Cybersecurity in AI

Automated feature learning: Deep learning algorithms automatically extract features from data, eliminating the need for hand-crafting.

Enhanced data handling: Can handle large and complex datasets effectively, leading to more robust models.

A stop sign can be shown as speed limit 40kmph.

Poisoning Attack: Attack during training phase

Attackers perturb the training set or the model

Insert malicious inputs in the training set (eg, that contain a trigger pattern to backdoor the model)

Change the labels to training inputs

Change the weights of a deployed trained model

Distribute poisoned pre-trained models to the public

The goal is to corrupt the ML model so that it performs incorrectly for some or all inputs

The adversary should obtain access to the training database or to the trained model

White box and Black box attacks

Adversarial attacks can be further classified into:

White box attack:

Aftackers have full knowledge about the ML model

I.e, they have access to parameters, hyperparameters, gradients, architecture, ete

Black box attack

Attackers don’t have access to the MI. model parameters, gradients, architecture

Attackers may query the black-box model (also known as the oracle) to obtain knowledge about the model

Black box attacks are more realistic, because model designers usually do not open source the model parameters

Non-target and Targets Attack

Non-targeted attack:

The goal is to mislead the classifier for an adversarial input to output any label other than the ground-truth label

E.g., perturb an image of a military tank, so that the model predicts it is any other class than a military tank

Targeted attack:

The goal is to mislead the classifier to predict a target label for an adversarial input

More difficult, in comparison to non-targeted attack

E.g. perturb an image of a turtle, so that the model predicts it is a riffle

How to find Adversial examples: intuition

Take an image x, which is labeled by the classifier (a deep model) as class y. le., C(x) – y

Create an adversarial imagé Xac by adding small perturbations & to the original image x, le., Kado – x + d, such that the distance D(x, Xad) – D(x, x 4d) is minimal

The aim for a non-targeted attack is that the classifier assigns a label to the adversarial image that is different than y, l.e, C(xav) – C(x+ б) / y

for a targeted attack, the aim is that
C(xadv) – C(x + d) = t

y, where t is the target class

Federated learning

Multiple hospitals are collaborated to work for cancer but due to HIPAA they can’t shared data but access. They can share by using Federated Learning. The weights of the machine model can be shared. Thism paradigm is called as Federated Learning.

Attack in Deep Federated Model

Various kinds of attacks in a federated learning paradigm, such as inference attacks, reconstruction attacks, poisoning attacks,

In inference attacks, the attacker can extract sensitive information about the training data from the learned features or parameters of the model, thus causing privacy issues.

Reconstruction attacks, on the other hand, try to generate the training samples using the leaked model parameters.

Poising attack in deep federated model

Poisoning attacke in a federated learning paradigo can ba categoried as data posoning ettacks or model posenira allacka
Both these attacks are designed to alter the behavior of the malicious client’s model

In data poisoning attacks, the attacker tries manipulating the training date by changing the ground truth label or carefully poisoning the existing data

la model poisoning attacks, the attacker aime to alter the model parameters or gradients before sending them to the global server.

Some clients try to decrease the accuracy of model to cause malicious attempts.

Cybersecurity: Protecting systems, networks and programs from digital attacks

If your organization experiences a cyberattack, sensitive information can be accessed, changed or destroyed, money can be extorted and/or business processes can be interrupted.

While sophisticated hacking is a valid threat to organizations, it is rarely the root cause of a data breach. The vast majority of data breaches and cybersecurity incidents are actually caused by a breakdown of basic cybersecurity processes and controls.

Cyber threats to watch out for in 2024

  • Generative AI
  • Third party
  • Ransomware

Case Study – Al Deepfake Scam

Employee working out of the Company’s Hong Kong office received a message from the UK-based CFO, asking for a wire transfer to be made.

Employee was very suspicious and initially thought it was a phishing attack.

This employee was convinced to join a video call with the CFO and several other employees.

He recognized people on the call, so he made a payment of 25m dollars USD.

It turns out that everyone on the video call was Al generated, and the employee was talking with scammers the entire time.

Regulatory scrutiny will increase

Vendors are third party. There will be an increased focus on vendor risk management, as it pertains to cybersecurity. Do they have SOC2 report, do they have ISO27001 certificate?

There will be an increase in breaches and in the creativity of cyber attacks

Concern around the effectiveness of cyber prop forms to accurately present risk will continue

Digital Forensics Role in Cyber Security

Leveraging Digital Forensics in Mitigating Cyber Threats

Key Role of Digital Forensics in Countering Cyber Attacks

Malware Analysis

In-depth examination of malware to understand attack vectors and prevent future incidents.

Preserve Evidence

Digital forensics ensures the preservation of evidence critical for investigations and legal proceedings.

Identify Attack Origins

Through digital forensics, the origins of cyber attacks can be traced, enabling proactive security measures.

Collaborative Strategies for Cyber Security

The Vital Role of Collaboration in Countering Cyber Attacks

Emphasizing the importance of collaboration between digital forensics experts and law enforcement agencies

Cybersecurity Insights

Impact Assesment of Cyber Attacks

It is a process to determine the attack surface that an organization has and what impact will be caused if cyber attack occours.

Impact on Finance Sector

Uncover financial frauds causes and secure sensitive data

Security for Personal Data

Protect PIl, PIFI, PIHI and ensure data integrity

Government Sector Defense

Investigate breaches to safeguard national security

Forensic requirements

A forensic readiness plan is designed to prepare an organization for an unforeseen incidents and data losses.

An organization should review and evaluate security-technical controls, policies,

procedures, and skill sets

—as part of its preparation.

Staff members should be trained in incident response procedures so that they know their role in digital evidence processing and how important and sensitive it is in the event of an incident.

Due to constant monitoring and review, forensic readiness also helps ensure that employees comply with the organization’s policies and regulatory requirements.

Risk Mitigation

Enhances proactive identification and mitigation of cyber threats.

Legal Compliance

Ensures adherence to regulatory requirements and data protection laws.

Reputation Protection

Safeguards brand image and customer trust in the event of security breaches.

Incident Response

Improvement

Facilitates swift and effective responses to cyber incidents for damage control.

Cyber Investigations Challenges

Overcoming Obstacles in Cyber Investigations

Exploring Challenges Encountered in Digital Forensic Investigations

Volatile Digital Evidence

Ephemeral digital evidence poses challenges in preservation and analysis.

Data Access Restrictions

Restricted access to critical data impedes investigation progress.

Encryption Technologies

Encryption tools can hinder data decryption and analysis.

Enhanced Cybersecurity

Digital forensics significantly improves cybersecurity by providing insights into cyber incidents.

Challenges in Implementation

Implementing digital forensic strategies may face challenges such as complex data analysis and resource limitations

Best Practices Importance

Following best practices in digital forensics is crucial for effective cyber attack response and prevention.

Future Trends and Innovations

The future of digital forensics lies in advanced technologies like Al and machine learning for proactive threat dete

Encouraging Proactive Adoption organizations are encouraged to adopt digital forensic strategies proactively to bolster their cybersecurity posture.

Cyber Forensics

“The unique process of identifying, extracting, preserving, analyzing and presenting digital evidence in a legally acceptable manner.”