Data-Level Attacks
Data poisoning — Attackers corrupt training data to introduce backdoors or biases into models. A poisoned dataset can cause a fraud detection model to systematically miss certain transaction patterns. Particularly dangerous because the effects are invisible until exploited.
Data exfiltration — AI systems with broad data access become vectors for extracting sensitive information. An attacker who compromises an AI agent can use it to query databases, read emails, and compile confidential data — all within the agent’s legitimate permissions.
Model-Level Attacks
Model theft / extraction — Attackers reverse-engineer proprietary models through systematic querying. If you’ve invested millions in fine-tuning a model on proprietary data, that investment can be extracted through the API.
Adversarial attacks — Carefully crafted inputs that cause AI systems to make incorrect predictions. Imperceptible changes to images that fool computer vision systems, or subtle text modifications that bypass content filters.
System-Level Attacks
Supply chain attacks — The AI supply chain is fragile: open-source models, pre-trained weights, third-party datasets, and tool libraries all present attack vectors. A compromised open-source model downloaded by thousands of organizations can embed vulnerabilities at scale.
Agent exploitation — AI agents with tool access (Chapter 19) create new attack surfaces. MCP (Model Context Protocol) vulnerabilities allow attackers to coerce agent workflows into leaking internal data. 83% of organizations planned agentic AI deployment, but only 29% felt ready to secure it.
Key insight: Traditional cybersecurity focused on protecting infrastructure: networks, servers, endpoints. AI security requires protecting data, models, and reasoning processes — assets that are fundamentally different from traditional IT assets. Your CISO’s existing playbook covers perhaps 40% of AI-specific risks. The remaining 60% requires new capabilities, new tools, and new expertise. AI security is not an extension of cybersecurity — it’s a new discipline.