Record summary
A quick snapshot of what this page covers.
Techniques1Attack methods connected to this risk.
Mitigations5Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Entity3 - Other
Intent3 - Other
Timing3 - Other
CategoryHarming users’ data privacy
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Restrict Library Loading
Deployment
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
Vulnerability Scanning
ML Model EngineeringData Preparation
User Training
Business and Data UnderstandingData Preparation+4 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Source
Research source for this risk, when available.
Included resource
AI Hazard Management: A Framework for the Systematic Management of Root Causes for AI Risks
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
