Security Attacks
HTML-код
- Опубликовано: 30 июл 2024
- Network Security: Security Attacks
Topics discussed:
1) The OSI security architecture.
2) Explanation of security attacks.
3) Types of attacks: Active and Passive attacks with examples.
4) Explanation of passive attacks - Release of message contents and traffic analysis.
5) Explanation of active attacks - Masquerade, Replay, Modification, and Denial of Service (DoS) attack.
6) Difference between active and passive attacks.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy.org/donate
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy.org/recommende...
Website ► www.nesoacademy.org/
Forum ► forum.nesoacademy.org/
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #SecurityAttacks
I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much.
And also, I loved the Indian accent especially the way he pronounced Tim, haha.
Did you got job bro?
Darth will cause breakup of Bob and Alice 😂😂😂 I think darth is ex of Alice
🤧😂🤧🤧🤧
Yarraa nengallaaa🤣🤣🤣
@@revathye4886 😂😂😂tamil ha semma
😂
😂🤣🤣🤣
Such a beautiful and precise explanation, neso team always rocks.
Very useful for your explanation easily .
Thank you bro😊
Excellent Video.
Amazing explanation.
easy to remember with your example well explained
Thank you sir it's really helpful
Such a clean and clear explanation tq
Great lecture!
Beautiful lecture thanks a lot
Very helpful video thank you
The bestest explanation i have ever seen ❤
What an amazing explanation 🎉 hat's off
Awesome explanation!!
Great explanation...❤️
thankQ for great explanation
thank you my god bless you ; this is very helpful
Thank you so much!!
best explanation. Thank you. Helped a lot
Nice lecture:)
thank you so much!
Modification of messages is also called as Man In The Middle Attack right ?? @NesoAcademy
Thanks. ....😊
Your video watch and I am very very happy
well explained...🤝🏿🇿🇲
Sir/mam where do I find yours complete notes on this subject
Thanks ✨
thank you so much :)
Thank you .
Please complete control systems asap
Please upload data structures videos
Very nice
Awesome
Great 👍
Useful one
thank you
thanks a lot,
which playlist is this ?
can you please add the playlist link of each video from now on 💛💛
in the description box
ruclips.net/p/PLBlnK6fEyqRgJU3EsOYDTW7m6SUmW6kII
@@nesoacademy thanks 💛💛💛
Thanks
Clear cut..
Tqsm sir
0:52 is what you are looking for !
Is phishing a Masquerading or identity theft ?
thx thankss alot
Passive attack can be classified a police callyou and tries to learn more about you these are triad cia messages....
A little bit of slow speed speaking would be good
He already speaks so slow. I watch in 2x.
poor Bob xD
now i came to know that alice is female and bob is male
Darth vader is dangerous ;)
Thanks dear its very helpful
lessom
All jntuh students raise a like
Darth Vaderr
kenapa ini buk :")
Untuk belajar
Clean me
Would not be better if you could use Indian names or its important to fuch English culture everywhere?
Great idea