Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Misuse

The misuse class includes elements such as the potential for cyber threat actors to execute exploits with greater speed and impact or generate disinformation (such as deep fake media) at accelerated rates and effectiveness

Source: MIT AI Risk Repositorymit98

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit98

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.0 > Malicious use

Mitigation strategy

1. Prioritize the rapid and automated application of security patches and strictly enforce Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) policies to reduce the attack surface and mitigate the speed and impact of cyber exploits. 2. Mandate the adoption of digital content provenance and authentication standards (e.g., C2PA) to embed cryptographically secure metadata and watermarks, establishing the authenticity and origin of digital media. 3. Implement and continuously monitor real-time deepfake detection technologies and semantic guardrails within generative systems to prevent the creation and rapid dissemination of synthetic disinformation.