Impact (9 techniques)
MITRE ATLAS tactic
The adversary is trying to manipulate, interrupt, erode confidence in, or destroy your AI systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries' goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.
Techniques
- AML.T0015 — Evade AI Model Maturity: realized
- AML.T0029 — Denial of AI Service Maturity: demonstrated
- AML.T0031 — Erode AI Model Integrity Maturity: realized
- AML.T0034 — Cost Harvesting Maturity: feasible
- AML.T0046 — Spamming AI System with Chaff Data Maturity: feasible
- AML.T0048 — External Harms Maturity: realized
- AML.T0059 — Erode Dataset Integrity Maturity: demonstrated
- AML.T0101 — Data Destruction via AI Agent Tool Invocation Maturity: realized
- AML.T0112 — Machine Compromise Maturity: demonstrated
AI red teaming training, taught by practitioners.
Hands-on courses on adversarial AI, prompt injection, and AI security operations.
View AI Security Courses