Cybersecurity

Computer Security: How AI are you?

Artificial intelligence (AI) is on everyone’s mind: autopilot for Teslas, deepfakes for fun or fake news, DALL·E 2 for the untalented artist, big data and machine learning for data analysis. And CERN is no exception. While all those AI applications come with pros and cons, with benefits and risks, AI systems deserve their own consideration when it comes to computer security. So we took the opportunity to ask a renowned expert in AI, ChatGPT, how best to secure AI systems. Here’s the answer we got:

“Artificial intelligence (AI) is a rapidly advancing technology that has the potential to greatly benefit society in a variety of ways. However, it also poses new security risks that must be addressed. Here are some best practices for ensuring the security of AI systems:

  • Secure data inputs and outputs. AI systems rely on large amounts of data to learn and make decisions. This data must be protected from unauthorised access and tampering to ensure the integrity and accuracy of the system.
  • Use secure algorithms and protocols. AI systems use complex algorithms and protocols to process data and make decisions. It is important to use secure algorithms that have been thoroughly vetted and tested, and to ensure that all communication between the AI system and other systems is encrypted.
  • Monitor and audit AI systems. Regular monitoring and auditing of AI systems can help detect and prevent security breaches. This includes monitoring for unusual or suspicious behavior, as well as auditing the system’s log files for any signs of unauthorised access or tampering.
  • Implement access controls. Access controls can help prevent unauthorised access to AI systems and the data they process. This includes setting up user accounts and assigning roles and permissions, as well as implementing authentication mechanisms such as biometrics or multi-factor authentication.
  • Stay informed and educated. As AI technology continues to evolve, it is important to stay informed about the latest security risks and best practices. This includes attending relevant conferences and workshops, reading industry publications and staying up-to-date with software updates and patches.
  • Be prepared for the worst. AI systems can be vulnerable to cyberattacks, and it is important to have a plan in place to respond to a security incident. This includes having a trained incident response team, and regularly testing incident response plans to ensure they are effective.

Source

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

14 heures ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

14 heures ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

3 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

4 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

5 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

5 jours ago

This website uses cookies.