Demystifying LLMs and Their Security Implications - A Business-Friendly Overview
Cloud Security Alliance via YouTube
Overview
Syllabus
Introduction
How I learn
Example
LLM Basics
Tokenization
Embedding
Attention
Generation Phase
Patterns
LLM Architecture
LLM Types
LLM Threats
Prompt Injection
Control vs Data Plane
Cross Site Scripting
Control Plane vs LLM
Real Life Example
AI Assistant Example
AI Tokens
LLM Firewall
Dual LLMs
Chat LLMs
Prompt Vulnerability Dollars
Risk of Prompt Injection
Data Poisoning
Goal
Obtaining Trusted Data Sources
You Can Hijack Trusted Content
Data Poisoning Example
Data Poisoning Solutions
Data Leakage
Taught by
Cloud Security Alliance