Exercises and Solutions
Exercise 1: Short-Answer Question
Question: Explain how AGI could autonomously discover and exploit zero-day vulnerabilities. Discuss the implications for cybersecurity.
Solution: AGI could process vast amounts of system code and configurations autonomously, using advanced machine learning algorithms to identify vulnerabilities that have not yet been discovered or patched. For example, AGI might uncover a flaw in an encryption protocol by analyzing cryptographic patterns in real time. By automating this process, AGI significantly reduces the time between vulnerability discovery and exploitation, leaving defenders little opportunity to respond. This capability highlights the need for proactive measures, such as continuous monitoring and AI-driven anomaly detection, to mitigate the risks posed by AGI.
Exercise 2: Case Study
Scenario: BlackMamba malware targets a corporate network. The malware:
Conducts reconnaissance using natural language processing (NLP) to map the organization’s structure.
Generates adversarial inputs to bypass intrusion detection systems.
Exfiltrates sensitive data using trusted collaboration platforms like Microsoft Teams.
Tasks:
Identify three key vulnerabilities exploited by BlackMamba.
Propose three defensive strategies to mitigate these vulnerabilities.
Solution:
Key vulnerabilities:
Reliance on NLP to analyze internal communications and system logs to identify weak points.
Use of adversarial inputs to evade detection by machine learning–based IDS.
Exfiltration of data through trusted platforms, bypassing traditional network monitoring.
Defensive strategies:
Deploy advanced anomaly detection systems to identify suspicious patterns in communication and network activity.
Implement adversarial training in machine learning–based security tools to improve their robustness against adversarial inputs.
Monitor and restrict outbound traffic to collaboration platforms and set alerts for anomalous webhook activity.
