This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| AI Security Questions | |
| https://www.dhs.gov/news/2024/11/14/groundbreaking-framework-safe-and-secure-deployment-ai-critical-infrastructure | |
| The article from CISA and DHS outlines a compliance framework to mitigate AI risks in critical infrastructure, responding to Executive Order 14110. The guidelines categorize AI risks into three types: attacks using AI, attacks targeting AI systems, and failures in AI design and implementation. They integrate the NIST AI Risk Management Framework, focusing on governance, mapping, measurement, & management of AI risks. | |
| Incorporating tools like IriusRisk for threat modeling enhances this framework. IriusRisk helps identify and mitigate risks through four key questions: | |
| 1. What are we working on?- Creating a system architecture diagram. | |
| 2. What can go wrong?- Identifying threats using the STRIDE model. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Key Aspects of Attack Surface Measurement | |
| Understanding and measuring the attack surface is crucial for organizations aiming to enhance their cybersecurity posture. The attack surface represents all the potential entry points where an attacker could exploit vulnerabilities. | |
| Comprehensive Asset Inventory | |
| - Maintain a detailed inventory of all assets, including hardware, software, applications, and data. | |
| - A complete asset inventory helpsidentify potential vulnerabilities and exposure points | |
| Identification Of Entry Points | |
| - Map out all possible entry points into the system, such as APIs, user interfaces, and network connections |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Compiled source # | |
| ################### | |
| *.com | |
| *.class | |
| *.dll | |
| *.exe | |
| *.o | |
| *.so | |
| # Packages # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Neural Network | |
| - A machine learning process that teaches computers to process data in a way thats similar to the human brain | |
| - Type of deep learning that uses a layered structure of interconnected nodes (neurons) that resemble the brain | |
| - Types | |
| - Convolutional Neural Networks (CNNs) | |
| - Good at finding patterns in images to recognize objects, classes, and categories | |
| - Use principles of linear algebra (matrix multiplication) to find patterns | |
| - Feedforward Neural Networks | |
| - One of the simplest types of neural networks | |
| - Info moves in one direction |