From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Understanding the NIST taxonomy and terminology of attacks and mitigations

Understanding the NIST taxonomy and terminology of attacks and mitigations

From the course: Certified Ethical Hacker (CEH)

Understanding the NIST taxonomy and terminology of attacks and mitigations

- [Instructor] Let's go over the NIST Taxonomy and the terminology for attacks and mitigations for AI systems. This document that you see here is basically a great resource that was developed by the National Institute of Standards and Technology, which is of course part of the United States Government in collaboration with others in the industry. And actually, as a matter of fact, if you actually go down below, I have two of my colleagues, Alie and Hyrum, they are actually in my company. They used to or they were part of the company called Robust Intelligence that actually Cisco acquired. And basically this framework, they provide a structural approach to understanding and addressing security concerns in artificial intelligence, right? So taxonomy is definitely super important for several reasons. First, it actually offers a common language for discussing AI security, so basically enabling you to understand a semantic analysis of threats, and also to understand the development of…

Contents