AI Basics
Cloud Basics
AI Risks in Cybersecurity
Cloud Risks in Cybersecurity
100

What does AI stand for?

Artificial intelligence

100

What does “SaaS” stand for?

Software as a Service

100

What’s the danger of trusting AI with sensitive information like passwords or health data?

It could be stolen or leaked if not protected

 

100

Why should we be careful about letting AI store or use personal data?

It could be hacked, leaked, or used in the wrong way.

200

What’s the risk of training AI with limited or biased information?

Bias

200

Name one of the three main cloud service providers.

(AWS, Azure, or Google Cloud)

200

How might AI help cyber attackers get into systems faster?

By finding weaknesses more quickly



200

Name one method to prevent unauthorized access in the cloud.

MFA, IAM policies

300

What is the term used to describe AI systems that can improve over time through experience?

Machine Learning

300

What is a “virtual machine”?  

A software emulation of a physical computer


300

True or False: AI can be used to guess passwords faster than humans.

True

300

True or False: Cloud providers are always responsible for your data’s security.

False – it’s shared responsibility

400

How does AI learn to recognize photos of pizza?

By looking at lots of pizza pictures and learning patterns

400

What type of cloud is shared by many users and managed by a provider?

Public Cloud

400

What kind of AI attack uses fake videos or voices?

Deepfakes (impersonating)

400

What does “encryption” do to your data?

(Scramble or modify it so only authorized users can read it)

500

An online store uses AI to predict what customers might buy next. What is the AI using to make that prediction?

Past behavior

500

What does “scalability” mean in cloud computing?

The cloud can grow or shrink resources based on what you need.

500

What is it called when attackers inject bad data into AI training?

Poisoning

500

In multi-tenant cloud environments, what specific risk arises from poor isolation between virtual machines or containers?

A vulnerability in one tenant’s environment could allow attackers to access data or systems of another tenant (cross-tenant attack).