Security For You
Security For You
  • Видео 344
  • Просмотров 181 611

Видео

Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
Просмотров 57Месяц назад
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Просмотров 2403 месяца назад
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
Просмотров 843 месяца назад
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
Просмотров 1103 месяца назад
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
Просмотров 743 месяца назад
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
Просмотров 953 месяца назад
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Просмотров 843 месяца назад
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Просмотров 914 месяца назад
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Просмотров 704 месяца назад
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Why Passwords are stored as Hash & not Encrypted? Why Hashing + Salting is secure than Encryption? 💥
Просмотров 2034 месяца назад
Why Passwords are stored as Hash & not Encrypted? Why Hashing Salting is secure than Encryption? 💥
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Просмотров 584 месяца назад
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Просмотров 274 месяца назад
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Просмотров 884 месяца назад
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
Просмотров 394 месяца назад
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Просмотров 934 месяца назад
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
Просмотров 844 месяца назад
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
Просмотров 1644 месяца назад
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Просмотров 874 месяца назад
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Просмотров 904 месяца назад
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Просмотров 914 месяца назад
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
Просмотров 514 месяца назад
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Просмотров 184 месяца назад
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Просмотров 284 месяца назад
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Просмотров 1304 месяца назад
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
Просмотров 734 месяца назад
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Просмотров 1365 месяцев назад
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Просмотров 705 месяцев назад
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
Просмотров 2035 месяцев назад
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
How to conduct an Audit? Detailed step by step guide 💥 Different Audit phases explained wid examples
Просмотров 1255 месяцев назад
How to conduct an Audit? Detailed step by step guide 💥 Different Audit phases explained wid examples

Комментарии

  • @lowunited6220
    @lowunited6220 6 дней назад

    Wow very informative! Its best to learn about things like these to stay safe and stay away

  • @streamspoart2671
    @streamspoart2671 9 дней назад

    FBI i swear! I'm just looking for Deadpool 2 reference when she said IUD and Deadpool said "a bomb?"

  • @Qwertuiop-f8n
    @Qwertuiop-f8n 11 дней назад

    Bro really explaining IED's like a highschool teacher, damn...

  • @ilovedance_yt
    @ilovedance_yt 17 дней назад

    best idea 💡😜

  • @jessfilmdiaries
    @jessfilmdiaries 18 дней назад

    I've seen banks list positions as Model risk governance specialist. Is this the same as a GRC specialist?

  • @DanetteKshlerin
    @DanetteKshlerin 28 дней назад

    Gonzalez Melissa Johnson Karen Hernandez Ronald

  • @biomedlib
    @biomedlib 28 дней назад

    Greetings, I enjoyed your video. Would you say that Preventive Controls are more important than Detective Controls? Thank you.

  • @alexwatson5961
    @alexwatson5961 Месяц назад

    But how to stay safe?

  • @kaitlynmierswe4017
    @kaitlynmierswe4017 Месяц назад

    Wilson Robert Martin Maria Hernandez Eric

  • @WattHowar-e9i
    @WattHowar-e9i Месяц назад

    Moore Patricia Thompson George Clark Richard

  • @NoraBerg-g8p
    @NoraBerg-g8p Месяц назад

    Miller Cynthia Johnson Brian Robinson Brian

  • @spiderman699
    @spiderman699 Месяц назад

    Well explained and thank u🎉

  • @vasanthakumar525
    @vasanthakumar525 Месяц назад

    How can I contact you?

  • @GwenStephens-e4m
    @GwenStephens-e4m Месяц назад

    Miller Donna Rodriguez David Lewis Scott

  • @user-sdcs-sdvsdg-yreg
    @user-sdcs-sdvsdg-yreg Месяц назад

    00:04 Dumpster Diving in InfoSec & Mitigation 00:40 Dumpster diving in information security involves retrieving discarded data for malicious purposes. 01:12 Hazards of Improper Disposal of Confidential Information 01:46 Unauthorized access to IT equipment & media 02:15 Dumpster placement and securing to prevent unauthorized access 02:51 Proper data disposal and employee training are crucial for information security. 03:29 Establish comprehensive disposal policies for sensitive information 04:02 Implementing mitigation strategies for third-party vendor discard waste Crafted by Merlin AI.

  • @TheresaMitchell-v4r
    @TheresaMitchell-v4r 2 месяца назад

    Miller Anthony Walker Kenneth Allen Steven

  • @aminvogue
    @aminvogue 2 месяца назад

    Hi Dushyant, this vdo on 3 Matrices is "Golden" hats off to you.

    • @security_for_you
      @security_for_you 2 месяца назад

      Thank you for encouraging to do better everytime 🙏😄

  • @satyanikhil8128
    @satyanikhil8128 2 месяца назад

    Amazing, can we get the ppt used for this?

  • @prashanthkumar4222
    @prashanthkumar4222 3 месяца назад

    If SOD is not maintained developer,approver are same as a auditor what action need to be taken?

  • @Omairi86
    @Omairi86 3 месяца назад

    Can a server in a DMZ pose a security risk to the rest of the network? Like if i put my playstation ip on DMZ network will it put any danger on my other devices if it got hacked ? Thank you in advance.

  • @JossOrtan
    @JossOrtan 3 месяца назад

    Great video! The distinctions between data security and data privacy were explained so clearly. Do you think organizations tend to prioritize one over the other, and what impact does that have?

  • @olracmike1686
    @olracmike1686 3 месяца назад

    Nice One!

  • @aswathyr2617
    @aswathyr2617 3 месяца назад

    Thank you sir ,really helpful.

  • @gmddmg
    @gmddmg 3 месяца назад

    Hello, and thanks for this great video. I have a question though (min 2:00). In my opinion, these sound more like key results, meaning concrete achievements as part of a bigger "Objective". Correct? The KPI would be "Customer Satisfaction" but "Reduce the avarage time to complete checkout by 20%" sounds more like an objective. Am I missing something? Thanks!

  • @mr.pawansinghrathore3359
    @mr.pawansinghrathore3359 3 месяца назад

    Superb performance

  • @babulalgodara8359
    @babulalgodara8359 3 месяца назад

    Insightful 💡

  • @Esoteric.Knowledge.Evolution
    @Esoteric.Knowledge.Evolution 3 месяца назад

    Nice one

  • @mr.pawansinghrathore3359
    @mr.pawansinghrathore3359 3 месяца назад

    Subscribe to more information

  • @vishvanathgangoli4874
    @vishvanathgangoli4874 3 месяца назад

    Good Effort

  • @HimanshuNegi-yk8ni
    @HimanshuNegi-yk8ni 4 месяца назад

    Thanks 👍

  • @manvishekhawat9075
    @manvishekhawat9075 4 месяца назад

    👍🏻👍🏻

  • @anilraja7799
    @anilraja7799 4 месяца назад

    Nice explanation for hashing with salt.

  • @iljabrudel6224
    @iljabrudel6224 4 месяца назад

    Thank you for the video. Good and simple way to understand hashing, encryption and what hashing with a salt gives as a benefit. Would you recommend a secure, prooven way of implementing hashing with salting that recognized with nationals or international standards?

  • @germainkone9029
    @germainkone9029 4 месяца назад

    Nice job. Thanks 🙏

  • @katlegoramz3588
    @katlegoramz3588 4 месяца назад

    This was greatly explained one can start implementing such process Thank you

    • @security_for_you
      @security_for_you 4 месяца назад

      Thank you so much 😀 Glad you liked it.

  • @vuppuabhishek8547
    @vuppuabhishek8547 4 месяца назад

    Super

  • @AnuShrivastav-zw6ls
    @AnuShrivastav-zw6ls 4 месяца назад

    I have 5 years of Network Security exp. On firewall/proxy/Antivirus n all. I want to go in mngmt but still keep in touch with cybersecurity concepts. Which certification is good and easy for me out of CISM or CRISC ?

  • @germainkone9029
    @germainkone9029 4 месяца назад

    Thanks sir. How this is related to data management? Data ownership ? Thanks

    • @security_for_you
      @security_for_you 4 месяца назад

      Hey, please connect me one to one on LinkedIn. I will guide you.

    • @germainkone9029
      @germainkone9029 4 месяца назад

      @@security_for_you sure. thanks.

  • @security_for_you
    @security_for_you 4 месяца назад

    ruclips.net/video/H06O925j08w/видео.html

  • @security_for_you
    @security_for_you 4 месяца назад

    Change Management: Ultimate Guide for Auditors | Emergency vs Normal Change

  • @mr.potterhead2278
    @mr.potterhead2278 4 месяца назад

    Correction There are 4 components in IED 1. Explosive 2. Detonator 3. Power source 4. Switch And there are 4 different types of switch mechanisms 1. Anti Handling switch which is also Victim Operative ...in this the victim himself is the operator 2. Ambient switch 3. Time Delay switch 4. Remote control or Radio control

  • @germainkone9029
    @germainkone9029 5 месяцев назад

    Nice work

  • @germainkone9029
    @germainkone9029 5 месяцев назад

    Another great one 👍🏿. Thanks

  • @germainkone9029
    @germainkone9029 5 месяцев назад

    Thank you so much 🙌🏾🙏

    • @security_for_you
      @security_for_you 5 месяцев назад

      I hope you found value from this video. 🙏🙂

    • @germainkone9029
      @germainkone9029 5 месяцев назад

      @@security_for_you Very informative. Thanks 🙏

  • @security_for_you
    @security_for_you 5 месяцев назад

    Video on KPI, KRI and KCI - ruclips.net/video/_T8p4VbDNbE/видео.htmlsi=Q8RpNPHDTRTqElm6

  • @security_for_you
    @security_for_you 5 месяцев назад

    Video on KPI, KRI and KCI - ruclips.net/video/_T8p4VbDNbE/видео.htmlsi=Q8RpNPHDTRTqElm6

  • @kritikashekhawat6820
    @kritikashekhawat6820 5 месяцев назад

    Very well explained. Really helpful for someone like me who is a beginner.

  • @germainkone9029
    @germainkone9029 5 месяцев назад

    Nice ONE. Do you have any videos on KPI and KRI ?

    • @security_for_you
      @security_for_you 5 месяцев назад

      As of now, there is no such video. I have noted your request and video is in the queue. You will get video on the channel before this weekend. It take lot of efforts to compile resources and make a good presentable video. Thanks for your patience

    • @germainkone9029
      @germainkone9029 5 месяцев назад

      @@security_for_you I do appreciate that. Thanks again for your time, commitment and support.

  • @germainkone9029
    @germainkone9029 5 месяцев назад

    Thanks again. What about KRI and KPI ? Video coming soon ? On the graph I see from expected recovery to Required recovery time is 4 hrs. Can we say that MTD = Downtime(2hrs) + 4 hrs ?

    • @security_for_you
      @security_for_you 5 месяцев назад

      The graph which you see, MTD is 4 hours and RPO is 2 hours which means Total time i.e. Required recovery is 4 hours but organisation will try to recover within RPO which is 2 hours or Expected Recovery. MTD = RPO time 2 Hours + Required recovery time from Expected reovery which is again 2 hours So MTD is 4 hours. If MTD was 5 hours with RPO of 2 hours then time from Expected recover to required recovery will be 3 hours which we also call as WRT - Work Recovery Time. I hope your doubt is clear now. Let me know if you have any more doubts.

    • @security_for_you
      @security_for_you 5 месяцев назад

      Update on KRI & KPI - I have noted your request and video is in the queue. You will get video on the channel before this weekend. It take lot of efforts to compile resources and make a good presentable video. Thanks for your patience

    • @germainkone9029
      @germainkone9029 5 месяцев назад

      @@security_for_you. Thanks 🙏

  • @sssomendra
    @sssomendra 5 месяцев назад

    Very well articulated

    • @security_for_you
      @security_for_you 5 месяцев назад

      Thank you for your feedback ❤️😄 Don't forget to check our another videos 😄