AI Threats
Data Laws Around the World
AI in Cybersecurity
Identity & Access
NEIL 101
100

AI-generated fake videos or audio are called this.

What are deepfakes?

100

This EU regulation protects personal data and privacy.

What is GDPR?

100

This type of AI learns patterns from data to detect threats.

What is machine learning?

100

This verifies who a user is.

What is authentication?

100

This is the first place you look if you can't find a email in your inbox.

Trash/ deleted items

200

This attack manipulates AI training data to corrupt outcomes.

What is data poisoning?

200

This U.S. state passed the CCPA, a major privacy law.

What is California?

200

This AI technique mimics human decision-making using layered neural networks.

What is deep learning?

200

This determines what a user can access.

What is authorization?

200

Though not a cloud storage service by name, this Microsoft tool underpins file sharing for apps like Microsoft Teams and OneDrive in many organizations.

What is Share point?

300

This technique tricks AI models into making wrong decisions.

What is an adversarial attack?

300

This country introduced the LGPD, similar to GDPR.

What is Brazil?

300

AI systems use this to identify unusual behavior in networks.

What is anomaly detection?

300

This uses roles to assign permissions.

What is RBAC (Role-Based Access Control)?

300

This number of days that a password is valid before change.

180 days 

400

Attackers use AI to automate this common social engineering tactic.

What is phishing?

400

This country enforces strict data localization laws requiring data to be stored domestically.

What is Russia?

400

This cybersecurity use of AI predicts attacks before they happen.

What is predictive analytics?

400

This model evaluates context like location and device before granting access.

What is adaptive authentication?

400

Name which VPN to use when a user needs printer access and access network files.

VPN 2

500

This risk involves exposing sensitive training data from AI models.

What is model leakage (or data leakage)?

500

This Asian country’s PIPL regulates personal data heavily.

What is China?

500

This type of AI model generates human-like text and can be used in phishing.

What is a large language model (LLM)?

500

This framework manages identities across systems and environments.

What is Identity and Access Management (IAM)?

500

This policy states that “users shall log off from applications, computers, and networks when finished.

What is Information Security Policy?

M
e
n
u