General Updated 1 hour ago

Advanced Cyber Defense: AI Threats & Post-Quantum Security (2026)

Master the cutting-edge of digital defense. This deck covers the "OWASP Top 10 for LLMs," quantum-resistant algorithms, and defense strategies against AI-automated attacks. Ideal for CISSP, CCSP, and advanced security certification prep.

4 Views
0 Likes
21 Cards

Cards in this deck

Question #1

What is "Prompt Injection" (Direct)?

Answer

A vulnerability where an attacker "tricks" an AI by providing instructions that override its original system prompt (e.g., "Ignore all previous instructions").

Question #2

Define "Indirect Prompt Injection".

Answer

When an AI processes external data (like a website or email) that contains hidden malicious instructions intended to hijack the AI's behavior.

Question #3

What is "Adversarial Machine Learning"?

Answer

A technique where attackers attempt to fool a machine learning model by providing it with deceptive, subtly altered input data.

Question #4

Define "Data Poisoning".

Answer

Corrupting the training data of an AI model during its development so that it learns incorrect patterns or contains a "backdoor."

Question #5

What is "Post-Quantum Cryptography" (PQC)?

Answer

Cryptographic algorithms (usually based on lattice math) designed to be secure against an attack by a powerful quantum computer.

Question #6

Explain "Harvest Now, Decrypt Later".

Answer

A strategy where attackers steal encrypted data today, waiting for future quantum computers to become powerful enough to break the encryption.

Question #7

What is "Model Inversion"?

Answer

An attack where a hacker "queries" an AI model repeatedly to reconstruct the sensitive training data (like private medical records) used to build it.

Question #8

Define "Prompt Leaking".

Answer

A specific type of injection where the goal is to force the AI to reveal its internal "System Instructions" or confidential business logic.

Question #9

What is "Excessive Agency" in AI?

Answer

A risk where an AI agent is given too many permissions (like deleting files or making purchases) without sufficient human oversight.

Question #10

Define "Shadow AI".

Answer

The use of AI tools within an organization without the knowledge or approval of the IT/Security department, creating "blind spots."

Question #11

What is "Deepfake Voice Cloning" in Vishing?

Answer

Using AI to perfectly mimic an executive's voice over the phone to authorize fraudulent wire transfers or data access.

Question #12

Explain "Lattice-Based Cryptography".

Answer

A promising type of PQC that relies on the hardness of finding the shortest vector in a high-dimensional grid of points (lattices).

Question #13

What is "AI Hallucination Exploitation"?

Answer

Tricking an AI into "hallucinating" a non-existent software library, then creating a malicious version of that library for the AI to recommend to developers.

Question #14

Define "Zero-Knowledge Proofs" (ZKP).

Answer

A method where one party can prove to another that a statement is true without revealing any information beyond the validity of the statement itself.

Question #15

What is "Polymorphic Malware" (AI-Enhanced)?

Answer

Malware that uses AI to constantly rewrite its own code to bypass traditional signature-based antivirus detection.

Question #16

Define "Hardware Security Module" (HSM).

Answer

A physical device that safeguards and manages digital keys for strong authentication and provides crypto-processing.

Question #17

What is "Secure Enclave" (TEE)?

Answer

A secure area of a main processor that guarantees code and data loaded inside it to be protected with respect to confidentiality and integrity.

Question #18

Explain "Red Teaming" for AI.

Answer

The practice of systematically testing an AI system for safety flaws, biases, and security vulnerabilities using adversarial techniques.

Question #19

What is "Supply Chain Attack" (Software)?

Answer

Targeting a software vendor or its code repositories to inject malware into a legitimate product that is then sent to thousands of customers.

Question #20

Define "Ephemeral Keys".

Answer

Cryptographic keys that are generated for each new execution of a key-establishment process (ensuring "Forward Secrecy").

Question #21

What is "Homomorphic Encryption"?

Answer

A form of encryption that allows computations to be performed on encrypted data without first decrypting it.