From the course: CompTIA SecAI+ (CY0-001) Cert Prep
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Data types
From the course: CompTIA SecAI+ (CY0-001) Cert Prep
Data types
AI systems depend on different types of data, structured, unstructured, and semi-structured. Each type of data plays a vital role in how an AI model learns, performs, and stays secure. Structured data is neatly organized, often in rows and columns like those in spreadsheets or relational databases. Every field has a clear definition, such as a date, a number, or a name. Because structured data is so well-defined and easy to search, it often becomes a high-value target for attackers. Protecting it requires strong access management, encryption both in transit and at rest, regular audits, and integrity checks to detect unauthorized changes. Unstructured data is much more flexible, but also much harder to manage. It includes text documents, social media posts, audio files, images, and videos. This data lacks a predefined format, which makes it challenging to categorize or secure. Without proper discovery and classification, unstructured data can easily become a hiding place for sensitive…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
The AI lifecycle1m 39s
-
(Locked)
Business alignment in the AI lifecycle1m 43s
-
(Locked)
Data collection2m 20s
-
(Locked)
Data preparation3m 15s
-
(Locked)
Model development and selection2m 13s
-
(Locked)
Model evaluation and validation2m 29s
-
(Locked)
Model deployment and integration3m 25s
-
(Locked)
Monitoring and maintenance3m 19s
-
(Locked)
-
-
(Locked)
Manipulating application integrations4m 8s
-
(Locked)
AI supply chain attacks2m 4s
-
(Locked)
Insecure plug-in design2m 9s
-
(Locked)
Insecure output handling1m 23s
-
(Locked)
Output integrity attacks2m 8s
-
(Locked)
Model denial of service1m 31s
-
(Locked)
Excessive agency1m 33s
-
(Locked)
Overreliance1m 34s
-
(Locked)
AI hallucinations1m 4s
-
(Locked)
-
-
(Locked)
Monitoring prompts and responses2m 51s
-
(Locked)
Log monitoring4m 30s
-
(Locked)
Rate and cost monitoring5m 1s
-
(Locked)
Auditing for AI hallucinations3m 33s
-
(Locked)
Auditing for accuracy3m 29s
-
(Locked)
Auditing for bias and fairness4m 35s
-
(Locked)
Auditing access and security compliance3m 48s
-
(Locked)
-
-
(Locked)
Responsible AI5m 29s
-
(Locked)
AI risks2m 23s
-
(Locked)
Introduction of bias2m 37s
-
(Locked)
Accidental data leakage2m 53s
-
(Locked)
Reputational loss2m 11s
-
(Locked)
Accuracy and performance of the model2m 22s
-
(Locked)
Intellectual property risks3m 31s
-
(Locked)
Autonomous systems2m 27s
-
(Locked)
Shadow IT and shadow AI1m 48s
-
(Locked)
Awareness training2m 21s
-
(Locked)