CompTIA Security+ Exam: Unintended Consequences of Machine Learning and AI

Causes of Unintended Consequences in Machine Learning and AI Systems

Prev Question Next Question

Question

Which of the following will MOST likely cause machine-learning and AI-enabled systems to operate with unintended consequences?

A.

Stored procedures B.

Buffer overflows C.

Data bias D.

Code reuse.

C.

Explanations

Which of the following will MOST likely cause machine-learning and AI-enabled systems to operate with unintended consequences?

A.

Stored procedures

B.

Buffer overflows

C.

Data bias

D.

Code reuse.

C.

The answer is C, data bias.

Machine learning (ML) and AI-enabled systems rely heavily on large data sets to train their models and make predictions or decisions. However, if the data sets used for training contain bias, this can result in unintended consequences when the system is put into operation.

Data bias occurs when the data set used to train the system is not representative of the population or is incomplete. For example, a facial recognition system that is trained on data sets with predominantly white faces may have difficulty recognizing people with darker skin tones, resulting in unintended consequences such as racial profiling or discrimination.

ML and AI systems are only as good as the data they are trained on, so it is critical to ensure that the data sets used for training are unbiased and representative of the population they will be used on. Otherwise, the unintended consequences could range from minor errors to catastrophic results, especially in critical areas such as healthcare or autonomous vehicles.

Stored procedures, buffer overflows, and code reuse can also cause unintended consequences in software systems, but they are not directly related to ML and AI-enabled systems as data bias is. Stored procedures are precompiled SQL statements that are stored in a database and can be executed repeatedly, but they can lead to security vulnerabilities if not properly managed. Buffer overflows occur when a program tries to write more data to a buffer than it can hold, potentially allowing an attacker to execute malicious code. Code reuse can lead to software vulnerabilities if a vulnerability in reused code is not properly addressed.