Table of Contents
How to put cybersecurity at the heart of AI systems
Who are the AI ​​Cybersecurity Guidelines for?
Home Technology peripherals AI 18 countries jointly issue AI safety guidelines

18 countries jointly issue AI safety guidelines

Nov 28, 2023 pm 05:17 PM
cyber security ai

18 countries jointly issue AI safety guidelines

The UK’s National Cyber ​​Security Center (NCSC) has released new guidance that can help developers and providers of AI systems “build AI systems that work as intended and are available when needed” , and work without leaking sensitive data to unauthorized parties."

How to put cybersecurity at the heart of AI systems

Guidelines for developing secure AI systems include ML Four Key Stages of the Application Development Lifecycle

Secure design depends on all involved - system owners, developers and users - being aware of the unique security risks faced by AI systems and being taught how to avoid them .

It is mentioned in the guidelines: "System threats should be modeled and the system should be designed from a security, functional and performance perspective." Additionally, developers should consider security benefits and trade-offs when selecting AI models ( It is not that the more complex the better)

Ensuring supply chain security is a prerequisite for achieving safe development. At the same time, it is necessary to protect assets (such as models, data, prompts, software, logs, etc.) and record models, data sets and elements. Tips for Data Systems, and Managing Technical Debt

Secure deployment requires secure infrastructure (in every part of the system lifecycle) and continuous protection of schema and data from direct and indirect access. In order to deal with (inevitable) security incidents, a comprehensive incident response, escalation and remediation plan must be developed.

AI should be released responsibly, meaning that it should be released only after its safety has been thoroughly evaluated and after users have evaluated limitations or potential failure modes

Ideally, the most Secure settings will be integrated into the system as the only option. When configuration is required, the default options should be generally safe against common threats (i.e., safe by default). You apply controls to prevent your system from being used or deployed in a malicious manner.

Ultimately, to secure operations and maintenance, operators are advised to monitor the behavior and inputs of their systems, enable automatic updates and maintain transparency and responsiveness, especially in the event of failures such as vulnerabilities

Who are the AI ​​Cybersecurity Guidelines for?

These guidelines were drafted with the help of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and similar agencies and CERTs from around the world, as well as industry experts of.

“The new UK-led guidelines are the first to be agreed globally, and they will help developers of any system using AI make informed cybersecurity decisions at every stage of the development process. Decision making – whether these systems are created from scratch or built on tools and services provided by others,” the UK’s National Cyber ​​Security Center noted.

"[Guidelines] are primarily intended for providers of AI systems, whether based on models hosted by the organization or using external application programming interfaces. However, we urge all stakeholders (including data scientists, developers , managers, policymakers, and risk owners) read these guidelines to help them make informed decisions about the design, deployment, and operation of their machine learning AI systems.

Prior to issuing these guidelines, the President of the United States Biden issued an executive order to initiate actions aimed at protecting Americans from the potential risks of fraud, privacy threats, discrimination and other abuses from AI systems.

The above is the detailed content of 18 countries jointly issue AI safety guidelines. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to check CentOS HDFS configuration How to check CentOS HDFS configuration Apr 14, 2025 pm 07:21 PM

Complete Guide to Checking HDFS Configuration in CentOS Systems This article will guide you how to effectively check the configuration and running status of HDFS on CentOS systems. The following steps will help you fully understand the setup and operation of HDFS. Verify Hadoop environment variable: First, make sure the Hadoop environment variable is set correctly. In the terminal, execute the following command to verify that Hadoop is installed and configured correctly: hadoopversion Check HDFS configuration file: The core configuration file of HDFS is located in the /etc/hadoop/conf/ directory, where core-site.xml and hdfs-site.xml are crucial. use

Centos shutdown command line Centos shutdown command line Apr 14, 2025 pm 09:12 PM

The CentOS shutdown command is shutdown, and the syntax is shutdown [Options] Time [Information]. Options include: -h Stop the system immediately; -P Turn off the power after shutdown; -r restart; -t Waiting time. Times can be specified as immediate (now), minutes ( minutes), or a specific time (hh:mm). Added information can be displayed in system messages.

What are the backup methods for GitLab on CentOS What are the backup methods for GitLab on CentOS Apr 14, 2025 pm 05:33 PM

Backup and Recovery Policy of GitLab under CentOS System In order to ensure data security and recoverability, GitLab on CentOS provides a variety of backup methods. This article will introduce several common backup methods, configuration parameters and recovery processes in detail to help you establish a complete GitLab backup and recovery strategy. 1. Manual backup Use the gitlab-rakegitlab:backup:create command to execute manual backup. This command backs up key information such as GitLab repository, database, users, user groups, keys, and permissions. The default backup file is stored in the /var/opt/gitlab/backups directory. You can modify /etc/gitlab

Centos install mysql Centos install mysql Apr 14, 2025 pm 08:09 PM

Installing MySQL on CentOS involves the following steps: Adding the appropriate MySQL yum source. Execute the yum install mysql-server command to install the MySQL server. Use the mysql_secure_installation command to make security settings, such as setting the root user password. Customize the MySQL configuration file as needed. Tune MySQL parameters and optimize databases for performance.

Detailed explanation of docker principle Detailed explanation of docker principle Apr 14, 2025 pm 11:57 PM

Docker uses Linux kernel features to provide an efficient and isolated application running environment. Its working principle is as follows: 1. The mirror is used as a read-only template, which contains everything you need to run the application; 2. The Union File System (UnionFS) stacks multiple file systems, only storing the differences, saving space and speeding up; 3. The daemon manages the mirrors and containers, and the client uses them for interaction; 4. Namespaces and cgroups implement container isolation and resource limitations; 5. Multiple network modes support container interconnection. Only by understanding these core concepts can you better utilize Docker.

How to view GitLab logs under CentOS How to view GitLab logs under CentOS Apr 14, 2025 pm 06:18 PM

A complete guide to viewing GitLab logs under CentOS system This article will guide you how to view various GitLab logs in CentOS system, including main logs, exception logs, and other related logs. Please note that the log file path may vary depending on the GitLab version and installation method. If the following path does not exist, please check the GitLab installation directory and configuration files. 1. View the main GitLab log Use the following command to view the main log file of the GitLabRails application: Command: sudocat/var/log/gitlab/gitlab-rails/production.log This command will display product

How to operate distributed training of PyTorch on CentOS How to operate distributed training of PyTorch on CentOS Apr 14, 2025 pm 06:36 PM

PyTorch distributed training on CentOS system requires the following steps: PyTorch installation: The premise is that Python and pip are installed in CentOS system. Depending on your CUDA version, get the appropriate installation command from the PyTorch official website. For CPU-only training, you can use the following command: pipinstalltorchtorchvisiontorchaudio If you need GPU support, make sure that the corresponding version of CUDA and cuDNN are installed and use the corresponding PyTorch version for installation. Distributed environment configuration: Distributed training usually requires multiple machines or single-machine multiple GPUs. Place

How is the GPU support for PyTorch on CentOS How is the GPU support for PyTorch on CentOS Apr 14, 2025 pm 06:48 PM

Enable PyTorch GPU acceleration on CentOS system requires the installation of CUDA, cuDNN and GPU versions of PyTorch. The following steps will guide you through the process: CUDA and cuDNN installation determine CUDA version compatibility: Use the nvidia-smi command to view the CUDA version supported by your NVIDIA graphics card. For example, your MX450 graphics card may support CUDA11.1 or higher. Download and install CUDAToolkit: Visit the official website of NVIDIACUDAToolkit and download and install the corresponding version according to the highest CUDA version supported by your graphics card. Install cuDNN library:

See all articles