Record summary
A quick snapshot of what this page covers.
Techniques3Attack methods connected to this risk.
Mitigations6Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Entity1 - Human
Intent2 - Unintentional
Timing1 - Pre-deployment
CategoryTraining Data Risks (Intellectual property)
SubcategoryConfidential information in data
Suggested mitigations
Defenses that may help with related attacks.
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
AI Model Distribution Methods
Deployment
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Maintain AI Dataset Provenance
Data PreparationBusiness and Data Understanding
Source
Research source for this risk, when available.
Included resource
AI Risk Atlas
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
