The OSI Security Architecture

Поделиться
HTML-код
  • Опубликовано: 20 янв 2025

Комментарии • 28

  • @_Who_u_are
    @_Who_u_are Год назад +2

    Love from Bangladesh Sir...💕💕

  • @billi5920
    @billi5920 3 года назад +66

    5:20 this is where u wanna start

  • @priyabratasingha174
    @priyabratasingha174 3 года назад +7

    welcome back......:-):-):-) lots of love

  • @vasapraharsha626
    @vasapraharsha626 2 дня назад

    Timestamps (Powered by Merlin AI)
    00:06 - Understanding the OSI Security Architecture
    01:09 - Upgrading to a metal lock doesn't eliminate security vulnerabilities.
    02:12 - Home security vulnerabilities lead to threats and attacks
    03:16 - Threats, vulnerabilities, and attacks explained
    04:23 - Attackers are intelligent and exploit system vulnerabilities.
    05:25 - Security attacks compromise system security
    06:28 - Overview of security mechanisms and services
    07:27 - Overview of OSI Security Architecture components

  • @ardnevnam
    @ardnevnam 2 года назад +46

    Me looking at my house after seeing this video with a bat in my hand...

  • @MAX-nv6yj
    @MAX-nv6yj Год назад +2

    Thank u so much for this gorgeous video ❤

  • @samueladesanya-wv1kc
    @samueladesanya-wv1kc 14 дней назад

    Very useful...thank you

  • @mahimudhiraj158
    @mahimudhiraj158 3 месяца назад

    Thank you so much sir ❤

  • @ranjithrsr3859
    @ranjithrsr3859 Год назад +2

    07/03/2023(Tuesday) ill be watching you guys

  • @ZakirHussain-nd4fw
    @ZakirHussain-nd4fw 10 месяцев назад +1

    Are the contents taken from Williams Principles and practices book for cryptography and network security?

  • @berihuweldu-m9e
    @berihuweldu-m9e Год назад

    very nice lecture

  • @srishylesh2935
    @srishylesh2935 2 года назад +5

    Please make the PPTs ready in the website ASAP.
    Thanks for the vids.

  • @muhammedhuzaifa1392
    @muhammedhuzaifa1392 Год назад

    Simple words
    Threats is a potiential, action or a negative event that is facilitated by vulnerability present in our system thats result in security breach and may cause a serious damage it can be done intentionally or not

  • @TPBJ7899
    @TPBJ7899 Год назад +1

    5:14 OSI ARCHITECTURE INTRO

  • @dhaneshpt8641
    @dhaneshpt8641 Год назад

    Very useful..

  • @zariyahcampos3565
    @zariyahcampos3565 Год назад +1

    I like these lecture compare to the university

  • @quinnajodanti
    @quinnajodanti 3 года назад +5

    Hi, i'm also trying to buy course outside india but it gets cancelled automatically everytime, can u fix the issue? I've also send email but it hasn't been replied, thanks

  • @rimsha6001
    @rimsha6001 2 года назад +6

    Asslam u alaikum Sir
    Aik question hai kindly answer krdy
    Question:
    IT Security
    Personnel Security
    Physical Security
    Operational Security
    Into which of these would you put the following, justify your choice?
     Enforcing hard-to-guess passwords
     Encrypting your hard drive
     Looking sensitive documents in a safe
     Stationing a marine guard outside an embassy
     Assigning security clearances to staffers
     Using SSL for data transfer
     Having off-site backup of documents
    Plzzz sir i request you iska answer bta dy plzzzz

  • @surajshaw5880
    @surajshaw5880 3 года назад

    Nice sir

  • @AbdallaGheryani
    @AbdallaGheryani Год назад

    Thank you sir, how to get ppt files sir.

  • @elvistaylor3067
    @elvistaylor3067 Год назад

    Never undeestimate acthreat /inteligence attack..cyber triad...

  • @Sampath_Madhushanka
    @Sampath_Madhushanka 2 года назад +1

    👍👍

  • @newviraltricks
    @newviraltricks 10 месяцев назад

    Why I am Here But I am College Student

  • @md.mesbahuddin_1035
    @md.mesbahuddin_1035 6 месяцев назад

    8/7/2024