Timestamps (Powered by Merlin AI) 00:06 - Understanding the OSI Security Architecture 01:09 - Upgrading to a metal lock doesn't eliminate security vulnerabilities. 02:12 - Home security vulnerabilities lead to threats and attacks 03:16 - Threats, vulnerabilities, and attacks explained 04:23 - Attackers are intelligent and exploit system vulnerabilities. 05:25 - Security attacks compromise system security 06:28 - Overview of security mechanisms and services 07:27 - Overview of OSI Security Architecture components
Simple words Threats is a potiential, action or a negative event that is facilitated by vulnerability present in our system thats result in security breach and may cause a serious damage it can be done intentionally or not
Hi, i'm also trying to buy course outside india but it gets cancelled automatically everytime, can u fix the issue? I've also send email but it hasn't been replied, thanks
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
Love from Bangladesh Sir...💕💕
5:20 this is where u wanna start
all heroes don't wear cap
@@syedburhanofficial no cap
LUV U
welcome back......:-):-):-) lots of love
Timestamps (Powered by Merlin AI)
00:06 - Understanding the OSI Security Architecture
01:09 - Upgrading to a metal lock doesn't eliminate security vulnerabilities.
02:12 - Home security vulnerabilities lead to threats and attacks
03:16 - Threats, vulnerabilities, and attacks explained
04:23 - Attackers are intelligent and exploit system vulnerabilities.
05:25 - Security attacks compromise system security
06:28 - Overview of security mechanisms and services
07:27 - Overview of OSI Security Architecture components
Me looking at my house after seeing this video with a bat in my hand...
😂
Thank u so much for this gorgeous video ❤
Very useful...thank you
Thank you so much sir ❤
07/03/2023(Tuesday) ill be watching you guys
Are the contents taken from Williams Principles and practices book for cryptography and network security?
very nice lecture
Please make the PPTs ready in the website ASAP.
Thanks for the vids.
Simple words
Threats is a potiential, action or a negative event that is facilitated by vulnerability present in our system thats result in security breach and may cause a serious damage it can be done intentionally or not
5:14 OSI ARCHITECTURE INTRO
Very useful..
I like these lecture compare to the university
Hi, i'm also trying to buy course outside india but it gets cancelled automatically everytime, can u fix the issue? I've also send email but it hasn't been replied, thanks
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Nice sir
Thank you sir, how to get ppt files sir.
Never undeestimate acthreat /inteligence attack..cyber triad...
👍👍
Why I am Here But I am College Student
8/7/2024