Shadow AI: Cyber Security Implications, Opportunities and Challenges in the Unseen Frontier

  • Deepak Puthal*
  • , Amit Kumar Mishra*
  • , Saraju P. Mohanty
  • , Antonella Longo
  • , Chan Yeob Yeun
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)
4 Downloads (Pure)

Abstract

The progression of artificial intelligence (AI) technologies has reached a level that greatly enhances the different organizational sectors by facilitating them with the means to advance and improve systems and processes. Shadow AI implies the usage of AI tools and systems by individuals within an entity, respectively, without permission thereby implying that these tools were not directly monitored or controlled by the centralized IT or security department. It also contributes to significant cyber risks such as data and security breaches, abuse of compliance, and, in general, an increased threat landscape. This paper highlights into the emerging global security trends and Shadow AI while also covering the unique positioning within the threat landscape concerning unauthorized computation of sensitive data, safety vulnerabilities of the unmonitored AI models, and model poisoning alongside data leakage-marked out. Moreover, this paper covers how Shadow AI distracts the attack landscape while increasing the level of security problem for the organization. Shadow AI, however, can be employed to increase the ability to respond to threats, locate irregularities, and increase the range of options available for cyber solutions even with all its risks.

Original languageEnglish
Article number405
Number of pages10
JournalSN Computer Science
Volume6
Issue number5
DOIs
Publication statusPublished - 21 Apr 2025

Keywords

  • Artificial intelligence
  • Cyber security
  • Explainable AI
  • Federated learning
  • Shadow AI

Fingerprint

Dive into the research topics of 'Shadow AI: Cyber Security Implications, Opportunities and Challenges in the Unseen Frontier'. Together they form a unique fingerprint.

Cite this