- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
As artificial intelligence (AI) becomes more and more woven into our everyday lives and underpins so much of the infrastructure we rely on the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals and, increasingly, users are…mehr
Andere Kunden interessierten sich auch für
- Omar SantosThe AI Revolution in Networking, Cybersecurity, and Emerging Technologies23,99 €
- Dave SilbermanAI-Powered Leadership: Mastering the Synergy of Technology and Human Expertise23,99 €
- Ross SmithThe AI Revolution in Customer Service and Support32,99 €
- Vijay KanabarThe AI Revolution in Project Management29,99 €
- Mark MorowczynskiThe Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting33,99 €
- Eric SiegelThe AI Playbook19,99 €
- Matteo PasquinelliThe Eye of the Master14,99 €
-
-
-
As artificial intelligence (AI) becomes more and more woven into our everyday lives and underpins so much of the infrastructure we rely on the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals and, increasingly, users are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.
· An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future
· Introduction to AI models and implementations, as well as examples of emerging AI trends
·Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment
· Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology
· A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas
· An academic resource and guide for the evolving technical and intellectual challenges of AI
· Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals and, increasingly, users are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.
· An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future
· Introduction to AI models and implementations, as well as examples of emerging AI trends
·Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment
· Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology
· A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas
· An academic resource and guide for the evolving technical and intellectual challenges of AI
· Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.
Produktdetails
- Produktdetails
- Verlag: Pearson Education; Pearson International
- 1. Auflage
- Seitenzahl: 336
- Erscheinungstermin: 30. Januar 2024
- Englisch
- Abmessung: 235mm x 195mm x 19mm
- Gewicht: 590g
- ISBN-13: 9780138268459
- ISBN-10: 0138268452
- Artikelnr.: 68748317
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Verlag: Pearson Education; Pearson International
- 1. Auflage
- Seitenzahl: 336
- Erscheinungstermin: 30. Januar 2024
- Englisch
- Abmessung: 235mm x 195mm x 19mm
- Gewicht: 590g
- ISBN-13: 9780138268459
- ISBN-10: 0138268452
- Artikelnr.: 68748317
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Omar Santos is a cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the lead of the DEF CON Red Team Village, chair of the Common Security Advisory Framework (CSAF) technical committee, and board member of the OASIS Open standards organization. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is a renowned expert in ethical hacking, vulnerability research, and incident response. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. With over twenty books, video courses, white papers, and technical articles under his belt, Omar's expertise is widely recognized and respected. As a principal engineer at Cisco's Product Security Incident Response Team (PSIRT), Omar not only leads engineers and incident managers in investigating and resolving cybersecurity vulnerabilities, but also actively mentors the next generation of security professionals. Samer Salam is a technology architect and software engineering leader in the computer networking industry with over 23 years of experience. In his role as a Distinguished Engineer at Cisco Systems, he focuses on identifying disruptive technologies based on market transitions, incubating and mainstreaming emerging technologies, in addition to defining the system and software architecture for networking products. His work spans the areas of Intent Based Networking, Artificial Intelligence, Machine Reasoning, Semantic Technologies and Immersive Visualization. Previously at Cisco, he held multiple technical leadership and software development positions working on IoT, Layer 2 VPN / EVPN, Carrier/Metro Ethernet services, OAM, network resiliency, system scalability, software quality, multi-service edge, broadband, MPLS and dial solutions. Samer was awarded the International Society of Service Innovation Professionals (ISSIP) 2022 Excellence in Service Innovation Award for the Impact to Innovation category. He holds over 95 US and international patents and is co-author of The Internet of Things From Hype to Reality: The Road to Digitization. He authored thirteen IETF RFCs, and multiple articles in academic and industry journals. He is also a speaker at CiscoLive, and blogs on networking technology. He holds an M.S. degree in Computer Engineering from the University of Southern California in Los Angeles and a B.E. degree in Computer and Communications Engineering, with Distinction, from the American University of Beirut, where he received the Faculty of Engineering and Architecture Deans Award for Creative Achievement. Hazim Dahir, is a Distinguished Engineer at the Cisco Technology Enablement and Acceleration Office. He is working to define and influence next-generation digital transformation architectures across multiple technologies and verticals. Hazim started his Cisco tenure in 1996 as a software engineer and subsequently moved into the services organization focusing on large-scale and emerging technology network architectures. He is currently focusing on developing architectures utilizing security, collaboration, Edge computing, and AI technologies addressing future of work and hybrid cloud requirements for large enterprises. Through his passion for engineering and sustainability, Hazim is currently working on advanced software solutions for electric and autonomous vehicles with global automotive manufacturers. Hazim is a frequent presenter at multiple US and global conferences and standards bodies. He's the vice-chair for the IEEE Edge Computing workgro
Preface.. . . . . . . . . . . . . . . . . xvii
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning
(ML).. . . . . . . . . . . . 1
The Story of Eva. . . . . . . . . . . . . 2
The Origins.. . . . . . . . . . . . . . 3
Advancements of Artificial Intelligence.. . . . . . . . . 5
Understanding AI and ML. . . . . . . . . . . 8
Concluding the Story of Eva.. . . . . . . . . . . 25
Summary. . . . . . . . . . . . . . 26
Test Your Skills. . . . . . . . . . . . . 27
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of
AI.. . . . . . . . . . . . 29
Exercise 1-2: Understanding AI and ML. . . . . . . . . 29
Exercise 1-3: Comparison of ML Algorithms.. . . . . . . . 30
Exercise 1-4: Assessing Applications of ML Algorithms. . . . . . 31
2 Fundamentals of AI and ML Technologies and Implementations.. . 33
What Are the Leading AI and ML Technologies and Algorithms?. . . . 34
ChatGPT and the Leading AI and ML Technologies: Exploring
Capabilities and Applications.. . . . . . . . . . 43
Understanding the Two Categories of AI: Capability-Based Types and
Functionality-Based Types. . . . . . . . 52
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study. . . 53
Reflecting on the Societal and Ethical Implications of AI Technologies.. .
54
Assessing Future Trends and Emerging Developments in AI and ML
Technologies.. . . . . . . . . . . . . 56
Summary. . . . . . . . . . . . . . 57
Test Your Skills. . . . . . . . . . . . . 59
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with
Appropriate Machine Learning Techniques.. . . . . . . . 61
Exercise 2-2: Exploring AI and ML Technologies.. . . . . . . 63
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware.. . . 63
Exercise 2-4: Understanding the Two Categories of AI.. . . . . . 64
Exercise 2-5: Future Trends and Emerging Developments in AI and ML
Technologies. . . . . . . . . . . . . . 64
3 Generative AI and Large Language Models.. . . . . . . 65
Introduction to Generative AI and LLMs. . . . . . . . 66
Large Language Models (LLMs): Revolutionizing Natural Language Processing
(NLP). . . . . . . . . . . 88
Hugging Face.. . . . . . . . . . . . . 95
Auto-GPT: A Revolutionary Step in Autonomous AI Applications. . . . 97
Summary. . . . . . . . . . . . . . 98
Test Your Skills. . . . . . . . . . . . . 99
Exercise 3-1: Hugging Face.. . . . . . . . . . . 102
Exercise 3-2: Transformers in AI. . . . . . . . . . 102
Additional Resources. . . . . . . . . . . . 104
4 The Cornerstones of AI and ML Security.. . . . . . . . 105
Recognizing the Need for AI Security.. . . . . . . . . 105
Adversarial Attacks.. . . . . . . . . . . . 107
Data Poisoning Attacks. . . . . . . . . . . 109
OWASP Top Ten for LLMs. . . . . . . . . . . 112
Countermeasures Against Model Stealing Attacks. . . . . . 124
Membership Inference Attacks.. . . . . . . . . . 124
Evasion Attacks.. . . . . . . . . . . . . 130
Model Inversion Attacks.. . . . . . . . . . . 135
Backdoor Attacks. . . . . . . . . . . . . 137
Exploring Defensive Measures.. . . . . . . . . . 137
Summary. . . . . . . . . . . . . . 138
Test Your Skills. . . . . . . . . . . . . 140
Additional Resources. . . . . . . . . . . . 142
5 Hacking AI Systems.. . . . . . . . . . . . 143
Hacking FakeMedAI. . . . . . . . . . . . 143
MITRE ATLAS.. . . . . . . . . . . . . 146
A Deep Dive into the AI and ML Attack Tactics and Techniques.. . . . 147
Exploiting Prompt Injection.. . . . . . . . . . 161
Red-Teaming AI Models. . . . . . . . . . . 162
Summary. . . . . . . . . . . . . . 162
Test Your Skills. . . . . . . . . . . . . 163
Exercise 5-1: Understanding the MITRE ATT&CK Framework.. . . . 166
Exercise 5-2: Exploring the MITRE ATLAS Framework.. . . . . . 166
6 System and Infrastructure Security. . . . . . . . . 167
The Vulnerabilities and Risks Associated with AI Systems and Their
Potential Impact. . . . . . . . . . . . 167
AI BOMs. . . . . . . . . . . . . . 176
Data Security Vulnerabilities.. . . . . . . . . . 177
Cloud Security Vulnerabilities.. . . . . . . . . . 179
Secure Design Principles for AI Systems.. . . . . . . . 182
AI Model Security.. . . . . . . . . . . . 183
Infrastructure Security for AI Systems. . . . . . . . . 184
Threat Detection and Incident Response for AI Systems.. . . . . 190
Additional Security Technologies and Considerations for AI Systems. . . 193
Summary. . . . . . . . . . . . . . 195
Test Your Skills. . . . . . . . . . . . . 196
Additional Resources. . . . . . . . . . . . 197
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused
World.. . . . . . . . . . . . . 199
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and
Privacy Concerns?.. . . . . . . . . . 200
What Are the Challenges Posed by AI in Terms of Privacy Protection, and
What Is the Importance of Privacy and Ethics in AI Development and
Deployment?. . . . . . . . . 201
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications.
. . . . . . . . . . . 203
Data Collection and Data Storage in AI Algorithms: Potential Risks and
Ethical Privacy Concerns. . . . . . . . 206
The Moral Tapestry of AI and ChatGPT.. . . . . . . . 212
Preserving Privacy, Unleashing Knowledge: Differential Privacy and
Federated Learning in the Age of Data Security.. . . . . . 223
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in
AI Systems.. . . . . . . . . . 224
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in
AI and ChatGPT.. . . . . . . . . 226
Summary. . . . . . . . . . . . . . 232
Test Your Skills. . . . . . . . . . . . . 234
Exercise 7-1: Privacy Concerns and Ethical Implications of AI. . . . 237
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI
Algorithms.. . . . . . . . . . . . . 238
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI. . . . 238
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers.. . . . . 239
8 Legal and Regulatory Compliance for AI Systems.. . . . . 241
Legal and Regulatory Landscape.. . . . . . . . . 242
Compliance with AI Legal and Regulatory Data Protection Laws. . . 245
Intellectual Property Issues in Conversational AI.. . . . . . 247
Unraveling Liability and Accountability in the Age of AI. . . . . 249
Ethical Development and Deployment of AI Systems: Strategies for Effective
Governance and Risk Management.. . . . . . 252
International Collaboration and Standards in AI. . . . . . . 255
Future Trends and Outlook in AI Compliance.. . . . . . . 257
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum
Computing, and Novel Cyberattacks in Oxford, 2050. . . . 260
Summary. . . . . . . . . . . . . . 261
Test Your Skills. . . . . . . . . . . . . 263
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws.. .
. . . . . . . . . . 266
Exercise 8-2: Understanding Liability and Accountability in AI Systems. . .
. . . . . . . . . . . 266
Exercise 8-3: International Collaboration and Standards in AI.. . . . 267
Test Your Skills Answers and Solutions. . . . . . . . . 269
9780138268459, TOC, 1/4/2024
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning
(ML).. . . . . . . . . . . . 1
The Story of Eva. . . . . . . . . . . . . 2
The Origins.. . . . . . . . . . . . . . 3
Advancements of Artificial Intelligence.. . . . . . . . . 5
Understanding AI and ML. . . . . . . . . . . 8
Concluding the Story of Eva.. . . . . . . . . . . 25
Summary. . . . . . . . . . . . . . 26
Test Your Skills. . . . . . . . . . . . . 27
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of
AI.. . . . . . . . . . . . 29
Exercise 1-2: Understanding AI and ML. . . . . . . . . 29
Exercise 1-3: Comparison of ML Algorithms.. . . . . . . . 30
Exercise 1-4: Assessing Applications of ML Algorithms. . . . . . 31
2 Fundamentals of AI and ML Technologies and Implementations.. . 33
What Are the Leading AI and ML Technologies and Algorithms?. . . . 34
ChatGPT and the Leading AI and ML Technologies: Exploring
Capabilities and Applications.. . . . . . . . . . 43
Understanding the Two Categories of AI: Capability-Based Types and
Functionality-Based Types. . . . . . . . 52
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study. . . 53
Reflecting on the Societal and Ethical Implications of AI Technologies.. .
54
Assessing Future Trends and Emerging Developments in AI and ML
Technologies.. . . . . . . . . . . . . 56
Summary. . . . . . . . . . . . . . 57
Test Your Skills. . . . . . . . . . . . . 59
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with
Appropriate Machine Learning Techniques.. . . . . . . . 61
Exercise 2-2: Exploring AI and ML Technologies.. . . . . . . 63
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware.. . . 63
Exercise 2-4: Understanding the Two Categories of AI.. . . . . . 64
Exercise 2-5: Future Trends and Emerging Developments in AI and ML
Technologies. . . . . . . . . . . . . . 64
3 Generative AI and Large Language Models.. . . . . . . 65
Introduction to Generative AI and LLMs. . . . . . . . 66
Large Language Models (LLMs): Revolutionizing Natural Language Processing
(NLP). . . . . . . . . . . 88
Hugging Face.. . . . . . . . . . . . . 95
Auto-GPT: A Revolutionary Step in Autonomous AI Applications. . . . 97
Summary. . . . . . . . . . . . . . 98
Test Your Skills. . . . . . . . . . . . . 99
Exercise 3-1: Hugging Face.. . . . . . . . . . . 102
Exercise 3-2: Transformers in AI. . . . . . . . . . 102
Additional Resources. . . . . . . . . . . . 104
4 The Cornerstones of AI and ML Security.. . . . . . . . 105
Recognizing the Need for AI Security.. . . . . . . . . 105
Adversarial Attacks.. . . . . . . . . . . . 107
Data Poisoning Attacks. . . . . . . . . . . 109
OWASP Top Ten for LLMs. . . . . . . . . . . 112
Countermeasures Against Model Stealing Attacks. . . . . . 124
Membership Inference Attacks.. . . . . . . . . . 124
Evasion Attacks.. . . . . . . . . . . . . 130
Model Inversion Attacks.. . . . . . . . . . . 135
Backdoor Attacks. . . . . . . . . . . . . 137
Exploring Defensive Measures.. . . . . . . . . . 137
Summary. . . . . . . . . . . . . . 138
Test Your Skills. . . . . . . . . . . . . 140
Additional Resources. . . . . . . . . . . . 142
5 Hacking AI Systems.. . . . . . . . . . . . 143
Hacking FakeMedAI. . . . . . . . . . . . 143
MITRE ATLAS.. . . . . . . . . . . . . 146
A Deep Dive into the AI and ML Attack Tactics and Techniques.. . . . 147
Exploiting Prompt Injection.. . . . . . . . . . 161
Red-Teaming AI Models. . . . . . . . . . . 162
Summary. . . . . . . . . . . . . . 162
Test Your Skills. . . . . . . . . . . . . 163
Exercise 5-1: Understanding the MITRE ATT&CK Framework.. . . . 166
Exercise 5-2: Exploring the MITRE ATLAS Framework.. . . . . . 166
6 System and Infrastructure Security. . . . . . . . . 167
The Vulnerabilities and Risks Associated with AI Systems and Their
Potential Impact. . . . . . . . . . . . 167
AI BOMs. . . . . . . . . . . . . . 176
Data Security Vulnerabilities.. . . . . . . . . . 177
Cloud Security Vulnerabilities.. . . . . . . . . . 179
Secure Design Principles for AI Systems.. . . . . . . . 182
AI Model Security.. . . . . . . . . . . . 183
Infrastructure Security for AI Systems. . . . . . . . . 184
Threat Detection and Incident Response for AI Systems.. . . . . 190
Additional Security Technologies and Considerations for AI Systems. . . 193
Summary. . . . . . . . . . . . . . 195
Test Your Skills. . . . . . . . . . . . . 196
Additional Resources. . . . . . . . . . . . 197
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused
World.. . . . . . . . . . . . . 199
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and
Privacy Concerns?.. . . . . . . . . . 200
What Are the Challenges Posed by AI in Terms of Privacy Protection, and
What Is the Importance of Privacy and Ethics in AI Development and
Deployment?. . . . . . . . . 201
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications.
. . . . . . . . . . . 203
Data Collection and Data Storage in AI Algorithms: Potential Risks and
Ethical Privacy Concerns. . . . . . . . 206
The Moral Tapestry of AI and ChatGPT.. . . . . . . . 212
Preserving Privacy, Unleashing Knowledge: Differential Privacy and
Federated Learning in the Age of Data Security.. . . . . . 223
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in
AI Systems.. . . . . . . . . . 224
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in
AI and ChatGPT.. . . . . . . . . 226
Summary. . . . . . . . . . . . . . 232
Test Your Skills. . . . . . . . . . . . . 234
Exercise 7-1: Privacy Concerns and Ethical Implications of AI. . . . 237
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI
Algorithms.. . . . . . . . . . . . . 238
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI. . . . 238
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers.. . . . . 239
8 Legal and Regulatory Compliance for AI Systems.. . . . . 241
Legal and Regulatory Landscape.. . . . . . . . . 242
Compliance with AI Legal and Regulatory Data Protection Laws. . . 245
Intellectual Property Issues in Conversational AI.. . . . . . 247
Unraveling Liability and Accountability in the Age of AI. . . . . 249
Ethical Development and Deployment of AI Systems: Strategies for Effective
Governance and Risk Management.. . . . . . 252
International Collaboration and Standards in AI. . . . . . . 255
Future Trends and Outlook in AI Compliance.. . . . . . . 257
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum
Computing, and Novel Cyberattacks in Oxford, 2050. . . . 260
Summary. . . . . . . . . . . . . . 261
Test Your Skills. . . . . . . . . . . . . 263
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws.. .
. . . . . . . . . . 266
Exercise 8-2: Understanding Liability and Accountability in AI Systems. . .
. . . . . . . . . . . 266
Exercise 8-3: International Collaboration and Standards in AI.. . . . 267
Test Your Skills Answers and Solutions. . . . . . . . . 269
9780138268459, TOC, 1/4/2024
Preface.. . . . . . . . . . . . . . . . . xvii
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning
(ML).. . . . . . . . . . . . 1
The Story of Eva. . . . . . . . . . . . . 2
The Origins.. . . . . . . . . . . . . . 3
Advancements of Artificial Intelligence.. . . . . . . . . 5
Understanding AI and ML. . . . . . . . . . . 8
Concluding the Story of Eva.. . . . . . . . . . . 25
Summary. . . . . . . . . . . . . . 26
Test Your Skills. . . . . . . . . . . . . 27
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of
AI.. . . . . . . . . . . . 29
Exercise 1-2: Understanding AI and ML. . . . . . . . . 29
Exercise 1-3: Comparison of ML Algorithms.. . . . . . . . 30
Exercise 1-4: Assessing Applications of ML Algorithms. . . . . . 31
2 Fundamentals of AI and ML Technologies and Implementations.. . 33
What Are the Leading AI and ML Technologies and Algorithms?. . . . 34
ChatGPT and the Leading AI and ML Technologies: Exploring
Capabilities and Applications.. . . . . . . . . . 43
Understanding the Two Categories of AI: Capability-Based Types and
Functionality-Based Types. . . . . . . . 52
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study. . . 53
Reflecting on the Societal and Ethical Implications of AI Technologies.. .
54
Assessing Future Trends and Emerging Developments in AI and ML
Technologies.. . . . . . . . . . . . . 56
Summary. . . . . . . . . . . . . . 57
Test Your Skills. . . . . . . . . . . . . 59
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with
Appropriate Machine Learning Techniques.. . . . . . . . 61
Exercise 2-2: Exploring AI and ML Technologies.. . . . . . . 63
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware.. . . 63
Exercise 2-4: Understanding the Two Categories of AI.. . . . . . 64
Exercise 2-5: Future Trends and Emerging Developments in AI and ML
Technologies. . . . . . . . . . . . . . 64
3 Generative AI and Large Language Models.. . . . . . . 65
Introduction to Generative AI and LLMs. . . . . . . . 66
Large Language Models (LLMs): Revolutionizing Natural Language Processing
(NLP). . . . . . . . . . . 88
Hugging Face.. . . . . . . . . . . . . 95
Auto-GPT: A Revolutionary Step in Autonomous AI Applications. . . . 97
Summary. . . . . . . . . . . . . . 98
Test Your Skills. . . . . . . . . . . . . 99
Exercise 3-1: Hugging Face.. . . . . . . . . . . 102
Exercise 3-2: Transformers in AI. . . . . . . . . . 102
Additional Resources. . . . . . . . . . . . 104
4 The Cornerstones of AI and ML Security.. . . . . . . . 105
Recognizing the Need for AI Security.. . . . . . . . . 105
Adversarial Attacks.. . . . . . . . . . . . 107
Data Poisoning Attacks. . . . . . . . . . . 109
OWASP Top Ten for LLMs. . . . . . . . . . . 112
Countermeasures Against Model Stealing Attacks. . . . . . 124
Membership Inference Attacks.. . . . . . . . . . 124
Evasion Attacks.. . . . . . . . . . . . . 130
Model Inversion Attacks.. . . . . . . . . . . 135
Backdoor Attacks. . . . . . . . . . . . . 137
Exploring Defensive Measures.. . . . . . . . . . 137
Summary. . . . . . . . . . . . . . 138
Test Your Skills. . . . . . . . . . . . . 140
Additional Resources. . . . . . . . . . . . 142
5 Hacking AI Systems.. . . . . . . . . . . . 143
Hacking FakeMedAI. . . . . . . . . . . . 143
MITRE ATLAS.. . . . . . . . . . . . . 146
A Deep Dive into the AI and ML Attack Tactics and Techniques.. . . . 147
Exploiting Prompt Injection.. . . . . . . . . . 161
Red-Teaming AI Models. . . . . . . . . . . 162
Summary. . . . . . . . . . . . . . 162
Test Your Skills. . . . . . . . . . . . . 163
Exercise 5-1: Understanding the MITRE ATT&CK Framework.. . . . 166
Exercise 5-2: Exploring the MITRE ATLAS Framework.. . . . . . 166
6 System and Infrastructure Security. . . . . . . . . 167
The Vulnerabilities and Risks Associated with AI Systems and Their
Potential Impact. . . . . . . . . . . . 167
AI BOMs. . . . . . . . . . . . . . 176
Data Security Vulnerabilities.. . . . . . . . . . 177
Cloud Security Vulnerabilities.. . . . . . . . . . 179
Secure Design Principles for AI Systems.. . . . . . . . 182
AI Model Security.. . . . . . . . . . . . 183
Infrastructure Security for AI Systems. . . . . . . . . 184
Threat Detection and Incident Response for AI Systems.. . . . . 190
Additional Security Technologies and Considerations for AI Systems. . . 193
Summary. . . . . . . . . . . . . . 195
Test Your Skills. . . . . . . . . . . . . 196
Additional Resources. . . . . . . . . . . . 197
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused
World.. . . . . . . . . . . . . 199
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and
Privacy Concerns?.. . . . . . . . . . 200
What Are the Challenges Posed by AI in Terms of Privacy Protection, and
What Is the Importance of Privacy and Ethics in AI Development and
Deployment?. . . . . . . . . 201
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications.
. . . . . . . . . . . 203
Data Collection and Data Storage in AI Algorithms: Potential Risks and
Ethical Privacy Concerns. . . . . . . . 206
The Moral Tapestry of AI and ChatGPT.. . . . . . . . 212
Preserving Privacy, Unleashing Knowledge: Differential Privacy and
Federated Learning in the Age of Data Security.. . . . . . 223
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in
AI Systems.. . . . . . . . . . 224
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in
AI and ChatGPT.. . . . . . . . . 226
Summary. . . . . . . . . . . . . . 232
Test Your Skills. . . . . . . . . . . . . 234
Exercise 7-1: Privacy Concerns and Ethical Implications of AI. . . . 237
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI
Algorithms.. . . . . . . . . . . . . 238
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI. . . . 238
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers.. . . . . 239
8 Legal and Regulatory Compliance for AI Systems.. . . . . 241
Legal and Regulatory Landscape.. . . . . . . . . 242
Compliance with AI Legal and Regulatory Data Protection Laws. . . 245
Intellectual Property Issues in Conversational AI.. . . . . . 247
Unraveling Liability and Accountability in the Age of AI. . . . . 249
Ethical Development and Deployment of AI Systems: Strategies for Effective
Governance and Risk Management.. . . . . . 252
International Collaboration and Standards in AI. . . . . . . 255
Future Trends and Outlook in AI Compliance.. . . . . . . 257
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum
Computing, and Novel Cyberattacks in Oxford, 2050. . . . 260
Summary. . . . . . . . . . . . . . 261
Test Your Skills. . . . . . . . . . . . . 263
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws.. .
. . . . . . . . . . 266
Exercise 8-2: Understanding Liability and Accountability in AI Systems. . .
. . . . . . . . . . . 266
Exercise 8-3: International Collaboration and Standards in AI.. . . . 267
Test Your Skills Answers and Solutions. . . . . . . . . 269
9780138268459, TOC, 1/4/2024
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning
(ML).. . . . . . . . . . . . 1
The Story of Eva. . . . . . . . . . . . . 2
The Origins.. . . . . . . . . . . . . . 3
Advancements of Artificial Intelligence.. . . . . . . . . 5
Understanding AI and ML. . . . . . . . . . . 8
Concluding the Story of Eva.. . . . . . . . . . . 25
Summary. . . . . . . . . . . . . . 26
Test Your Skills. . . . . . . . . . . . . 27
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of
AI.. . . . . . . . . . . . 29
Exercise 1-2: Understanding AI and ML. . . . . . . . . 29
Exercise 1-3: Comparison of ML Algorithms.. . . . . . . . 30
Exercise 1-4: Assessing Applications of ML Algorithms. . . . . . 31
2 Fundamentals of AI and ML Technologies and Implementations.. . 33
What Are the Leading AI and ML Technologies and Algorithms?. . . . 34
ChatGPT and the Leading AI and ML Technologies: Exploring
Capabilities and Applications.. . . . . . . . . . 43
Understanding the Two Categories of AI: Capability-Based Types and
Functionality-Based Types. . . . . . . . 52
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study. . . 53
Reflecting on the Societal and Ethical Implications of AI Technologies.. .
54
Assessing Future Trends and Emerging Developments in AI and ML
Technologies.. . . . . . . . . . . . . 56
Summary. . . . . . . . . . . . . . 57
Test Your Skills. . . . . . . . . . . . . 59
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with
Appropriate Machine Learning Techniques.. . . . . . . . 61
Exercise 2-2: Exploring AI and ML Technologies.. . . . . . . 63
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware.. . . 63
Exercise 2-4: Understanding the Two Categories of AI.. . . . . . 64
Exercise 2-5: Future Trends and Emerging Developments in AI and ML
Technologies. . . . . . . . . . . . . . 64
3 Generative AI and Large Language Models.. . . . . . . 65
Introduction to Generative AI and LLMs. . . . . . . . 66
Large Language Models (LLMs): Revolutionizing Natural Language Processing
(NLP). . . . . . . . . . . 88
Hugging Face.. . . . . . . . . . . . . 95
Auto-GPT: A Revolutionary Step in Autonomous AI Applications. . . . 97
Summary. . . . . . . . . . . . . . 98
Test Your Skills. . . . . . . . . . . . . 99
Exercise 3-1: Hugging Face.. . . . . . . . . . . 102
Exercise 3-2: Transformers in AI. . . . . . . . . . 102
Additional Resources. . . . . . . . . . . . 104
4 The Cornerstones of AI and ML Security.. . . . . . . . 105
Recognizing the Need for AI Security.. . . . . . . . . 105
Adversarial Attacks.. . . . . . . . . . . . 107
Data Poisoning Attacks. . . . . . . . . . . 109
OWASP Top Ten for LLMs. . . . . . . . . . . 112
Countermeasures Against Model Stealing Attacks. . . . . . 124
Membership Inference Attacks.. . . . . . . . . . 124
Evasion Attacks.. . . . . . . . . . . . . 130
Model Inversion Attacks.. . . . . . . . . . . 135
Backdoor Attacks. . . . . . . . . . . . . 137
Exploring Defensive Measures.. . . . . . . . . . 137
Summary. . . . . . . . . . . . . . 138
Test Your Skills. . . . . . . . . . . . . 140
Additional Resources. . . . . . . . . . . . 142
5 Hacking AI Systems.. . . . . . . . . . . . 143
Hacking FakeMedAI. . . . . . . . . . . . 143
MITRE ATLAS.. . . . . . . . . . . . . 146
A Deep Dive into the AI and ML Attack Tactics and Techniques.. . . . 147
Exploiting Prompt Injection.. . . . . . . . . . 161
Red-Teaming AI Models. . . . . . . . . . . 162
Summary. . . . . . . . . . . . . . 162
Test Your Skills. . . . . . . . . . . . . 163
Exercise 5-1: Understanding the MITRE ATT&CK Framework.. . . . 166
Exercise 5-2: Exploring the MITRE ATLAS Framework.. . . . . . 166
6 System and Infrastructure Security. . . . . . . . . 167
The Vulnerabilities and Risks Associated with AI Systems and Their
Potential Impact. . . . . . . . . . . . 167
AI BOMs. . . . . . . . . . . . . . 176
Data Security Vulnerabilities.. . . . . . . . . . 177
Cloud Security Vulnerabilities.. . . . . . . . . . 179
Secure Design Principles for AI Systems.. . . . . . . . 182
AI Model Security.. . . . . . . . . . . . 183
Infrastructure Security for AI Systems. . . . . . . . . 184
Threat Detection and Incident Response for AI Systems.. . . . . 190
Additional Security Technologies and Considerations for AI Systems. . . 193
Summary. . . . . . . . . . . . . . 195
Test Your Skills. . . . . . . . . . . . . 196
Additional Resources. . . . . . . . . . . . 197
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused
World.. . . . . . . . . . . . . 199
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and
Privacy Concerns?.. . . . . . . . . . 200
What Are the Challenges Posed by AI in Terms of Privacy Protection, and
What Is the Importance of Privacy and Ethics in AI Development and
Deployment?. . . . . . . . . 201
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications.
. . . . . . . . . . . 203
Data Collection and Data Storage in AI Algorithms: Potential Risks and
Ethical Privacy Concerns. . . . . . . . 206
The Moral Tapestry of AI and ChatGPT.. . . . . . . . 212
Preserving Privacy, Unleashing Knowledge: Differential Privacy and
Federated Learning in the Age of Data Security.. . . . . . 223
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in
AI Systems.. . . . . . . . . . 224
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in
AI and ChatGPT.. . . . . . . . . 226
Summary. . . . . . . . . . . . . . 232
Test Your Skills. . . . . . . . . . . . . 234
Exercise 7-1: Privacy Concerns and Ethical Implications of AI. . . . 237
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI
Algorithms.. . . . . . . . . . . . . 238
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI. . . . 238
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers.. . . . . 239
8 Legal and Regulatory Compliance for AI Systems.. . . . . 241
Legal and Regulatory Landscape.. . . . . . . . . 242
Compliance with AI Legal and Regulatory Data Protection Laws. . . 245
Intellectual Property Issues in Conversational AI.. . . . . . 247
Unraveling Liability and Accountability in the Age of AI. . . . . 249
Ethical Development and Deployment of AI Systems: Strategies for Effective
Governance and Risk Management.. . . . . . 252
International Collaboration and Standards in AI. . . . . . . 255
Future Trends and Outlook in AI Compliance.. . . . . . . 257
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum
Computing, and Novel Cyberattacks in Oxford, 2050. . . . 260
Summary. . . . . . . . . . . . . . 261
Test Your Skills. . . . . . . . . . . . . 263
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws.. .
. . . . . . . . . . 266
Exercise 8-2: Understanding Liability and Accountability in AI Systems. . .
. . . . . . . . . . . 266
Exercise 8-3: International Collaboration and Standards in AI.. . . . 267
Test Your Skills Answers and Solutions. . . . . . . . . 269
9780138268459, TOC, 1/4/2024