• Applying AI security architecture and building solutions using security techniques like isolation and detection when developing an AI system can ensure the security of the AI data and model as well as the system’s overall security.
• Consider possible security threats when implementing AI systems using images, audios, and texts to provide public services. In particular, implementing an automated system (e.g. handling civil petitions using a chatbot) in many areas such as civil petitions, attackers not only target the AI system but also steal personal data using a malicious system that exploits the AI system. Cases of security incidents due to poor security policies and systems are as follows.
✔ In 2017, hackers accessed the Delta Airline chatbot system and modified the source code, allowing them to take hundreds of thousands of Delta customers’ personal data and payment card details from the airline’s website [55]
✔ Confirmed that personal data (e.g. call history, personal healthcare apps) can be accessed after attacking the speech recognition service using speech synthesis and voice changer based on the recorded audio of the target speaker [56]
• When providing public services, the service generally has to run at all times and is just as vulnerable to external attacks. Hence, it is advisable to establish AI systems that are able to respond to known cybersecurity threats since the systems allow external access to the services using the cloud or their own server. The following are some security techniques you can implement:
✔ Authentication and authorization: The authentication security layer checks the user while interacting with the AI system;
✔ End-to-end encryption: Various encryption techniques like the RSA algorithm are applied; or
✔ Self-destructing messaging: When sensitive information (i.e. personally identifiable identification) is sent, it is automatically deleted by the AI system after a set period of time
• Also, regular diagnosis and inspection of website vulnerabilities can strengthen security in advance since many AI systems allow external access.