\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/atlas.mitre.org\/mitigations\" target=\"_blank\" rel=\"noopener\">Mitigations <\/a><\/span>represent security concepts and classes of technologies that can be used to prevent a technique or sub-technique from being successfully executed.<\/p><p>There are also <a href=\"https:\/\/atlas.mitre.org\/studies\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">case studies<\/span><\/a> available or you build your own.<\/p><p>ATLAS Navigator can be found <span style=\"text-decoration: underline;\"><a href=\"https:\/\/mitre-atlas.github.io\/atlas-navigator\/#layerURL=https:\/\/raw.githubusercontent.com\/mitre-atlas\/atlas-navigator-data\/main\/dist\/default-navigator-layers\/atlas_layer_matrix.json\" target=\"_blank\" rel=\"noopener\">here<\/a><\/span> which shows ATT&amp;CK Enterprise techniques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37e0280 elementor-widget elementor-widget-image\" data-id=\"37e0280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"atlas_matirx\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUyNywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDlcL2F0bGFzX21hdGlyeC5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"131\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?fit=640%2C131&amp;ssl=1\" class=\"attachment-large size-large wp-image-1527\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?w=2421&amp;ssl=1 2421w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=300%2C62&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=1024%2C210&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=768%2C158&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=1536%2C315&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=2048%2C420&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?resize=850%2C174&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/atlas_matirx.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">MITRE ATLAS Matrix<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8009b3f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8009b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8bc5042 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bc5042\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9407f0f\" data-id=\"9407f0f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e46669f elementor-widget elementor-widget-heading\" data-id=\"e46669f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIST AI &amp; AI Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d54f054 elementor-widget elementor-widget-text-editor\" data-id=\"d54f054\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NIST (National Institute of Standards and Technology &#8211; U.S Department of Commerce) have also made <a href=\"https:\/\/www.nist.gov\/publications\/search?ta%5B0%5D=2753736\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">publications<\/span><\/a> of AI and have started its Generative AI evaluation <a href=\"https:\/\/ai-challenges.nist.gov\/genai\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">program<\/span><\/a>.\u00a0<\/p><p>NIST aims to cultivate trust in the design, development, use and governance of Artificial Intelligence (AI) technologies and systems in ways that enhance safety and security and improve quality of life. NIST focuses on improving measurement science, technology, standards and related tools \u2014 including evaluation and data.<\/p><p>With AI and Machine Learning (ML) changing how society addresses challenges and opportunities, the trustworthiness of AI technologies is critical. Trustworthy AI systems are those demonstrated to be valid and reliable; safe, secure and resilient; accountable and transparent; explainable and interpretable; privacy-enhanced; and fair with harmful bias managed. The agency\u2019s AI goals and activities are driven by its statutory mandates, Presidential Executive Orders and policies, and the needs expressed by U.S. industry, the global research community, other federal agencies,and civil society.<\/p><p>\u00a0<\/p><p><strong>NIST\u2019s AI goals<\/strong> include:<\/p><ol><li>Conduct fundamental research to advance trustworthy AI technologies.<\/li><li>Apply AI research and innovation across the NIST Laboratory Programs.<\/li><li>Establish benchmarks, data and metrics to evaluate AI technologies.<\/li><li>Lead and participate in development of technical AI standards.<\/li><li>Contribute technical expertise to discussions and development of AI policies.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443f0dd elementor-widget elementor-widget-heading\" data-id=\"443f0dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">NIST AI Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95ed8ec elementor-widget elementor-widget-text-editor\" data-id=\"95ed8ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;AI risks should not be considered in isolation. Treating AI risks along with other critical risks, such as cybersecurity, will yield a more integrated outcome and organizational efficiencies. Some risks related to AI systems are common across other types of software development and deployment. Overlapping risks include security concerns related to the confidentiality, integrity, and availability of the system and its training and output data \u2013 along with the general security of the underlying software and hardware for AI systems. Cybersecurity risk management considerations and approaches are applicable in the design, development, deployment, evaluation, and use of AI systems&#8221;. Read more <a href=\"https:\/\/www.nist.gov\/artificial-intelligence\/ai-fundamental-research-security\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">here<\/span><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7ec3a5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f7ec3a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82d4655 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82d4655\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d387d45\" data-id=\"d387d45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c22bff2 elementor-widget elementor-widget-heading\" data-id=\"c22bff2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft AI Security - A principled approach to detecting and blocking threat actors<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0173542 elementor-widget elementor-widget-text-editor\" data-id=\"0173542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;In line with Microsoft\u2019s leadership across AI and cybersecurity, today we are announcing principles shaping Microsoft\u2019s policy and actions mitigating the risks associated with the use of our AI tools and APIs by nation-state advanced persistent threats (APTs), advanced persistent manipulators (APMs), and cybercriminal syndicates we track.<\/p><p>These principles include:\u00a0\u00a0\u00a0<\/p><ul class=\"wp-block-list\"><li><strong>Identification and action against malicious threat actors\u2019 use:<\/strong>\u00a0Upon detection of the use of any Microsoft AI application programming interfaces (APIs), services, or systems by an identified malicious threat actor, including nation-state APT or APM, or the cybercrime syndicates we track, Microsoft will take appropriate action to disrupt their activities, such as disabling the accounts used, terminating services, or limiting access to resources.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/li><\/ul><ul class=\"wp-block-list\"><li><strong>Notification to other AI service providers:<\/strong>\u00a0When we detect a threat actor\u2019s use of another service provider\u2019s AI, AI APIs, services, and\/or systems, Microsoft will promptly notify the service provider and share relevant data. This enables the service provider to independently verify our findings and take action in accordance with their own policies.<\/li><\/ul><ul class=\"wp-block-list\"><li><strong>Collaboration with other stakeholders:<\/strong>\u00a0Microsoft will collaborate with other stakeholders to regularly exchange information about detected threat actors\u2019 use of AI. This collaboration aims to promote collective, consistent, and effective responses to ecosystem-wide risks.<\/li><\/ul><ul class=\"wp-block-list\"><li><strong>Transparency:<\/strong>\u00a0As part of our ongoing efforts to advance responsible use of AI, Microsoft will inform the public and stakeholders about actions taken under these threat actor principles, including the nature and extent of threat actors\u2019 use of AI detected within our systems and the measures taken against them, as appropriate.&#8221;<\/li><\/ul><div>Read more from <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?sort-by=newest-oldest&amp;topic=threat-intelligence&amp;date=any&amp;s=\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Microsoft Threat Intelligence<\/span><\/a> publications.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cec5bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3cec5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17e84cc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17e84cc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0e657b5\" data-id=\"0e657b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d59540 elementor-widget elementor-widget-heading\" data-id=\"1d59540\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SANS AI Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c81dd7b elementor-widget elementor-widget-text-editor\" data-id=\"c81dd7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The potential of GenAI extends beyond augmenting security measures; it also introduces complex challenges. Cybercriminals are using GenAI to create more convincing phishing emails, automate code generation for malware, and even mimic behavioral patterns to bypass biometric security systems. Recognizing these threats is crucial for developing a responsive cybersecurity strategy that integrates GenAI as an essential component of the cybersecurity curriculum.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6975377 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6975377\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51f2be4\" data-id=\"51f2be4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8bd878 elementor-widget elementor-widget-heading\" data-id=\"f8bd878\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Strategies for Upskilling and Reskilling\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8563e45 elementor-widget elementor-widget-text-editor\" data-id=\"8563e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><p><strong>Tailored Training Programs:<\/strong> It is critical to develop training that covers both the defensive and offensive uses of GenAI. Such training programs should include real-world simulations where cybersecurity teams must counteract GenAI-driven attacks, providing hands-on experience in a controlled environment.\u00a0<\/p><\/li><li><p><strong>Collaboration with Academic Institutions and Tech Companies:<\/strong> By partnering with academia and technology firms, organizations can access the latest research and developments in GenAI, including those used maliciously. These collaborations can enrich training programs and ensure that they are as current as possible.\u00a0<\/p><\/li><li><p><strong>Certification and Continuous Education:<\/strong> Cybersecurity professionals should be encouraged to pursue advanced certifications that focus on AI and cybersecurity. The SANS Institute and Global Information Assurance Certification (GIAC) are reputable, world-class providers offering specialized training and certifications in areas critical to defending against and leveraging AI technologies. Continuous education through seminars, workshops, and courses on the latest GenAI developments is essential. Take a look at what <a href=\"https:\/\/www.sans.org\/ai\/\" target=\"_blank\" rel=\"noopener\"><u>resources are available<\/u><\/a> in SANS training.<\/p><\/li><li><p><strong>Mentorship and Peer Learning:<\/strong> Implement a mentorship program that focuses on GenAI in cybersecurity. Experienced professionals who understand how to implement and counteract GenAI technologies can provide invaluable insights to less experienced staff, accelerating their learning curve.\u00a0<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-883cbfe elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"883cbfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d070f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d070f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b9a3a27\" data-id=\"b9a3a27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86da38c elementor-widget elementor-widget-heading\" data-id=\"86da38c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End words<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef523a elementor-widget elementor-widget-text-editor\" data-id=\"1ef523a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This was a bit longer than I expected it to be so not so short as I promised. But above are some industry standards for these AI security frameworks and standards to use.\u00a0<\/p><p>The AI industry are booming and we all at least security people need to be awake.<\/p><p>It seems this AI Security is also be formed as a Serie.<\/p><p>So follow me for more and subscribe my blog.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e593e3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4e593e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hello all. we have a new sector in Security business. It&#8217;s called AI Security. I will reveal some of it in this post.<\/p>\n","protected":false},"author":1,"featured_media":1492,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[27,7],"tags":[],"class_list":["post-1491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/09\/ai_security-e1727381651170.jpg?fit=512%2C512&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-o3","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=1491"}],"version-history":[{"count":0,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1491\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/1492"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=1491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=1491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=1491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}