Security Sales & Integration May 2023 - 36

Systems Integration
AI as Ally vs. Adversary
data collected and processed through the AI
system useless.
Another type of AI cyber-attack is AI model
extraction. Th is is where there is the intent to
steal the AI module and reconstruct the data to
respond alternatively to the way it was intendAdversarial
machine
learning,
a technique that
attempts to fool
models with
deceptive data,
is a growing
threat in AI.
ed to respond.
At the top of the list for dangerous potential
targets of compromised AI are autonomous
weapons systems, next brain-computer interfaces
(BCI), self-driving vehicles, 3D printing,
facial recognition, augmented reality, swarm
intelligence, in addition to the already alluded
to deepfakes and bots.
Distinctions need to be made between systems
referred to as automated versus autonomous.
Automated systems perform repetitive
processes that reduce human interaction yet
are still governed by processes and relationships
managed by humans. Autonomous systems (especially
those that rely on AI) can adjust and
modify outcomes without governance or human
interaction.
Defending Against Exploits
Using strong digital encryption
and cybersecurity best practices
must always be top of mind
in the shadow of defending
against the formidable capabilities
and power of AI.
Using strong digital encryption and cybersecurity
best practices must always be top
of mind in the shadow of defending against
the formidable capabilities and power of AI.
Governing the use of AI by the government,
as well as public and private organizations, is
not too far off .
Th e military perspective against weapons of
war is to establish international guidance and
laws of how, when, and under what conditions
AI can be used in confl ict.
Th e U.S. Department of Defense's " Unmanned
Systems Integrated Roadmap " sets out
a concrete plan to develop and deploy weapons
with ever-increasing autonomy in the air, on
land, and at sea in the next 20 years. A defi ning
feature of these autonomous weapons systems
(AWS) is precisely their ability to operate autonomously:
" robotic weapons ... once activated,
can select, and engage targets without
further human intervention. "
As we seek to have greater nonmilitary privacy
controls and protection of personally
identifi able information (PII), there are specifi c
methods that can be implemented to secure and
train AI models. One such process is known as
Privacy Preserving Machine Learning (PPML).
Another involves code obfuscation techniques
that incorporate face blurring with computer
vision recognition models.
Making sure that AI is fully and completely
aligned to human goals is surprisingly diffi cult
and takes careful programming. AI with ambiguous
and ambitious goals are worrisome, as we
don't know what path it might decide to take to
its given goal.
One thing is certain ... we saw it coming! SSI
DARNELL WASHINGTON (dwashington@
securexperts.com) is President and CEO of
SecureXperts.
36
Security Sales & Integration MAY 2023
securitysales.com
SDECORET/STOCK.ADOBE.COM
http://www.securitysales.com

Security Sales & Integration May 2023

Table of Contents for the Digital Edition of Security Sales & Integration May 2023

Security Sales & Integration May 2023 - Cover1
Security Sales & Integration May 2023 - Cover2
Security Sales & Integration May 2023 - 1
Security Sales & Integration May 2023 - 2
Security Sales & Integration May 2023 - 3
Security Sales & Integration May 2023 - 4
Security Sales & Integration May 2023 - 5
Security Sales & Integration May 2023 - 6
Security Sales & Integration May 2023 - 7
Security Sales & Integration May 2023 - 8
Security Sales & Integration May 2023 - 9
Security Sales & Integration May 2023 - 10
Security Sales & Integration May 2023 - 11
Security Sales & Integration May 2023 - 12
Security Sales & Integration May 2023 - 13
Security Sales & Integration May 2023 - 14
Security Sales & Integration May 2023 - 15
Security Sales & Integration May 2023 - 16
Security Sales & Integration May 2023 - 17
Security Sales & Integration May 2023 - 18
Security Sales & Integration May 2023 - 19
Security Sales & Integration May 2023 - 20
Security Sales & Integration May 2023 - 21
Security Sales & Integration May 2023 - 22
Security Sales & Integration May 2023 - 23
Security Sales & Integration May 2023 - 24
Security Sales & Integration May 2023 - 25
Security Sales & Integration May 2023 - 26
Security Sales & Integration May 2023 - 27
Security Sales & Integration May 2023 - 28
Security Sales & Integration May 2023 - 29
Security Sales & Integration May 2023 - 30
Security Sales & Integration May 2023 - 31
Security Sales & Integration May 2023 - 32
Security Sales & Integration May 2023 - 33
Security Sales & Integration May 2023 - 34
Security Sales & Integration May 2023 - 35
Security Sales & Integration May 2023 - 36
Security Sales & Integration May 2023 - 37
Security Sales & Integration May 2023 - 38
Security Sales & Integration May 2023 - 39
Security Sales & Integration May 2023 - 40
Security Sales & Integration May 2023 - 41
Security Sales & Integration May 2023 - 42
Security Sales & Integration May 2023 - 43
Security Sales & Integration May 2023 - 44
Security Sales & Integration May 2023 - 45
Security Sales & Integration May 2023 - 46
Security Sales & Integration May 2023 - 47
Security Sales & Integration May 2023 - 48
Security Sales & Integration May 2023 - 49
Security Sales & Integration May 2023 - 50
Security Sales & Integration May 2023 - 51
Security Sales & Integration May 2023 - 52
Security Sales & Integration May 2023 - 53
Security Sales & Integration May 2023 - 54
Security Sales & Integration May 2023 - 55
Security Sales & Integration May 2023 - 56
Security Sales & Integration May 2023 - Cover3
Security Sales & Integration May 2023 - Cover4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com