Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

Поделиться
HTML-код
  • Опубликовано: 26 сен 2024

Комментарии • 66

  • @venwin25
    @venwin25 8 месяцев назад +16

    This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.

    • @jeffcrume
      @jeffcrume 8 месяцев назад +4

      I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out

  • @claudiabucknor7159
    @claudiabucknor7159 11 месяцев назад +7

    Mr. Jeff, you are a hero for this.

    • @jeffcrume
      @jeffcrume 11 месяцев назад +2

      You are very kind to say so!

  • @theintjengineer
    @theintjengineer Год назад +6

    Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
    Thank you, Sir.
    Greetings from Germany.

    • @jeffcrume
      @jeffcrume Год назад +1

      Very kind of you to say, nnoK!

  • @kabantsh
    @kabantsh Год назад +8

    Dear Mr. Jeff
    Greetings,
    Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
    1- Syn
    2- Syn + Ack
    3- Ack
    Appreciate your efforts 😊
    Regards
    Mohamed Ayman

  • @seetsamolapo5600
    @seetsamolapo5600 Год назад +23

    Confidentiality
    - utilizes two technologies: Access Control and Encryption
    - Access control comprises of authentication: who are you, authorization: what you're allowed to do
    - MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
    Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
    2. Integrity
    - ensuring a transaction or data retains it's original form - not modified
    - utilizes Digital Signatures and Message Authentication Codes

    • @jeffcrume
      @jeffcrume Год назад +2

      You have taken good notes, Seetsa!

    • @seetsamolapo5600
      @seetsamolapo5600 Год назад +2

      @@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud

  • @jesperkragh7701
    @jesperkragh7701 10 месяцев назад +3

    the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats

    • @jeffcrume
      @jeffcrume 10 месяцев назад +1

      Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊

  • @ingchristianleal
    @ingchristianleal Год назад +6

    Excellent Video

  • @amoprince4353
    @amoprince4353 9 месяцев назад +3

    Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.

    • @jeffcrume
      @jeffcrume 8 месяцев назад +1

      Thanks so much for watching and for giving the great feedback!

  • @gabrielagalindo6339
    @gabrielagalindo6339 7 месяцев назад +2

    Thank you for these videos Jeff, you are a great teacher

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Very nice of you to say so! Thanks for watching!

  • @jann9507
    @jann9507 5 месяцев назад +2

    Fantastic talk;
    Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.

    • @jeffcrume
      @jeffcrume 5 месяцев назад +1

      I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales

  • @xrobot8052
    @xrobot8052 10 месяцев назад +2

    Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      I’m so glad you liked it!

  • @ravijeganathan329
    @ravijeganathan329 8 месяцев назад +10

    CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time

    • @jeffcrume
      @jeffcrume 7 месяцев назад +2

      Thank you for such kind complements! 😊

  • @bbarnaby8516
    @bbarnaby8516 Год назад +4

    Thank you for making these videos Jeff

  • @dangnabbit1379
    @dangnabbit1379 Год назад +5

    Here for the beautiful randomness, waiting for the Series:Playlist

  • @aleksandrkubar6255
    @aleksandrkubar6255 Год назад +3

    Thanks for the lesson!

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 Год назад +3

    Thank you!

  • @taiwoobalola68
    @taiwoobalola68 3 месяца назад +1

    Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).

    • @jeffcrume
      @jeffcrume 3 месяца назад +1

      Yes, I was trying to keep the video from getting too long. Typically SYN flood can be detected by network security tools (or even the server, itself). The key is to not allow all the resources to be tied up indefinitely so a timeout can help

  • @frabsurdity
    @frabsurdity 4 месяца назад +1

    Thanks

  • @giselesarian8484
    @giselesarian8484 7 месяцев назад +1

    Absolutely fantastic!! Thank you so much.

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Thank you for watching!

  • @nafe844
    @nafe844 8 месяцев назад +1

    What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Thanks so much! 😊

  • @aruizsilva
    @aruizsilva 9 месяцев назад +1

    Great job, as usual. Thanks!

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      Thanks for watching!

  • @eliaszeray7981
    @eliaszeray7981 6 месяцев назад +1

    Great ! Thank u.

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      You’re welcome!

  • @EmeldaKate
    @EmeldaKate 6 месяцев назад +1

    Thank you much Jeff, this is very interesting source of information.

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      I’m so glad you liked it!

  • @Fahimfasail
    @Fahimfasail 11 месяцев назад +1

    amazing skill sir love to understand the concept

  • @ahmad1239112
    @ahmad1239112 10 месяцев назад +1

    Thanks for this channel. High quality content ❤

  • @neshepartal2327
    @neshepartal2327 8 месяцев назад +7

    Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack

    • @baimini986
      @baimini986 3 месяца назад

      I noticed this too

    • @ModeCyber
      @ModeCyber 2 месяца назад

      As far as I know, we understand what he was trying to say, and there is no need to raise any concerns

    • @zahidmarwat3533
      @zahidmarwat3533 5 дней назад

      Yes

  • @mohamedalpha3430
    @mohamedalpha3430 Год назад +1

    Great ideas

  • @mawellyankah
    @mawellyankah 6 месяцев назад +1

    This is wow

    • @jeffcrume
      @jeffcrume 6 месяцев назад +1

      Thank you!

  • @aisosadevtech527
    @aisosadevtech527 6 месяцев назад +1

    please which is the beginning before this?, where should I start from before coming to this?.

    • @IBMTechnology
      @IBMTechnology  6 месяцев назад

      You can find part 1 here: ruclips.net/video/jq_LZ1RFPfU/видео.html

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      I hope you enjoy the series

  • @XBLMA
    @XBLMA 8 месяцев назад +1

    So what controls were in place for Availability??

    • @jeffcrume
      @jeffcrume 7 месяцев назад +1

      Keep watching other videos in the series that relate to detection and response

  • @samsos7210
    @samsos7210 6 месяцев назад +1

    Security by simplicity 😉

    • @jeffcrume
      @jeffcrume 6 месяцев назад +1

      Yes! 😊

  • @premsoni0143
    @premsoni0143 3 месяца назад +1

    Is it related to IBM cloud services? Or in general cyber security?

    • @jeffcrume
      @jeffcrume 3 месяца назад

      These are general cybersecurity principles - not specific to any platform or product

  • @rober7o
    @rober7o 4 месяца назад

    I once had a 3 way handshake

  • @kabusko12101979
    @kabusko12101979 9 месяцев назад +1

    Hi Mr Jeff. Greetings from Canada.
    What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
    You know, I loved it and specifically the setup of the course presentation.
    I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
    Thanks again so much❤

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it

  • @salonsospain
    @salonsospain 2 месяца назад

    24K

  • @salonsospain
    @salonsospain 2 месяца назад

    233

  • @SamuelMegan-k4f
    @SamuelMegan-k4f 9 дней назад

    Hall Elizabeth Thomas Frank Young George

  • @tibsyy895
    @tibsyy895 Месяц назад

    CampTIA ITF+ :)