Published October 18, 2025 | Version v4
Book Open
Description
Important Legal Disclaimer ........................................... 2
-
Chapter 1 — The Cybersecurity AI Ecosystem .......................... 3
• Adjudicator/Broker — “The Arbiter” .................................. 11
• Data Lake & Feature Store ........................................... 14
• WORM & TSA/NTS — Integrity and Time Anchors ........................ 17
• Decision Flow (Detailed Hot Path) .................................. 19
• Local Invariants & Rules ........................................... 22
• QoS & Denial-of-Sense Protection ................................... 25
• Record Schema ...................................................... 27
• Ecosystem Health Metrics ........................................... 29
• Typical Failure Modes .............................................. 31 -
Chapter 2 — Modern AI-Enabled Threat Model ........................ 34
• Threat Actors; Capability Surface; Extended Kill-Chain ............. 39–41 -
Chapter 3 — Trustworthy Data Principles .......................... 62
-
Chapter 6 — Data Poisoning & Timeline (TA01) ..................... 101
-
Chapter 7 — Adversarial ML & Prompt/Policy Injection (TA02) ..... 147
-
Chapter 8 — Governance/Policy Poisoning (TA03) .................. 185
-
Chapter 9 — Absorption Vectors: Data / Policy / Compute (TA04) .. 236
-
Chapter 10 — ECLIPSE & EXTERNAL ANCHORS ........................ 268
-
Chapter 11 — Deep Infrastructure Illusion (TA06):
Intuition & Threat Model .............................................. 330
Files
AI defend the defender.pdf
.png)


