1 points | by thevieart 17 hours ago
1 comments
Chapter 1 — The Cybersecurity AI Ecosystem .......................... 3 • Adjudicator/Broker — “The Arbiter” .................................. 11 • Data Lake & Feature Store ........................................... 14 • WORM & TSA/NTS — Integrity and Time Anchors ........................ 17 • Decision Flow (Detailed Hot Path) .................................. 19 • Local Invariants & Rules ........................................... 22 • QoS & Denial-of-Sense Protection ................................... 25 • Record Schema ...................................................... 27 • Ecosystem Health Metrics ........................................... 29 • Typical Failure Modes .............................................. 31
Chapter 2 — Modern AI-Enabled Threat Model ........................ 34 • Threat Actors; Capability Surface; Extended Kill-Chain ............. 39–41
Chapter 3 — Trustworthy Data Principles .......................... 62
Chapter 6 — Data Poisoning & Timeline (TA01) ..................... 101
Chapter 7 — Adversarial ML & Prompt/Policy Injection (TA02) ..... 147
Chapter 8 — Governance/Policy Poisoning (TA03) .................. 185
Chapter 9 — Absorption Vectors: Data / Policy / Compute (TA04) .. 236
Chapter 10 — ECLIPSE & EXTERNAL ANCHORS ........................ 268
Chapter 11 — Deep Infrastructure Illusion (TA06): Intuition & Threat Model .............................................. 330
Chapter 1 — The Cybersecurity AI Ecosystem .......................... 3 • Adjudicator/Broker — “The Arbiter” .................................. 11 • Data Lake & Feature Store ........................................... 14 • WORM & TSA/NTS — Integrity and Time Anchors ........................ 17 • Decision Flow (Detailed Hot Path) .................................. 19 • Local Invariants & Rules ........................................... 22 • QoS & Denial-of-Sense Protection ................................... 25 • Record Schema ...................................................... 27 • Ecosystem Health Metrics ........................................... 29 • Typical Failure Modes .............................................. 31
Chapter 2 — Modern AI-Enabled Threat Model ........................ 34 • Threat Actors; Capability Surface; Extended Kill-Chain ............. 39–41
Chapter 3 — Trustworthy Data Principles .......................... 62
Chapter 6 — Data Poisoning & Timeline (TA01) ..................... 101
Chapter 7 — Adversarial ML & Prompt/Policy Injection (TA02) ..... 147
Chapter 8 — Governance/Policy Poisoning (TA03) .................. 185
Chapter 9 — Absorption Vectors: Data / Policy / Compute (TA04) .. 236
Chapter 10 — ECLIPSE & EXTERNAL ANCHORS ........................ 268
Chapter 11 — Deep Infrastructure Illusion (TA06): Intuition & Threat Model .............................................. 330