Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

Поделиться
HTML-код
  • Опубликовано: 23 янв 2025

Комментарии • 78

  • @venwin25
    @venwin25 Год назад +24

    This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.

    • @jeffcrume
      @jeffcrume Год назад +6

      I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out

  • @claudiabucknor7159
    @claudiabucknor7159 Год назад +8

    Mr. Jeff, you are a hero for this.

    • @jeffcrume
      @jeffcrume Год назад +2

      You are very kind to say so!

  • @theintjengineer
    @theintjengineer Год назад +13

    Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
    Thank you, Sir.
    Greetings from Germany.

    • @jeffcrume
      @jeffcrume Год назад +1

      Very kind of you to say, nnoK!

  • @jann9507
    @jann9507 9 месяцев назад +5

    Fantastic talk;
    Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.

    • @jeffcrume
      @jeffcrume 9 месяцев назад +2

      I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales

  • @jesperkragh7701
    @jesperkragh7701 Год назад +5

    the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats

    • @jeffcrume
      @jeffcrume Год назад +1

      Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊

  • @rowanpatel8470
    @rowanpatel8470 3 дня назад

    This guy is brilliant. I wish I'd watched his videos when i first started working in IT

  • @kabantsh
    @kabantsh Год назад +10

    Dear Mr. Jeff
    Greetings,
    Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
    1- Syn
    2- Syn + Ack
    3- Ack
    Appreciate your efforts 😊
    Regards
    Mohamed Ayman

  • @ravijeganathan329
    @ravijeganathan329 Год назад +16

    CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time

    • @jeffcrume
      @jeffcrume 11 месяцев назад +2

      Thank you for such kind complements! 😊

  • @gabrielagalindo6339
    @gabrielagalindo6339 11 месяцев назад +3

    Thank you for these videos Jeff, you are a great teacher

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Very nice of you to say so! Thanks for watching!

  • @amoprince4353
    @amoprince4353 Год назад +3

    Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.

    • @jeffcrume
      @jeffcrume Год назад +1

      Thanks so much for watching and for giving the great feedback!

  • @Psalm-z6f
    @Psalm-z6f 19 дней назад +2

    Your teaching is on point.

  • @xrobot8052
    @xrobot8052 Год назад +2

    Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...

    • @jeffcrume
      @jeffcrume Год назад

      I’m so glad you liked it!

  • @ingchristianleal
    @ingchristianleal Год назад +6

    Excellent Video

  • @nafe844
    @nafe844 Год назад +2

    What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thanks so much! 😊

  • @seetsamolapo5600
    @seetsamolapo5600 Год назад +25

    Confidentiality
    - utilizes two technologies: Access Control and Encryption
    - Access control comprises of authentication: who are you, authorization: what you're allowed to do
    - MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
    Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
    2. Integrity
    - ensuring a transaction or data retains it's original form - not modified
    - utilizes Digital Signatures and Message Authentication Codes

    • @jeffcrume
      @jeffcrume Год назад +2

      You have taken good notes, Seetsa!

    • @seetsamolapo5600
      @seetsamolapo5600 Год назад +2

      @@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud

  • @bbarnaby8516
    @bbarnaby8516 Год назад +4

    Thank you for making these videos Jeff

  • @EmeldaKate
    @EmeldaKate 10 месяцев назад +1

    Thank you much Jeff, this is very interesting source of information.

    • @jeffcrume
      @jeffcrume 9 месяцев назад

      I’m so glad you liked it!

  • @giselesarian8484
    @giselesarian8484 11 месяцев назад +1

    Absolutely fantastic!! Thank you so much.

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thank you for watching!

  • @aruizsilva
    @aruizsilva Год назад +1

    Great job, as usual. Thanks!

    • @jeffcrume
      @jeffcrume Год назад

      Thanks for watching!

  • @aleksandrkubar6255
    @aleksandrkubar6255 Год назад +3

    Thanks for the lesson!

  • @mawellyankah
    @mawellyankah 10 месяцев назад +1

    This is wow

    • @jeffcrume
      @jeffcrume 9 месяцев назад +1

      Thank you!

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 Год назад +3

    Thank you!

  • @eliaszeray7981
    @eliaszeray7981 10 месяцев назад +1

    Great ! Thank u.

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      You’re welcome!

  • @Fahimfasail
    @Fahimfasail Год назад +1

    amazing skill sir love to understand the concept

  • @dangnabbit1379
    @dangnabbit1379 Год назад +5

    Here for the beautiful randomness, waiting for the Series:Playlist

  • @ahmad1239112
    @ahmad1239112 Год назад +1

    Thanks for this channel. High quality content ❤

  • @wayback1531991
    @wayback1531991 Месяц назад +1

    Very useful,
    Thanks so much!

    • @jeffcrume
      @jeffcrume Месяц назад

      So glad you liked it!

  • @mohamedalpha3430
    @mohamedalpha3430 Год назад +1

    Great ideas

  • @aisosadevtech527
    @aisosadevtech527 10 месяцев назад +1

    please which is the beginning before this?, where should I start from before coming to this?.

    • @IBMTechnology
      @IBMTechnology  10 месяцев назад

      You can find part 1 here: ruclips.net/video/jq_LZ1RFPfU/видео.html

    • @jeffcrume
      @jeffcrume 9 месяцев назад

      I hope you enjoy the series

  • @frabsurdity
    @frabsurdity 8 месяцев назад +1

    Thanks

  • @taiwoobalola68
    @taiwoobalola68 7 месяцев назад +1

    Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).

    • @jeffcrume
      @jeffcrume 7 месяцев назад +1

      Yes, I was trying to keep the video from getting too long. Typically SYN flood can be detected by network security tools (or even the server, itself). The key is to not allow all the resources to be tied up indefinitely so a timeout can help

  • @jonniuss
    @jonniuss 2 месяца назад +1

    ok if this is 2 of 10 vids, so where is the link to the full playlist in description ?

    • @IBMTechnology
      @IBMTechnology  2 месяца назад

      You can check out the full series here: ruclips.net/p/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY

  • @neshepartal2327
    @neshepartal2327 Год назад +16

    Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack

    • @baimini986
      @baimini986 7 месяцев назад +1

      I noticed this too

    • @ModeCyber
      @ModeCyber 6 месяцев назад +2

      As far as I know, we understand what he was trying to say, and there is no need to raise any concerns

    • @zahidmarwat3533
      @zahidmarwat3533 4 месяца назад +1

      Yes

  • @kabusko12101979
    @kabusko12101979 Год назад +1

    Hi Mr Jeff. Greetings from Canada.
    What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
    You know, I loved it and specifically the setup of the course presentation.
    I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
    Thanks again so much❤

    • @jeffcrume
      @jeffcrume Год назад

      Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it

  • @XBLMA
    @XBLMA Год назад +1

    So what controls were in place for Availability??

    • @jeffcrume
      @jeffcrume 11 месяцев назад +1

      Keep watching other videos in the series that relate to detection and response

  • @SecurityCompliance-x5b
    @SecurityCompliance-x5b Месяц назад +1

    Isn't it SYN, SYN/ACK and ACK? or am missing something?

    • @jeffcrume
      @jeffcrume Месяц назад +1

      Apologies, I got them backwards

    • @Fife_knight
      @Fife_knight 26 дней назад

      @@jeffcrume No worries champ, I appreciate everything you do.

  • @premsoni0143
    @premsoni0143 7 месяцев назад +1

    Is it related to IBM cloud services? Or in general cyber security?

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      These are general cybersecurity principles - not specific to any platform or product

  • @Companyellivera
    @Companyellivera 10 дней назад

    watching always sir wait soon now i need to protect tcp in my hand soon

  • @samsos7210
    @samsos7210 10 месяцев назад +1

    Security by simplicity 😉

    • @jeffcrume
      @jeffcrume 9 месяцев назад +1

      Yes! 😊

  • @tibsyy895
    @tibsyy895 5 месяцев назад

    CampTIA ITF+ :)

  • @rober7o
    @rober7o 8 месяцев назад

    I once had a 3 way handshake

  • @karashevf
    @karashevf 6 месяцев назад

    24K

  • @karashevf
    @karashevf 6 месяцев назад

    233

  • @rakshithreddy767
    @rakshithreddy767 2 месяца назад +1

    CIA ( not the spy guys) 🤣🤣🤣LAMO .