The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview.
(eVideo)
Author
Contributors
Published
Carpenteria, CA linkedin.com, 2024.
Format
eVideo
Status
Description
Loading Description...
More Details
Language
English
Notes
General Note
3/27/202412:00:00AM
Participants/Performers
Presenter: Reet Kaur
Description
Learn about the top ten most common security vulnerabilities for large language models as outlined in the OWASP Top 10 for Large Language Models and how to prepare for them.
Description
Ever since the release of ChatGPT, it seems like everyone is talking about large language models (LLMs). With the rapid adoption of this exciting new technology, it’s crucial for organizations to address malicious threat actors that could exploit the benefits of any emerging advancements and pose significant risks to your data and privacy. This course covers the OWASP Top 10 for Large Language Models, which provides a list of the most dangerous risks of using this technology with practical strategies on how to prevent them. Join instructor Reet Kaur as she covers the ten most pressing, business-critical security vulnerabilities, including prompt injections, insecure output handling, training data poisoning, model denial of service, supply chain vulnerabilities, sensitive information disclosure, insecure plugin design, excessive agency, overreliance, and model theft.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
Citations
APA Citation, 7th Edition (style guide)
Kaur, R. (2024). The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview . linkedin.com.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Kaur, Reet. 2024. The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview. linkedin.com.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Kaur, Reet. The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview linkedin.com, 2024.
MLA Citation, 9th Edition (style guide)Kaur, Reet. The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview linkedin.com, 2024.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
219ea993-e957-86a5-baba-b6c25fd62249-eng
Grouping Information
Grouped Work ID | 219ea993-e957-86a5-baba-b6c25fd62249-eng |
---|---|
Full title | owasp top 10 for large language model llm applications an overview |
Author | kaur reet |
Grouping Category | movie |
Last Update | 2024-05-30 16:57:52PM |
Last Indexed | 2024-06-29 02:34:52AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Jun 13, 2024 |
Last Used | Jun 13, 2024 |
Marc Record
First Detected | May 30, 2024 04:58:26 PM |
---|---|
Last File Modification Time | May 30, 2024 04:58:26 PM |
MARC Record
LEADER | 02439ngm a22003133i 4500 | ||
---|---|---|---|
001 | LDC3810072 | ||
003 | LDC | ||
005 | 20240530215256.6 | ||
006 | m c | ||
007 | cr cna a | ||
008 | 240530s2024 cau051 o vleng d | ||
040 | |a linkedin.com|b eng | ||
050 | 4 | |a LDC3810072 | |
100 | 1 | |a Kaur, Reet|e speaker. | |
245 | 1 | 4 | |a The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview.|c with Reet Kaur |
264 | 1 | |a Carpenteria, CA|b linkedin.com,|c 2024. | |
306 | |a 00h:51m:15s | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
500 | |a 3/27/202412:00:00AM | ||
511 | 1 | |a Presenter: Reet Kaur | |
520 | |a Learn about the top ten most common security vulnerabilities for large language models as outlined in the OWASP Top 10 for Large Language Models and how to prepare for them. | ||
520 | |a Ever since the release of ChatGPT, it seems like everyone is talking about large language models (LLMs). With the rapid adoption of this exciting new technology, it’s crucial for organizations to address malicious threat actors that could exploit the benefits of any emerging advancements and pose significant risks to your data and privacy. This course covers the OWASP Top 10 for Large Language Models, which provides a list of the most dangerous risks of using this technology with practical strategies on how to prevent them. Join instructor Reet Kaur as she covers the ten most pressing, business-critical security vulnerabilities, including prompt injections, insecure output handling, training data poisoning, model denial of service, supply chain vulnerabilities, sensitive information disclosure, insecure plugin design, excessive agency, overreliance, and model theft. | ||
538 | |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. | ||
655 | 4 | |a Instructional films.|2 lcgft | |
655 | 4 | |a Educational films.|2 lcgft | |
710 | 2 | |a linkedin.com (Firm) | |
856 | 4 | 0 | |u https://www.linkedin.com/learning/the-owasp-top-10-for-large-language-model-llm-applications-an-overview?u=115438412&auth=true|z View course details on linkedin.com/learning |
856 | 4 | 2 | |3 thumbnail|u https://media.licdn.com/dms/image/D560DAQF44KwpzTCRlw/learning-public-crop_288_512/0/1711486757068?e=2147483647&v=beta&t=wtJNwyITQCEHRZqNxeDLTadGiqdrd8sZJaT-9yBMXjg |