Security fundamentals
Before we embark on securing our adversarial AI playground, let’s cover some foundational concepts and approaches in security.
Security evolves around the triad known as CIA and can be described as follows:
- Confidentiality: Protecting data from unauthorized access. For instance, restricting access and encrypting sensitive data ensures that only those possessing the correct decryption key can access it.
- Integrity: Guaranteeing that data remains unchanged during storage or transmission, except by authorized entities. Implementing cryptographic hash functions is one method to verify the integrity of data.
- Availability: Assuring that systems, data, and resources remain accessible to users when required. Load balancing and redundancy are techniques that are often used to uphold system availability during demand surges or system failures.
Frameworks such as the NIST Cybersecurity Framework offer a standardized approach to handling cybersecurity...