Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

Поделиться
HTML-код
  • Опубликовано: 18 июн 2024
  • IBM Security QRadar EDR : ibm.biz/BdyRmv
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyRmm
    In this next installment of the Cybersecurity Architecture series, Jeff "the Security guy" covers the three fundamentals that must be part of your security checklist: Confidentiality, Integrity, and Availability, also known as the "CIA Triad".
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume
    Chapters
    00:00 Confidentiality
    03:51 Integrity
    06:50 Availability

Комментарии • 58

  • @venwin25
    @venwin25 5 месяцев назад +9

    This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.

    • @jeffcrume
      @jeffcrume 5 месяцев назад +2

      I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out

  • @claudiabucknor7159
    @claudiabucknor7159 8 месяцев назад +6

    Mr. Jeff, you are a hero for this.

    • @jeffcrume
      @jeffcrume 7 месяцев назад +1

      You are very kind to say so!

  • @ingchristianleal
    @ingchristianleal Год назад +6

    Excellent Video

  • @seetsamolapo5600
    @seetsamolapo5600 Год назад +21

    Confidentiality
    - utilizes two technologies: Access Control and Encryption
    - Access control comprises of authentication: who are you, authorization: what you're allowed to do
    - MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
    Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
    2. Integrity
    - ensuring a transaction or data retains it's original form - not modified
    - utilizes Digital Signatures and Message Authentication Codes

    • @jeffcrume
      @jeffcrume Год назад +2

      You have taken good notes, Seetsa!

    • @seetsamolapo5600
      @seetsamolapo5600 Год назад +2

      @@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud

  • @dangnabbit1379
    @dangnabbit1379 Год назад +5

    Here for the beautiful randomness, waiting for the Series:Playlist

  • @jann9507
    @jann9507 2 месяца назад +1

    Fantastic talk;
    Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.

    • @jeffcrume
      @jeffcrume Месяц назад

      I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales

  • @mawellyankah
    @mawellyankah 3 месяца назад +1

    This is wow

  • @ahmad1239112
    @ahmad1239112 7 месяцев назад +1

    Thanks for this channel. High quality content ❤

  • @eliaszeray7981
    @eliaszeray7981 3 месяца назад +1

    Great ! Thank u.

    • @jeffcrume
      @jeffcrume 3 месяца назад

      You’re welcome!

  • @aleksandrkubar6255
    @aleksandrkubar6255 Год назад +3

    Thanks for the lesson!

  • @taiwoobalola68
    @taiwoobalola68 6 дней назад

    Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).

  • @Fahimfasail
    @Fahimfasail 8 месяцев назад +1

    amazing skill sir love to understand the concept

  • @amoprince4353
    @amoprince4353 6 месяцев назад +2

    Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      Thanks so much for watching and for giving the great feedback!

  • @kabantsh
    @kabantsh 11 месяцев назад +6

    Dear Mr. Jeff
    Greetings,
    Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
    1- Syn
    2- Syn + Ack
    3- Ack
    Appreciate your efforts 😊
    Regards
    Mohamed Ayman

  • @giselesarian8484
    @giselesarian8484 4 месяца назад +1

    Absolutely fantastic!! Thank you so much.

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Thank you for watching!

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 Год назад +3

    Thank you!

  • @ravijeganathan329
    @ravijeganathan329 4 месяца назад +9

    CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time

    • @jeffcrume
      @jeffcrume 4 месяца назад +1

      Thank you for such kind complements! 😊

  • @frabsurdity
    @frabsurdity Месяц назад

    Thanks

  • @EmeldaKate
    @EmeldaKate 2 месяца назад +1

    Thank you much Jeff, this is very interesting source of information.

    • @jeffcrume
      @jeffcrume 2 месяца назад

      I’m so glad you liked it!

  • @gabrielagalindo6339
    @gabrielagalindo6339 4 месяца назад +1

    Thank you for these videos Jeff, you are a great teacher

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Very nice of you to say so! Thanks for watching!

  • @xrobot8052
    @xrobot8052 6 месяцев назад +1

    Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      I’m so glad you liked it!

  • @jesperkragh7701
    @jesperkragh7701 7 месяцев назад +1

    the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊

  • @nafe844
    @nafe844 4 месяца назад +1

    What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Thanks so much! 😊

  • @aruizsilva
    @aruizsilva 6 месяцев назад +1

    Great job, as usual. Thanks!

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      Thanks for watching!

  • @bbarnaby8516
    @bbarnaby8516 10 месяцев назад +3

    Thank you for making these videos Jeff

    • @jeffcrume
      @jeffcrume 10 месяцев назад +1

      My pleasure!

  • @neshepartal2327
    @neshepartal2327 4 месяца назад +2

    Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack

  • @theintjengineer
    @theintjengineer Год назад +3

    Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
    Thank you, Sir.
    Greetings from Germany.

    • @jeffcrume
      @jeffcrume Год назад +1

      Very kind of you to say, nnoK!

  • @mohamedalpha3430
    @mohamedalpha3430 9 месяцев назад +1

    Great ideas

  • @kabusko12101979
    @kabusko12101979 6 месяцев назад +1

    Hi Mr Jeff. Greetings from Canada.
    What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
    You know, I loved it and specifically the setup of the course presentation.
    I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
    Thanks again so much❤

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it

  • @premsoni0143
    @premsoni0143 15 дней назад

    Is it related to IBM cloud services? Or in general cyber security?

  • @XBLMA
    @XBLMA 4 месяца назад +1

    So what controls were in place for Availability??

    • @jeffcrume
      @jeffcrume 4 месяца назад +1

      Keep watching other videos in the series that relate to detection and response

  • @samsos7210
    @samsos7210 2 месяца назад +1

    Security by simplicity 😉

  • @rober7o
    @rober7o 28 дней назад

    I once had a 3 way handshake

  • @aisosadevtech527
    @aisosadevtech527 2 месяца назад +1

    please which is the beginning before this?, where should I start from before coming to this?.

    • @IBMTechnology
      @IBMTechnology  2 месяца назад

      You can find part 1 here: ruclips.net/video/jq_LZ1RFPfU/видео.html

    • @jeffcrume
      @jeffcrume 2 месяца назад

      I hope you enjoy the series