← Back to all Books

COMBATING CYBERATTACKS TARGETING THE AI ECOSYSTEM Assessing Threats, Risks, and Vulnerabilities

 

This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and applications utilizing the intelligence gathered from real-world case studies. Lastly, the book presents a very detailed discussion of the defense mechanisms and practical solutions to secure LLMs, GenAI applications, and the AI infrastructure. The chapters are structured with a granular framework, starting with AI concepts, followed by practical assessment techniques based on real-world intelligence, and concluding with required security defenses. Artificial Intelligence (AI) and cybersecurity are deeply intertwined and increasingly essential to modern digital defense strategies. The book is a comprehensive resource for IT professionals, business leaders, and cybersecurity experts for understanding and defending against AI-driven cyberattacks.

 

TABLE OF CONTENTS

1: Introduction to AI: LLMs, GenAI Applications and the AI Infrastructure. 2: The AI Trust, Compliance, and Security. 3: AI Threat Landscape: Dissecting the Risks and Attack Vectors. 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies.              5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure. 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks. Appendix: Machine Learning / AI terms. Index.

ABOUT THE AUTHOR

Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 16 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Empirical Cloud Security 2/E (Mercury Learning) and Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as Black Hat, RSA, APWG, DEFCON, Virus Bulletin, and others.

 

Additional book information
Book ISBN: 9781501520556
Author(s): Aditya K. Sood, PhD
Publisher Mercury Learning & Information
Printed
Add to cart
$51.99
Supplementary Materials
No materials were uploaded for this book