Machine learning applications: Mitigating the risks
Here are five ways a human can combat risks in machine learning applications. An ethical hacker is a trusted security professional who breaks into a system to discover machine learning vulnerabilities overlooked by a firewall, an intrusion detection system or any other security tools. In a simple scenario of gaining access, the ethical hacker uses a fake finger reconstructed from the fingerprint left behind by a legitimate user on a dirty device. To combat these risks, the device reader must be free of dirt, grease and moisture after each use and the database should be encrypted. A system administrator has super user privileges to analyze machine learning log files.
Apr-14-2016, 16:56:17 GMT