Chapter 2: Threat Modelling
Chapter Overview
2.0 Learning Outcomes
2.1 Introduction
2.2 Categories of Attacks
2.3 Adaptive Interplay in ML Security
2.4 Adversary’s Model and Attack Scenario
2.5 Attack Scenarios
2.6 Key Components of Threat Models in ML
2.7 Conclusion: The Future of the AI Arms Race
2.8 Chapter Summary
2.9 End of Chapter Activities
2.10 Case Study: The Evolving Threat Landscape of ChatGPT – A Security Arms Race