Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability
Vložit
- čas přidán 31. 05. 2024
- IBM Security QRadar EDR : ibm.biz/BdyRmv
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyRmm
In this next installment of the Cybersecurity Architecture series, Jeff "the Security guy" covers the three fundamentals that must be part of your security checklist: Confidentiality, Integrity, and Availability, also known as the "CIA Triad".
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume
Chapters
00:00 Confidentiality
03:51 Integrity
06:50 Availability
This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.
I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out
CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time
Thank you for such kind complements! 😊
Confidentiality
- utilizes two technologies: Access Control and Encryption
- Access control comprises of authentication: who are you, authorization: what you're allowed to do
- MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
2. Integrity
- ensuring a transaction or data retains it's original form - not modified
- utilizes Digital Signatures and Message Authentication Codes
You have taken good notes, Seetsa!
@@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud
Here for the beautiful randomness, waiting for the Series:Playlist
Mr. Jeff, you are a hero for this.
You are very kind to say so!
Fantastic talk;
Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.
I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales
Dear Mr. Jeff
Greetings,
Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
1- Syn
2- Syn + Ack
3- Ack
Appreciate your efforts 😊
Regards
Mohamed Ayman
Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack
Excellent Video
the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats
Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊
Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
Thank you, Sir.
Greetings from Germany.
Very kind of you to say, nnoK!
Thank you much Jeff, this is very interesting source of information.
I’m so glad you liked it!
What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.
Thanks so much! 😊
Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.
Thanks so much for watching and for giving the great feedback!
Thank you for these videos Jeff, you are a great teacher
Very nice of you to say so! Thanks for watching!
Absolutely fantastic!! Thank you so much.
Thank you for watching!
Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...
I’m so glad you liked it!
Thank you!
Great ! Thank u.
You’re welcome!
Thank you for making these videos Jeff
My pleasure!
Thanks for the lesson!
Great job, as usual. Thanks!
Thanks for watching!
amazing skill sir love to understand the concept
Thanks for this channel. High quality content ❤
Thanks
This is wow
Thank you!
Great ideas
So what controls were in place for Availability??
Keep watching other videos in the series that relate to detection and response
Security by simplicity 😉
Yes! 😊
Hi Mr Jeff. Greetings from Canada.
What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
You know, I loved it and specifically the setup of the course presentation.
I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
Thanks again so much❤
Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it
I once had a 3 way handshake
please which is the beginning before this?, where should I start from before coming to this?.
You can find part 1 here: czcams.com/video/jq_LZ1RFPfU/video.html
I hope you enjoy the series