AUTOSAR | CYBER SECURITY | FUNDAMETALS OF CYBER SECURITY | BASIC OVERVIEW

preview_player
Показать описание
This is Basic Overview of Cyber Security Stack and the key concepts used in it. It will give you the overview of working principle of Cyber Security Stack.
Рекомендации по теме
Комментарии
Автор

Nice explanation 👏
Waiting for part 2

devadathddr
Автор

Thank you so much for the part1... waiting for part2

warrior
Автор

Great presentation... please keep it up bro...I am waiting for your next video

devangbhatt
Автор

Short, crisp and to the point explaination

subhrasoiandvlogs
Автор

MAC is just hash of the message, signed with Private Key of the sender, so the tampering can be detected at the receiver end. Receiver would calculate the hash of the message and then decrypt the encrypted hash sent by the sender, if both match then it is considered as not tampered.

Raja-ctxq
Автор

Very nice. Crisp and clear. Have a doubt. Can u pls explain the mathematical derivation or linking between asymmetrical keys

hemavathimuthusamy
Автор

Hi,
It was clear and informative
Could you please share other videos link
Thanks

mudemsrinivasreddy
Автор

Nice Explanation bro. Should have spoken a bit loudly

MudiamVishnuKumar
Автор

Nice explaination. Volume is low. We want still more video in depth about crypto stack.

curiousworld
Автор

Could please upload new videos. Great effort thanks

eaglehunt
Автор

Sound is very low brother but good content go ahead

prashanthimurali
Автор

Why SecOC is not part of your cyber security data flow?

nitinsasture
Автор

Where is the next video you mentioned about??

shrivastavpiyush
Автор

Please update secure boot and secure update

sangavim
Автор

Where are the other topics? As you committed in video?

yeshajain
Автор

Not sure is it correct
In packet it shown as mac plus data but in block diagram it shown only encrypted data.
If Symetric key used in that case no need to send plane data.
If it has CRC then plan data and CRC (MAC).
Kindly confirm

roopeshmotewar
Автор

Can I get your contact
I am looking for Autosar Cybersecurity Training

kirankommalapati