AI-generated fake videos or audio are called this.
What are deepfakes?
This EU regulation protects personal data and privacy.
What is GDPR?
This type of AI learns patterns from data to detect threats.
What is machine learning?
This verifies who a user is.
What is authentication?
This is the first place you look if you can't find a email in your inbox.
Trash/ deleted items
This attack manipulates AI training data to corrupt outcomes.
What is data poisoning?
This U.S. state passed the CCPA, a major privacy law.
What is California?
This AI technique mimics human decision-making using layered neural networks.
What is deep learning?
This determines what a user can access.
What is authorization?
Though not a cloud storage service by name, this Microsoft tool underpins file sharing for apps like Microsoft Teams and OneDrive in many organizations.
What is Share point?
This technique tricks AI models into making wrong decisions.
What is an adversarial attack?
This country introduced the LGPD, similar to GDPR.
What is Brazil?
AI systems use this to identify unusual behavior in networks.
What is anomaly detection?
This uses roles to assign permissions.
What is RBAC (Role-Based Access Control)?
This number of days that a password is valid before change.
180 days
Attackers use AI to automate this common social engineering tactic.
What is phishing?
This country enforces strict data localization laws requiring data to be stored domestically.
What is Russia?
This cybersecurity use of AI predicts attacks before they happen.
What is predictive analytics?
This model evaluates context like location and device before granting access.
What is adaptive authentication?
Name which VPN to use when a user needs printer access and access network files.
VPN 2
This risk involves exposing sensitive training data from AI models.
What is model leakage (or data leakage)?
This Asian country’s PIPL regulates personal data heavily.
What is China?
This type of AI model generates human-like text and can be used in phishing.
What is a large language model (LLM)?
This framework manages identities across systems and environments.
What is Identity and Access Management (IAM)?
This policy states that “users shall log off from applications, computers, and networks when finished.
What is Information Security Policy?