You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Threat Actors: Hackers or malicious actors who have access to the data and the model. <br> Insiders who have malicious intent or are bribed to interfere with the data. <br><br> Attact Vectors: Unsecured data transmission channels that allow unauthorized access to the data. | Lack of proper data access controls. <br><br> Lack of proper data validation and sanitization techniques. <br><br> Lack of proper data encryption. <br><br> Lack of proper data backup and recovery techniques. | Unreliable or incorrect model predictions. <br><br> Loss of confidentiality and privacy of sensitive data. <br><br> Legal and regulatory compliance violations. <br><br> Reputational damage. |
61
+
| Threat Actors: Hackers or malicious actors who have access to the data and the model. <br> Insiders who have malicious intent or are bribed to interfere with the data. <br><br> Attack Vectors: Unsecured data transmission channels that allow unauthorized access to the data. | Lack of proper data access controls. <br><br> Lack of proper data validation and sanitization techniques. <br><br> Lack of proper data encryption. <br><br> Lack of proper data backup and recovery techniques. | Unreliable or incorrect model predictions. <br><br> Loss of confidentiality and privacy of sensitive data. <br><br> Legal and regulatory compliance violations. <br><br> Reputational damage. |
62
62
63
63
It is important to note that this chart is only a sample based on
64
64
[the scenario below](#scenario1) only. The actual risk assessment will depend on
0 commit comments