Summary
In this chapter, you learned the basics of user authentication and access control that you can use in your AI projects. Similar to other computer systems, AI systems need to control access to their functionality because they can contain critical capabilities and highly restricted data, as you learned in this chapter. The chapter included a theoretical introduction, practical considerations, and exercises that helped you enhance your knowledge. Furthermore, it included an example use case of AI methods used for user authentication, in particular face biometrics.
The next chapter introduces AI methods to enhance another area of cybersecurity – threat intelligence.