Several core activities define the eeicacy of AI-facilitated threat modeling within an enterprise environment. Consider the following tasks:
I. Automated identification of trust boundaries. II. Generation of attack trees based on architectural inputs. III. Real-time patching of bueer overflow vulnerabilities. IV. Prioritization of threats using established frameworks like DREAD. Which of these tasks can be eeectively facilitated by current AI-enabled threat modeling tools?
Consider the following statements regarding the evaluation of Machine Learning models used for threat detection.
I. Precision measures the ratio of True Positives to the total number of positive predictions. II. Recall measures the model’s ability to identify all actual instances of a threat within a dataset. III. Accuracy is always the most reliable metric for evaluating models on imbalanced security datasets. IV. The Confusion Matrix is a tool used to visualize the performance of a classification model. Which of the following combinations of statements is correct?
Evaluate the following statements regarding the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) framework:
I. It is modeled after the MITRE ATT&CK framework structure to facilitate cross-domain threat analysis. II. It includes tactics such as ML Model Access and Exfiltration to describe AI-specific attack goals. III. It focuses solely on the defense of Generative AI and Large Language Models (LLMs). Which of the following combinations is correct?