- Видео 344
- Просмотров 181 611
Security For You
Индия
Добавлен 18 янв 2019
Security Professional | Talks about #security, #leadership, #securityaudits, #securitymanagement, and #businesscontinuityplanning
Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Просмотров: 81
Видео
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
Просмотров 57Месяц назад
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Просмотров 2403 месяца назад
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
Просмотров 843 месяца назад
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
Просмотров 1103 месяца назад
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
Просмотров 743 месяца назад
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
Просмотров 953 месяца назад
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Просмотров 843 месяца назад
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Просмотров 914 месяца назад
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Просмотров 704 месяца назад
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Why Passwords are stored as Hash & not Encrypted? Why Hashing + Salting is secure than Encryption? 💥
Просмотров 2034 месяца назад
Why Passwords are stored as Hash & not Encrypted? Why Hashing Salting is secure than Encryption? 💥
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Просмотров 584 месяца назад
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Просмотров 274 месяца назад
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Просмотров 884 месяца назад
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
Просмотров 394 месяца назад
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Просмотров 934 месяца назад
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
Просмотров 844 месяца назад
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
Просмотров 1644 месяца назад
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Просмотров 874 месяца назад
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Просмотров 904 месяца назад
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Просмотров 914 месяца назад
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
Просмотров 514 месяца назад
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Просмотров 184 месяца назад
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Просмотров 284 месяца назад
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Просмотров 1304 месяца назад
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
Просмотров 734 месяца назад
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Просмотров 1365 месяцев назад
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Просмотров 705 месяцев назад
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
Просмотров 2035 месяцев назад
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
How to conduct an Audit? Detailed step by step guide 💥 Different Audit phases explained wid examples
Просмотров 1255 месяцев назад
How to conduct an Audit? Detailed step by step guide 💥 Different Audit phases explained wid examples
Wow very informative! Its best to learn about things like these to stay safe and stay away
FBI i swear! I'm just looking for Deadpool 2 reference when she said IUD and Deadpool said "a bomb?"
Bro really explaining IED's like a highschool teacher, damn...
best idea 💡😜
I've seen banks list positions as Model risk governance specialist. Is this the same as a GRC specialist?
Gonzalez Melissa Johnson Karen Hernandez Ronald
Greetings, I enjoyed your video. Would you say that Preventive Controls are more important than Detective Controls? Thank you.
But how to stay safe?
Wilson Robert Martin Maria Hernandez Eric
Moore Patricia Thompson George Clark Richard
Miller Cynthia Johnson Brian Robinson Brian
Well explained and thank u🎉
Glad you like it ❤️😄
How can I contact you?
Connect me on LinkedIn.
Miller Donna Rodriguez David Lewis Scott
00:04 Dumpster Diving in InfoSec & Mitigation 00:40 Dumpster diving in information security involves retrieving discarded data for malicious purposes. 01:12 Hazards of Improper Disposal of Confidential Information 01:46 Unauthorized access to IT equipment & media 02:15 Dumpster placement and securing to prevent unauthorized access 02:51 Proper data disposal and employee training are crucial for information security. 03:29 Establish comprehensive disposal policies for sensitive information 04:02 Implementing mitigation strategies for third-party vendor discard waste Crafted by Merlin AI.
Miller Anthony Walker Kenneth Allen Steven
Hi Dushyant, this vdo on 3 Matrices is "Golden" hats off to you.
Thank you for encouraging to do better everytime 🙏😄
Amazing, can we get the ppt used for this?
If SOD is not maintained developer,approver are same as a auditor what action need to be taken?
Can a server in a DMZ pose a security risk to the rest of the network? Like if i put my playstation ip on DMZ network will it put any danger on my other devices if it got hacked ? Thank you in advance.
Great video! The distinctions between data security and data privacy were explained so clearly. Do you think organizations tend to prioritize one over the other, and what impact does that have?
Nice One!
Glad you like it. 😄🙏
Thank you sir ,really helpful.
Most welcome!
Hello, and thanks for this great video. I have a question though (min 2:00). In my opinion, these sound more like key results, meaning concrete achievements as part of a bigger "Objective". Correct? The KPI would be "Customer Satisfaction" but "Reduce the avarage time to complete checkout by 20%" sounds more like an objective. Am I missing something? Thanks!
Superb performance
Thank you
Insightful 💡
Thank you 🙏 😀
Nice one
Thanks for watching 😀
Subscribe to more information
Thank you
Good Effort
Thank you so much. Glad you liked it.
Thanks 👍
Thank you too
👍🏻👍🏻
Nice explanation for hashing with salt.
Thanks for watching
Thank you for the video. Good and simple way to understand hashing, encryption and what hashing with a salt gives as a benefit. Would you recommend a secure, prooven way of implementing hashing with salting that recognized with nationals or international standards?
Nice job. Thanks 🙏
Thank you 🙏😀 Glad you liked it.
This was greatly explained one can start implementing such process Thank you
Thank you so much 😀 Glad you liked it.
Super
Thank you 🙏😄
I have 5 years of Network Security exp. On firewall/proxy/Antivirus n all. I want to go in mngmt but still keep in touch with cybersecurity concepts. Which certification is good and easy for me out of CISM or CRISC ?
Thanks sir. How this is related to data management? Data ownership ? Thanks
Hey, please connect me one to one on LinkedIn. I will guide you.
@@security_for_you sure. thanks.
ruclips.net/video/H06O925j08w/видео.html
Change Management: Ultimate Guide for Auditors | Emergency vs Normal Change
Correction There are 4 components in IED 1. Explosive 2. Detonator 3. Power source 4. Switch And there are 4 different types of switch mechanisms 1. Anti Handling switch which is also Victim Operative ...in this the victim himself is the operator 2. Ambient switch 3. Time Delay switch 4. Remote control or Radio control
Nice work
Thank you! Cheers!
Another great one 👍🏿. Thanks
Thank you. 🙂
Thank you so much 🙌🏾🙏
I hope you found value from this video. 🙏🙂
@@security_for_you Very informative. Thanks 🙏
Video on KPI, KRI and KCI - ruclips.net/video/_T8p4VbDNbE/видео.htmlsi=Q8RpNPHDTRTqElm6
Video on KPI, KRI and KCI - ruclips.net/video/_T8p4VbDNbE/видео.htmlsi=Q8RpNPHDTRTqElm6
Very well explained. Really helpful for someone like me who is a beginner.
Glad it was helpful!
Nice ONE. Do you have any videos on KPI and KRI ?
As of now, there is no such video. I have noted your request and video is in the queue. You will get video on the channel before this weekend. It take lot of efforts to compile resources and make a good presentable video. Thanks for your patience
@@security_for_you I do appreciate that. Thanks again for your time, commitment and support.
Thanks again. What about KRI and KPI ? Video coming soon ? On the graph I see from expected recovery to Required recovery time is 4 hrs. Can we say that MTD = Downtime(2hrs) + 4 hrs ?
The graph which you see, MTD is 4 hours and RPO is 2 hours which means Total time i.e. Required recovery is 4 hours but organisation will try to recover within RPO which is 2 hours or Expected Recovery. MTD = RPO time 2 Hours + Required recovery time from Expected reovery which is again 2 hours So MTD is 4 hours. If MTD was 5 hours with RPO of 2 hours then time from Expected recover to required recovery will be 3 hours which we also call as WRT - Work Recovery Time. I hope your doubt is clear now. Let me know if you have any more doubts.
Update on KRI & KPI - I have noted your request and video is in the queue. You will get video on the channel before this weekend. It take lot of efforts to compile resources and make a good presentable video. Thanks for your patience
@@security_for_you. Thanks 🙏
Very well articulated
Thank you for your feedback ❤️😄 Don't forget to check our another videos 😄