AI Attacks
100

This type of AI attack involves feeding a model misleading inputs to manipulate its output.

What is an Adversarial Attack?

An adversarial attack is a malicious attempt to trick machine learning models into making incorrect predictions. These attacks are designed to exploit vulnerabilities in the model by manipulating the input data. 

How do adversarial attacks work?

  • Input data manipulation: Attackers alter the input data to trick the model into making incorrect predictions.

  • Model parameter changes: Attackers change the parameters or architecture of the AI model itself.

  • Poisoning attacks: Attackers disrupt the model during the training phase.

  • Evasion attacks: Attackers disrupt the model after it has been trained.
200

A malicious AI bot designed to spread disinformation is commonly known as this.

What is a social bot?

A good example of a social bot would be a Twitter account that automatically retweets and comments on posts related to a specific topic, like a political campaign, often using pre-written phrases to mimic human engagement, even if the account is not operated by a real person; another example would be a brand's Facebook Messenger bot that answers common customer queries and provides basic product information automatically.

300

This type of cyberattack involves using AI to mimic legitimate users for unauthorized access

What is AI-powered identity spoofing?

How it can be used maliciously:

  • Financial fraud: Scammers can impersonate bank officials or other trusted individuals to trick people into revealing sensitive financial information.
  • Social engineering: Manipulating people's trust by appearing to be someone they know through fake online interactions.
  • Reputation damage: Creating fake content to damage someone's public image. 
400

This type of cybersecurity attack involves overwhelming a network with traffic to make it unavailable.

What is a Distributed Denial-of-Service (DDoS) attack?

How it works:

  • Hackers use a network of infected devices, called a botnet, to send a large number of requests to the target. 


  • The target's resources are overwhelmed, causing it to crash or become inaccessible. 


  • Legitimate users are unable to access the target, which can lead to lost business, reputation damage, and other consequences. 
M
e
n
u