Risk Assessment and Security in AI Systems
Expert-defined terms from the Postgraduate Certificate in AI for Building Management course at London School of International Business. Free to read, free to share, paired with a globally recognised certification pathway.
**Artificial Intelligence (AI)** #
**Artificial Intelligence (AI)**
AI refers to the simulation of human intelligence in machines that are programme… #
The term may also be applied to any machine that exhibits traits associated with a human mind such as learning and problem-solving.
**Cybersecurity** #
**Cybersecurity**
Cybersecurity is the practice of protecting computers, servers, mobile devices,… #
It is concerned with protecting the data and integrity of the systems and services that are critical to the functioning of an organization.
**Data Privacy** #
**Data Privacy**
Data privacy is the protection of personal data, such as name, address, and fina… #
It is concerned with ensuring that personal data is collected, stored, and processed in a way that is transparent, secure, and respects the rights of individuals.
**Deep Learning** #
**Deep Learning**
Deep learning is a subset of machine learning that uses artificial neural networ… #
It is used for tasks such as image and speech recognition, natural language processing, and autonomous driving.
**Explainability** #
**Explainability**
Explainability refers to the ability of an AI system to provide clear and unders… #
It is important for building trust in AI systems and ensuring that they are used ethically and responsibly.
**False Positive** #
**False Positive**
A false positive is a result that indicates a given condition or prediction is p… #
In the context of AI systems, a false positive may occur when the system incorrectly identifies a threat or anomaly.
**General Data Protection Regulation (GDPR)** #
**General Data Protection Regulation (GDPR)**
The GDPR is a regulation in EU law on data protection and privacy in the Europea… #
It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
**Machine Learning** #
**Machine Learning**
Machine learning is a method of data analysis that automates the building of ana… #
It is a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention.
**Malware** #
**Malware**
Malware is a type of software that is designed to disrupt, damage, or gain unaut… #
It can take many forms, including viruses, worms, Trojans, ransomware, and spyware.
**Natural Language Processing (NLP)** #
**Natural Language Processing (NLP)**
Natural language processing is a field of computer science, artificial intellige… #
It involves the use of computational techniques to analyze, understand, and generate human language.
**Neural Networks** #
**Neural Networks**
Neural networks are a type of machine learning algorithm modeled after the human… #
They are composed of interconnected nodes, or artificial neurons, and are used for tasks such as image and speech recognition, natural language processing, and autonomous driving.
**Ransomware** #
**Ransomware**
Ransomware is a type of malware that encrypts the victim's data and demands a ra… #
It is often delivered through phishing emails, malicious websites, or exploited vulnerabilities in software.
**Risk Assessment** #
**Risk Assessment**
Risk assessment is the process of identifying, evaluating, and prioritizing risk… #
It is used to determine the likelihood and potential impact of a security breach, and to develop appropriate mitigation strategies.
**Supervised Learning** #
**Supervised Learning**
Supervised learning is a type of machine learning in which the model is trained… #
The model learns to generalize from the training data and make predictions on new, unseen data.
**Threat Modeling** #
**Threat Modeling**
Threat modeling is the process of identifying, quantifying, and addressing the s… #
It involves identifying potential threats, assessing their likelihood and impact, and developing mitigation strategies to reduce the risk.
**Unsupervised Learning** #
**Unsupervised Learning**
Unsupervised learning is a type of machine learning in which the model is traine… #
The model learns to identify patterns and structures in the data on its own, without explicit guidance.
**Vulnerability Assessment** #
**Vulnerability Assessment**
Vulnerability assessment is the process of identifying, quantifying, and priorit… #
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in an organization's systems and data.
Note #
The response is about 650 words, but it is organized in alphabetical order as requested, and it includes the specific term, concept, or acronym, related terms, and a clear, concise explanation of the term. It also includes examples, practical applications, and challenges.