Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability
HTML-код
- Опубликовано: 18 июн 2024
- IBM Security QRadar EDR : ibm.biz/BdyRmv
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyRmm
In this next installment of the Cybersecurity Architecture series, Jeff "the Security guy" covers the three fundamentals that must be part of your security checklist: Confidentiality, Integrity, and Availability, also known as the "CIA Triad".
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume
Chapters
00:00 Confidentiality
03:51 Integrity
06:50 Availability
This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.
I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out
Mr. Jeff, you are a hero for this.
You are very kind to say so!
Excellent Video
Confidentiality
- utilizes two technologies: Access Control and Encryption
- Access control comprises of authentication: who are you, authorization: what you're allowed to do
- MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
2. Integrity
- ensuring a transaction or data retains it's original form - not modified
- utilizes Digital Signatures and Message Authentication Codes
You have taken good notes, Seetsa!
@@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud
Here for the beautiful randomness, waiting for the Series:Playlist
Fantastic talk;
Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.
I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales
This is wow
Thank you!
Thanks for this channel. High quality content ❤
Great ! Thank u.
You’re welcome!
Thanks for the lesson!
Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).
amazing skill sir love to understand the concept
Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.
Thanks so much for watching and for giving the great feedback!
Dear Mr. Jeff
Greetings,
Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
1- Syn
2- Syn + Ack
3- Ack
Appreciate your efforts 😊
Regards
Mohamed Ayman
Absolutely fantastic!! Thank you so much.
Thank you for watching!
Thank you!
CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time
Thank you for such kind complements! 😊
Thanks
Thank you much Jeff, this is very interesting source of information.
I’m so glad you liked it!
Thank you for these videos Jeff, you are a great teacher
Very nice of you to say so! Thanks for watching!
Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...
I’m so glad you liked it!
the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats
Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊
What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.
Thanks so much! 😊
Great job, as usual. Thanks!
Thanks for watching!
Thank you for making these videos Jeff
My pleasure!
Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack
I noticed this too
Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
Thank you, Sir.
Greetings from Germany.
Very kind of you to say, nnoK!
Great ideas
Hi Mr Jeff. Greetings from Canada.
What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
You know, I loved it and specifically the setup of the course presentation.
I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
Thanks again so much❤
Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it
Is it related to IBM cloud services? Or in general cyber security?
So what controls were in place for Availability??
Keep watching other videos in the series that relate to detection and response
Security by simplicity 😉
Yes! 😊
I once had a 3 way handshake
please which is the beginning before this?, where should I start from before coming to this?.
You can find part 1 here: ruclips.net/video/jq_LZ1RFPfU/видео.html
I hope you enjoy the series