Summary
If you take anything at all away from this chapter, it should be that hackers are real people. The thought that a hacker is some mindless entity out there, somewhere, whose only goal in life is to ruin your day is a shortcut to getting in your own way when it comes to dealing with hacker-created security issues. Understanding hacker behavior, realizing that hackers attack specific targets for a reason, considering that a form of attack is designed to emphasize hacker strengths, and then tailoring a solution that your organization will actually use are all part of a strategy to thwart hacker incursions. This chapter has reviewed the hacker in a unique way to help you create better, more flexible solutions.
Chapter 10 is a different take on ML security, deepfakes. A deepfake is an output of an ML application, such as a graphic or audio file, that can fool human experts easily in many cases. You may think deepfakes are more science fiction than anything else. Yet, when you...