Cyber Security Entertainment
Cyber Security Entertainment
  • 234
  • 441 892
STIX and TAXII - Cyber Threat Intelligence
In this video, we delve into STIX (Structured Threat Information Expression) and TAXII (Trusted Automated Exchange of Indicator Info), essential frameworks for Cyber Threat Intelligence (CTI). Learn how these standards help organizations understand and mitigate cybersecurity risks by defining, structuring, and securely sharing threat data.
Key Topics Covered:
STIX (Structured Threat Information Expression): Understand how STIX organizes threat data into objects such as Indicators, Threat Actors, Attack Patterns, Campaigns, Incidents, Malware, Observables, Courses of Action, and Relationships.
TAXII (Trusted Automated Exchange of Indicator Info): Discover how TAXII enables the secure transmission and sharing of STIX content between systems, ensuring consistent representation of threat data.
STIX Objects and Bundles: Explore various STIX components including STIX Bundles, STIX Patterns, and their associated metadata.
Services and API: Learn about TAXII services such as Discovery, Collection, and Inbox, and the HTTP/HTTPS protocols used for secure API communication.
Metadata and Security: Understand the role of metadata, authentication, encryption, and other security features in protecting threat data.
Whether you're new to Cyber Threat Intelligence or looking to deepen your understanding of STIX and TAXII, this video provides a comprehensive overview of these crucial tools and their applications in modern cybersecurity.
Переглядів: 59

Відео

Dynamic Web Application Security Testing (DAST)
Переглядів 612 місяці тому
In this video, we explore Dynamic Application Security Testing (DAST), a crucial process for identifying security weaknesses and vulnerabilities in web applications. What is DAST? DAST is a web scanner used for non-functional testing to pinpoint security flaws. It communicates with web applications through the front-end to identify potential vulnerabilities and architectural weaknesses. DAST ca...
Firewall Deployment - Security Zone, Security Policy, Address Book, RVI, VLAN, Subnet, App Traffic
Переглядів 1322 місяці тому
In this video, I will discuss Enterprise Security Architecture and various concepts related to network and network security within that architecture. For example, VLANs, access ports, routed VLAN interfaces, firewall security zones, security policies, and address books. So, let's begin. These are two laptops and two printers. We want to send a print job from these laptops to these printers. How...
MITRE ATT&CK
Переглядів 823 місяці тому
The ATT&CK framework stands for Adversarial Tactics, Techniques, and Common Knowledge. This framework was developed by MITRE Corporation and is a knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack life cycle and the platforms they are known to target. It serves as a guideline for classifying and describing cyberattacks and intrusions, a...
Zoombombing Attack on Video conferencing platforms
Переглядів 383 місяці тому
During the COVID-19 pandemic, people were forced to work from their homes, so organizations and schools depended on video conferencing platforms for their workforce. This also got the attention of hackers, who hacked into these meetings and inserted inappropriate content, forcing these meetings to shut down. This attack is known as a Zoom bombing attack because the famous software for video con...
Evolution of WLAN Security
Переглядів 1396 місяців тому
"In this video, I will discuss the evolution of wireless LAN security starting from WEP. It was part of the 802.11 VLAN initial standard and was introduced with VLANs in 1997. Then its next version was WEP2, which was an early draft of the 802.11i wireless LAN security protocol. However, this was a non-standard fix for vulnerabilities in WEP. Then came Wi-Fi Protected Access (WPA), which was al...
Cyber Risk Management Terminologies
Переглядів 586 місяців тому
"In this video, I will discuss certain terminologies relating to managing cybersecurity risks. The first one is confidentiality, which is also a cornerstone of cybersecurity. It aims to prevent unauthorized disclosure of your data or information. The second cornerstone is integrity, which seeks to prevent unauthorized modification to your data and ensures that the data is complete and accurate....
DHCP Snooping
Переглядів 2249 місяців тому
"DHCP stands for Dynamic Host Configuration Protocol and operates at layer seven, which is the application layer of the OSI model. It assigns IP addresses to network endpoints, operating at layer three of the OSI model, known as the Network layer. Here we have a network switch. One of its ports is connected to an authorized DHCP server, while another port is connected to a client seeking an IP ...
Enticement vs Entrapment
Переглядів 212Рік тому
"In this video, I will discuss two investigative and prosecution methods used by law enforcement agencies or their agents, which could also include IT companies. The first method is entrapment, and the second is enticement. The purpose of both investigative methods is to prosecute criminals. However, entrapment is illegal, whereas enticement is legal. In entrapment, law enforcement agencies or ...
Services of SIEM
Переглядів 194Рік тому
"In this video, I will discuss the security services offered by Security Information and Event Management (SIEM) solutions. These services include log centralization, log normalization, and alerts. All endpoints, servers, workstations, network devices, applications, cloud services, and security tools generate local logs. This log data is overwhelming to manually search or analyze. Therefore, we...
Cryptographic Key Management Practices
Переглядів 320Рік тому
"Cryptographic keys are used to encrypt data, and it is crucial to protect these cryptographic keys to ensure the confidentiality and integrity of the encrypted data. In this video, I will discuss cryptographic key management practices, starting from secure key generation, secure key storage and usage, and certain administrative controls related to key management practices like separation of du...
Process for Attack Simulation & Threat Analysis (PASTA)
Переглядів 576Рік тому
"The Process for Attack Simulation and Threat Analysis (PASTA) is a methodology developed to address cybersecurity risks comprehensively. It focuses on understanding and mitigating threats through a structured approach. PASTA involves seven key stages. Firstly, define business objectives aligned with technical requirements, security needs, and compliance considerations. Conduct preliminary busi...
Functions & Types of Cloud Access Security Broker (CASB)
Переглядів 121Рік тому
"Cloud Access Security Broker or CASB fits between a cloud customer and a cloud application, providing Identity and Access Management (IAM) services. It is a defense-in-depth strategy for using cloud services; however, organizations still need traditional firewalls and intrusion prevention systems. CASB augments firewalls rather than replacing them. Now, I will discuss certain functions provide...
Phases of Data Loss/ Leakage Prevention (DLP)
Переглядів 205Рік тому
"Every organization has a Data Protection Program, and Data Loss Prevention (DLP) is a crucial part of that program. A DLP strategy is essential for monitoring egress in your organization. These are different technologies and practices that must align with your organization's existing architecture. The objective here is to prevent data loss or unauthorized access to data. Now, there are three p...
Protection for Intellectual Property
Переглядів 49Рік тому
Every organization possesses some form of intellectual property that requires protection against theft or fraud, and in this video, I will discuss it. Intellectual property may include software, data, multimedia content such as music, movies, algorithms, and drawings. All these items need protection against fraud, theft, or misuse. There are certain worldwide organizations that provide such pro...
NIST CyberSecurity Framework (CSF)
Переглядів 265Рік тому
NIST CyberSecurity Framework (CSF)
Supply Chain Security Guidance - UK National Cyber Security Center
Переглядів 52Рік тому
Supply Chain Security Guidance - UK National Cyber Security Center
Privacy by Design (PbD)
Переглядів 2,8 тис.Рік тому
Privacy by Design (PbD)
Limitations of CIA Triad
Переглядів 175Рік тому
Limitations of CIA Triad
Just in Time (JIT) Access
Переглядів 258Рік тому
Just in Time (JIT) Access
SOC Functions by SANS
Переглядів 217Рік тому
SOC Functions by SANS
6 x Access Control Models (RBAC, RuBAC, MAC, DAC, ABAC, Risk BAC)
Переглядів 1,2 тис.Рік тому
6 x Access Control Models (RBAC, RuBAC, MAC, DAC, ABAC, Risk BAC)
NIST Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A )
Переглядів 191Рік тому
NIST Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A )
Lockheed Martin's Cyber Kill Chain
Переглядів 612Рік тому
Lockheed Martin's Cyber Kill Chain
Virtual Patching (External Patching, Just-in-Time Patching)
Переглядів 704Рік тому
Virtual Patching (External Patching, Just-in-Time Patching)
Breach Attack Simulation (BAS)
Переглядів 2,6 тис.Рік тому
Breach Attack Simulation (BAS)
Same-Origin Policy (SOP)
Переглядів 1,3 тис.Рік тому
Same-Origin Policy (SOP)
Broken Object Level Authorization (BOLA)
Переглядів 254Рік тому
Broken Object Level Authorization (BOLA)
Software Assurance Maturity Model (SAMM)
Переглядів 1,7 тис.Рік тому
Software Assurance Maturity Model (SAMM)
Software defined Security (SDS / SDSec)
Переглядів 242Рік тому
Software defined Security (SDS / SDSec)

КОМЕНТАРІ

  • @IndiiHero
    @IndiiHero День тому

    Blue balling 💀💀💀

  • @fcortesjp
    @fcortesjp 9 днів тому

    exactly what I was looking for, detailed. comprehensive and to the point.. thank you sir

  • @Unknown97909
    @Unknown97909 17 днів тому

    really great explanation

  • @muralin3460
    @muralin3460 Місяць тому

    Great explaination sir

  • @singkongkukus4122
    @singkongkukus4122 Місяць тому

    My android cell phone being hacked by my ex husband, and he is cybersecurity expert. He gave me brand new android phone Xiaomi POCO from the distributor and it was wrapped.. But he idk he sent me debug or virus like he did to my 1st Xiomi Redmi, or he did action on this content.??.. How i erase his hacking?? Maybe anyone can explain to me or gimme simple tutorials. I live in Indonesia. Thanks 🙏😊

  • @EliteKoala
    @EliteKoala 2 місяці тому

    awesome video! thank you for the info

  • @atharavhedage3607
    @atharavhedage3607 2 місяці тому

    The content is extremely hard to find and rich. Nice contexts!

  • @carlche647
    @carlche647 2 місяці тому

    Good explanation for VXLAN, thanks.

  • @MF-le7fp
    @MF-le7fp 2 місяці тому

    Great explanation... thank you! This is EXACTLY wtf is goin on with all my PCs. So once it’s infected by this crap, no matter how many times you “slash&burn” Windows, and reinstall a “clean copy” of the OS it does no good. You simply have a brand new Windows install that gets freshly infected. I was already fairly certain this was the case when I arrived here, and I am now looking for a way to kill it. So the question is, if one were to update the system bios via a non infected USB flash drive by changing the boot sequence in bios, and running the bios update straight off the flash drive without booting into Windows, would this method serve to also update (ie...overwrite) the currently infected MBR with a brand new, non infected MBR? Thanks for any reply from anybody! I was hoping you would touch on the possible solutions for the problem in this video, but still appreciate the succinct manner in which you explained it. It is spot on! 👍

  • @klnskljafdskl
    @klnskljafdskl 3 місяці тому

    the fucking music is terrible, ruins the video, can't watch this shit

  • @RazzleJazzle420
    @RazzleJazzle420 3 місяці тому

    it's so weird how there are so few good explanations of this on youtube...thank you sir!!

  • @f0rhacksd
    @f0rhacksd 3 місяці тому

    worth video

  • @Karwan-Saed
    @Karwan-Saed 3 місяці тому

    Many Thanks, It was so useful form me

  • @goyalsachin22
    @goyalsachin22 3 місяці тому

    Interested in last date of connection. any way to find that out.

  • @user-er4tg9ve1m
    @user-er4tg9ve1m 4 місяці тому

    The most dangerous attack, just read an article related to this, hope it could help the users: ask.wiki/2024/01/10/zero-day-attacks-a-potential-threat-stay-protected-with-this-guide/

  • @rmcgraw7943
    @rmcgraw7943 4 місяці тому

    I know all these, and more. 😅

  • @kengencitytv8787
    @kengencitytv8787 4 місяці тому

    Thank you more

  • @bonalaramamanikanta9580
    @bonalaramamanikanta9580 4 місяці тому

    This is best explanation for us 🎉congratulations 🎊 keep it up and please make more vedioes like this thank you

  • @lilyinua422
    @lilyinua422 5 місяців тому

    Дуже дякую за відео. Thank you for the lecture. That was really helpful.

  • @UCUPKU234
    @UCUPKU234 5 місяців тому

    so where is the implementation ?

  • @karthikeyanv3400
    @karthikeyanv3400 5 місяців тому

    Good walk through. Well explained

  • @bathulasaikrishna6299
    @bathulasaikrishna6299 5 місяців тому

    Sir how can we know mobile USB logging history

  • @edwinmacias8731
    @edwinmacias8731 6 місяців тому

    Thank you my friend, great explanation.

  • @surfmaster9612
    @surfmaster9612 7 місяців тому

    Explanation could highlight that If I wanted to connect to a specific device behind NAT, there is no way of knowing the private ip of that device before hand. Hence we have to use NAT-T.

    • @cybersecurityentertainment
      @cybersecurityentertainment 7 місяців тому

      NAT traversal enables IPsec traffic to pass through a NAT device without being discarded or corrupted, by adding UDP header for address & port translation. It is used in P2P (e.g VoIP or file sharing), as you mentioned.

  • @saggle1000
    @saggle1000 7 місяців тому

    thank you

  • @user-dh3tl3cw2s
    @user-dh3tl3cw2s 8 місяців тому

    protocol not protocole :))

  • @nj742
    @nj742 10 місяців тому

    You have to check IEEE

  • @justaferris
    @justaferris 10 місяців тому

    Have there been any results published on these metrics/methods of evaluation in practices?

  • @ssesaazirowlings2530
    @ssesaazirowlings2530 10 місяців тому

    thanks for the clear explanation

  • @funmemes5915
    @funmemes5915 Рік тому

    Good informative video

  • @Testacabeza
    @Testacabeza Рік тому

    So without a malware this is not possible at all, right? Thanks.

  • @Sabbtuna
    @Sabbtuna Рік тому

    Thank you brother!

  • @shivamanand8998
    @shivamanand8998 Рік тому

    Thanks, I was able to understand in one go

  • @SantoshSharma
    @SantoshSharma Рік тому

    nice video is there part -2?

  • @user-tg3nt6uv9p
    @user-tg3nt6uv9p Рік тому

    i have sonicwall firewall and i want conect vpn with azure, the logs of conexion inform next: Peer IPSec Security Gateway behind a NAT/NAPT Device. plese someone help me. tks

  • @user-hv5qh5tv1e
    @user-hv5qh5tv1e Рік тому

    zyzz brah

  • @roiceborruso8120
    @roiceborruso8120 Рік тому

    *promo sm*

  • @mailargowda2774
    @mailargowda2774 Рік тому

    Easy to understand 👌

  • @flearning269
    @flearning269 Рік тому

    Good information

  • @patrickdurdenman7221
    @patrickdurdenman7221 Рік тому

    Hi, I have actually looked at a whole variety of videos regarding this topic and have to say that yours is *by far* the most informative and intelligent one. I just wonder why you didn't put much effort into the quality of the audio?

  • @harikak5857
    @harikak5857 Рік тому

    Can we have your contact. We are looking for training.😊

  • @BasavarajGurupadMokashi
    @BasavarajGurupadMokashi Рік тому

    Hi man, thanks much for this video. Practical explanation would really be more impressive and much needed to understand more clearly 🙏

  • @user98826
    @user98826 Рік тому

    Great way to present the information, easy and effective!

  • @rajkumar-ne1ge
    @rajkumar-ne1ge Рік тому

    Hi I would like to know more about policy I need your support can you please share you gmail or how can I communicate with you eXtensible Access Control Markup Language (XACML)

  • @rajkumar-ne1ge
    @rajkumar-ne1ge Рік тому

    Hi I would like to know more about policy I need your support can you please share you gmail or how can I communicate with you

  • @syedibrahimkhalil786
    @syedibrahimkhalil786 Рік тому

    Amazing! Thank you for sharing these details. What do you advice for entry level aspirant? What to focus on more to get entry level jobs?

    • @cybersecurityentertainment
      @cybersecurityentertainment Рік тому

      Technical Hands-on in any domain, network, software development, server operating system, penetration testing. Start small, & your aim get better with time. Persistent is the key.

  • @skytimtw
    @skytimtw Рік тому

    Thank you!

  • @victoroghifobibi4090
    @victoroghifobibi4090 Рік тому

    Very clear and explanatory video. What application have you used to create the mind maps in your video?

  • @biohackingalchemy7996
    @biohackingalchemy7996 Рік тому

    So does anyone seeing this realize that the OSSTMM came up with the "idea" of Zero Trust?? Yes, this is an OSSTMM idea and its 22 years old. Go read the OSSTMM.

    • @cybersecurityentertainment
      @cybersecurityentertainment Рік тому

      current version is OSSTMM 3.02 (2010), earlier versions are not available on ISECOM website. I suppose you are talking about 1st version which was published in December 2000.

    • @biohackingalchemy7996
      @biohackingalchemy7996 Рік тому

      @@cybersecurityentertainment Yes, all of the Trust and controls are in the current issue. My reference was how Trust has always been a part of the OSSTMM and it has matured over time. As I dig more and more into the whole ZT idea, I see how the OSSTMM has already addressed the issue in much the same way but well before ZT was "Born".