Think you can outsmart AI? Announcing ‘Behind The Mask’ – Our all-new cybercrime role-playing game | Play Now
Glossary
- Abused Authentication
- Adversarial Attack
- Agentic Artificial Intelligence / Agentic AI
- Algorithm
- Anthropomorphism
- Artificial Intelligence Dependency / AI Dependency
- Artificial Intelligence Plugin / AI Plugin
- Attack Acceleration
- Black Box
- Blue Teaming
- Chatbot
- Copyright Infringement
- Data Anonymization
- Data Breach
- Data Exfiltration
- Data Governance
- Deep Fake
- Denial of Service Attack / DoS Attack
- Differential Privacy
- Digital Infrastructure
- Disinformation Campaigns
- Encryption
- Ethical Artificial Intelligence / Ethical AI
- Excessive Agency
- Fake Resources
- Fine-Tuned Model
- Generative Artificial Intelligence / GenAI
- Indirect Prompt Injection Attack
- Inference Layer / Interaction Layer
- Insecure Output Handling
- Insecure Plugin Design
- Insider Threat
- Jailbreak Attack
- Large Language Model / LLM
- Malicious Code
- Model Agnostic
- Model (Artificial Intelligence)
- Multi-Factor Identification / MFA
- Multimodal
- Natural Language Processing / NLP
- Observability
- Overreliance
- Passive Prompt Injection Attack
- Personally Identifiable Information / PII
- Policy-Based Access Control / PBAC
- Prompt Injection Attack
- Provider Agnostic
- Purple Teaming
- Red Teaming
- Retraining Models
- Retrieval-Augmented Generation / RAG
- Sanitized Dataset
- Sensitive Information Disclosure
- Shadow Artificial Intelligence / Shadow AI
- Supply Chain Attack
- Trained Data Poisoning
- Transparency (Relative to AI/ML)
- White Box