Record summary
A quick snapshot of what this page covers.
Techniques9Attack methods connected to this risk.
Mitigations11Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.2 > AI system security vulnerabilities and attacks
Entity1 - Human
Intent1 - Intentional
Timing3 - Other
CategorySecurity
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
Restrict Library Loading
Deployment
Code Signing
Deployment
Vulnerability Scanning
ML Model EngineeringData Preparation
User Training
Business and Data UnderstandingData Preparation+4 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
Sanitize Training Data
Business and Data UnderstandingData Preparation+1 more
Maintain AI Dataset Provenance
Data PreparationBusiness and Data Understanding
Validate AI Model
ML Model EvaluationMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
A Survey of Artificial Intelligence Challenges: Analyzing the Definitions, Relationships, and Evolutions
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
