mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-24 20:03:02 +00:00
deleting duplicate resource
This commit is contained in:
parent
ea1042098b
commit
5a8ed3a390
1 changed files with 0 additions and 9 deletions
|
@ -1,9 +0,0 @@
|
|||
# Securing AI Resources
|
||||
|
||||
- [NSA/DoD - Joint Guidance on Deploying AI Systems Securely](https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF)
|
||||
- [MITRE ATLAS](https://atlas.mitre.org/)
|
||||
- [OWASP Top 10 for LLM Applications](https://genai.owasp.org/)
|
||||
- [OWASP AI Security and Privacy Guide](https://owasp.org/www-project-ai-security-and-privacy-guide/)
|
||||
- [Securing Your AI: A Step-by-Step Guide for CISOs](https://hiddenlayer.com/research/how-well-do-you-know-your-ai-environment/)
|
||||
- [Securing Your AI: A Step-by-Step Guide for CISOs PT 2](https://hiddenlayer.com/research/securing-your-ai-a-step-by-step-guide-for-cisos-pt2/)
|
||||
- [CSA Securing LLM Backed Systems](https://github.com/The-Art-of-Hacking/h4cker/blob/master/ai_research/ai_risk_management/Securing%20LLM%20Backed%20Systems%20-%20Essential%20Authorization%20Practices%2020240806.pdf)
|
Loading…
Reference in a new issue