Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

preview_player
Показать описание


In this next installment of the Cybersecurity Architecture series, Jeff "the Security guy" covers the three fundamentals that must be part of your security checklist: Confidentiality, Integrity, and Availability, also known as the "CIA Triad".

#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume

Chapters
00:00 Confidentiality
03:51 Integrity
06:50 Availability
Рекомендации по теме
Комментарии
Автор

This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.

venwin
Автор

Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.

Thank you, Sir.
Greetings from Germany.

theintjengineer
Автор

the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats

jesperkragh
Автор

Dear Mr. Jeff

Greetings,
Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
1- Syn
2- Syn + Ack
3- Ack

Appreciate your efforts 😊


Regards
Mohamed Ayman

kabantsh
Автор

Confidentiality
- utilizes two technologies: Access Control and Encryption
- Access control comprises of authentication: who are you, authorization: what you're allowed to do
- MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity

Encryption - using cryptographic keys and algorithm to convert plain text into cipher text

2. Integrity
- ensuring a transaction or data retains it's original form - not modified
- utilizes Digital Signatures and Message Authentication Codes

seetsamolapo
Автор

CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time

ravijeganathan
Автор

Thank you for these videos Jeff, you are a great teacher

gabrielagalindo
Автор

Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.

amoprince
Автор

Fantastic talk;
Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.

jann
Автор

Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...

xrobot
Автор

Thank you for making these videos Jeff

bbarnaby
Автор

Here for the beautiful randomness, waiting for the Series:Playlist

dangnabbit
Автор

Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack

neshepartal
Автор

Absolutely fantastic!! Thank you so much.

giselesarian
Автор

amazing skill sir love to understand the concept

Fahimfasail
Автор

Thank you much Jeff, this is very interesting source of information.

EmeldaKate
Автор

Thanks for this channel. High quality content ❤

ahmad
Автор

What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.

nafe
Автор

Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).

taiwoobalola
Автор

So what controls were in place for Availability??

XBLMA