MindMap Gallery Artificial Intelligence Data Security Governance Recommendations
Suggestions are put forward for artificial intelligence data security governance from five aspects: equal emphasis on development and security, management system, supervision system, technical system, and training system.
Edited at 2021-03-25 00:27:05This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
Artificial Intelligence Data Security Governance Recommendations
(1) Pay equal attention to development and security
Strengthen the construction of data resources and solve security issues during development
Avoid data bias
Avoid data security issues such as data ownership
Improve data security governance capabilities and promote security development
Based on artificial intelligence data security risk research, relying on existing data security management mechanisms and technical means
Avoid data security risks such as training data pollution and data intelligence theft
(2) Improve relevant laws, regulations and institutional norms
Promote legislation related to artificial intelligence and data security
Regulate prominent issues such as excessive collection of artificial intelligence-related data, bias and discrimination, abuse of resources, and deep forgery
Improve departmental regulations related to artificial intelligence data security
Formulate and refine relevant departmental regulations to address key AI data security risks in various fields.
algorithm design
product development
Application of results
Clarify data security requirements
Carry out artificial intelligence data security supervision and inspection
Strengthen safety supervision and inspection of high-risk links such as artificial intelligence data collection, use, and sharing, and conduct regular safety audits
Standardize methods and procedures for emergency response, investigation and evidence collection of artificial intelligence data security incidents
(3) Normalized artificial intelligence data security supervision and inspection
Improve data security supervision mechanism
Implement supervision and inspection through various online and offline methods to timely discover and prevent Security risks
Establish technical monitoring means and public supervision channels
Carry out artificial intelligence data security inspection and assessment
Establish an artificial intelligence data security detection and evaluation platform
Develop data security detection and evaluation methods and indicator systems for artificial intelligence products, applications and services
Develop a security testing and evaluation tool set to improve the safety and maturity of artificial intelligence products through testing and verification.
(4) Construction of technical means
Basic theoretical research and technology research and development of strong artificial intelligence data security protection
Break through the core key technologies of artificial intelligence data security protection such as small sample learning, federated learning, and differential privacy.
Carry out application research and product technology research and development of artificial intelligence technology in the field of data security governance
Establish and improve the artificial intelligence open source learning framework, and enhance the data security design and technical measures built into the framework.
(5) Cultivate composite artificial intelligence data security talents
Establish and improve artificial intelligence data security talent training mechanism
Strengthen the training of manual data security talents within the enterprise
Strengthen the introduction of artificial intelligence data security talents at home and abroad