Тёмный
No video :(

Security Services 

Neso Academy
Подписаться 2,6 млн
Просмотров 232 тыс.
50% 1

Network Security: Security Services
Topics discussed:
1) The OSI security architecture.
2) Definition of security attacks by RFC 2828.
3) Explanation security service: Authentication with example.
4) Explanation security service: Access control with example.
5) Explanation security service: Data confidentiality with example.
6) Explanation security service: Data integrity with example.
7) Explanation security service: Non-repudiation with example.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #SecurityServices

Опубликовано:

 

23 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 35   
@gurrampavan9713
@gurrampavan9713 3 месяца назад
01:07 Security services provide specific kind of protection 02:14 Security services provide protection to system resources 03:21 Authentication ensures that entities involved are who they claim to be 04:28 Authentication prevents unauthorized access and ensures data integrity 05:35 Data origin authentication, access control, and data confidentiality are important security services. 06:42 Data confidentiality is achieved through encryption. 07:49 Data integrity and non-repudiation are important security services. 08:56 Non-repudiation ensures proof of message transmission and receipt by specified parties.
@tejapraveendevarajuobulase1896
@tejapraveendevarajuobulase1896 3 месяца назад
Tq
@avejessi4175
@avejessi4175 2 года назад
0:54 is what you are looking for !
@hemaysorathia2103
@hemaysorathia2103 3 года назад
Very informative
@gadaanet
@gadaanet 2 года назад
"Security services implement security policies and are implemented by security mechanisms." which one is implemented by security mechanisms, (security services, or security policies)? You already explained in your vid. I hope you'll revise and reply soon. Thanks!
@srinjoyghosh7273
@srinjoyghosh7273 2 года назад
Security mechanisms implement security services. Security services implement security policies.
@rimsha6001
@rimsha6001 2 года назад
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice?  Enforcing hard-to-guess passwords  Encrypting your hard drive  Looking sensitive documents in a safe  Stationing a marine guard outside an embassy  Assigning security clearances to staffers  Using SSL for data transfer  Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@akhilthehero2800
@akhilthehero2800 3 года назад
Which book you are referring for network security? Please tell me
@jakariahossainshakil2997
@jakariahossainshakil2997 3 года назад
he is reffering to cryptography and network security by william stallings
@haneeshahoney7358
@haneeshahoney7358 2 года назад
Super explaination thanks sir
@khawajaabdurrehman1269
@khawajaabdurrehman1269 10 месяцев назад
yOU HAVE MISSED AVAILABILITY ??
@abdalkderbouafia881
@abdalkderbouafia881 5 месяцев назад
Thanks a lot
@shraddhabhandurge665
@shraddhabhandurge665 2 года назад
Amazing video
@dhaneshpt8641
@dhaneshpt8641 Год назад
Thank u.
@ReacherFitness-di2rt
@ReacherFitness-di2rt 10 месяцев назад
Hey I also started watching him
@ReacherFitness-di2rt
@ReacherFitness-di2rt 10 месяцев назад
😊
@prernaarora2746
@prernaarora2746 2 года назад
Thanks a lot ❤️
@wanghao8504
@wanghao8504 Год назад
hello, is it possible you add subtitle to all videos. Maybe my English still not good enough to listen all, if you can do, then very appreiciate it.
@ReacherFitness-di2rt
@ReacherFitness-di2rt 10 месяцев назад
I am working on my Hindi
@NakshuwithViji
@NakshuwithViji 2 года назад
Tq
@Yohan_21
@Yohan_21 Год назад
Arigatto yoii
@parzival_zd_1156
@parzival_zd_1156 3 года назад
Nice video.. Waiting for next video😅😅
@AbhishekSingh-cu1fe
@AbhishekSingh-cu1fe 2 года назад
Well Explained 🙌
@tech-learner4555
@tech-learner4555 3 года назад
Captions please
@zahranoor2055
@zahranoor2055 Месяц назад
Can you please set the subtitles in English kindly
@hw2024
@hw2024 2 года назад
What is peer entity authentication?
@sureshsuresh-qv4eg
@sureshsuresh-qv4eg Год назад
Connection establishment bw sender and reciever
@zahranoor2055
@zahranoor2055 Месяц назад
Please give subtitles in English
@ekambaramsainikhil9301
@ekambaramsainikhil9301 3 года назад
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
@amalas1212
@amalas1212 5 месяцев назад
Need translation 😅😅
@eternal2794
@eternal2794 2 года назад
raichu
@dnyaneshwarpolji-p8g
@dnyaneshwarpolji-p8g Месяц назад
send new best guatding gurkja or motor pikots on pedne goa bhagvati temple or setvents in pawshi kudal sibdudurga sateri temple too makibg sily fault of bjaviks
@jokeboyvijay4514
@jokeboyvijay4514 2 месяца назад
Hiii
@rjviraj3923
@rjviraj3923 2 месяца назад
U missed data integrity
@zahranoor2055
@zahranoor2055 Месяц назад
Please give subtitles in English