Exfiltration Attacks

From The Foundation for Best Practices in Machine Learning
Technical Best Practices > Security > Exfiltration Attacks

Exfiltration Attacks

Control

Document and assess whether the data employed and gathered by the Product, and the intellectual property generated possess value for potential adversarial actors.


Aim

To (a) identify the risks associated with (i) Product Subject physical, financial, social and psychological wellbeing, and (ii) Organization financial wellbeing; and (b) highlight associated risks that might occur in the Product Lifecycle.


Additional Information