Security Services
HTML-код
- Опубликовано: 7 сен 2024
- Network Security: Security Services
Topics discussed:
1) The OSI security architecture.
2) Definition of security attacks by RFC 2828.
3) Explanation security service: Authentication with example.
4) Explanation security service: Access control with example.
5) Explanation security service: Data confidentiality with example.
6) Explanation security service: Data integrity with example.
7) Explanation security service: Non-repudiation with example.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #SecurityServices
01:07 Security services provide specific kind of protection
02:14 Security services provide protection to system resources
03:21 Authentication ensures that entities involved are who they claim to be
04:28 Authentication prevents unauthorized access and ensures data integrity
05:35 Data origin authentication, access control, and data confidentiality are important security services.
06:42 Data confidentiality is achieved through encryption.
07:49 Data integrity and non-repudiation are important security services.
08:56 Non-repudiation ensures proof of message transmission and receipt by specified parties.
Tq
0:54 is what you are looking for !
"Security services implement security policies and are implemented by security mechanisms." which one is implemented by security mechanisms, (security services, or security policies)? You already explained in your vid. I hope you'll revise and reply soon. Thanks!
Security mechanisms implement security services.
Security services implement security policies.
Very informative
Thanks a lot
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Thank u.
Hey I also started watching him
😊
Amazing video
Thanks a lot ❤️
Which book you are referring for network security? Please tell me
he is reffering to cryptography and network security by william stallings
Super explaination thanks sir
Arigatto yoii
Tq
Nice video..
Waiting for next video😅😅
Well Explained 🙌
hello, is it possible you add subtitle to all videos. Maybe my English still not good enough to listen all, if you can do, then very appreiciate it.
I am working on my Hindi
yOU HAVE MISSED AVAILABILITY ??
Captions please
Can you please set the subtitles in English kindly
send new best guatding gurkja or motor pikots on pedne goa bhagvati temple or setvents in pawshi kudal sibdudurga sateri temple too makibg sily fault of bjaviks
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
What is peer entity authentication?
Connection establishment bw sender and reciever
Please give subtitles in English
Need translation 😅😅
Hiii
raichu
U missed data integrity
Please give subtitles in English