Exfiltration Attacks

From The Foundation for Best Practices in Machine Learning
Technical Best Practices > Security > Exfiltration Attacks

Exfiltration Attacks


Document and assess whether the data employed and gathered by the Product, and the intellectual property generated possess value for potential adversarial actors.


To (a) identify the risks associated with (i) Product Subject physical, financial, social and psychological wellbeing, and (ii) Organization financial wellbeing; and (b) highlight associated risks that might occur in the Product Lifecycle.

Additional Information