Record summary
A quick snapshot of what this page covers.
Techniques9Attack methods connected to this risk.
Mitigations9Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.0 > Privacy & Security
Entity2 - AI
Intent3 - Other
Timing3 - Other
CategoryPrivacy
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
Code Signing
Deployment
Limit Model Artifact Release
Business and Data UnderstandingDeployment
AI Model Distribution Methods
Deployment
Restrict Library Loading
Deployment
Vulnerability Scanning
ML Model EngineeringData Preparation
User Training
Business and Data UnderstandingData Preparation+4 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Source
Research source for this risk, when available.
Included resource
Sources of Risk of AI Systems
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
