Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

Поділитися
Вставка
  • Опубліковано 16 січ 2025

КОМЕНТАРІ • 77

  • @venwin25
    @venwin25 Рік тому +24

    This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.

    • @jeffcrume
      @jeffcrume Рік тому +6

      I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out

  • @jann9507
    @jann9507 9 місяців тому +5

    Fantastic talk;
    Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.

    • @jeffcrume
      @jeffcrume 8 місяців тому +2

      I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales

  • @theintjengineer
    @theintjengineer Рік тому +13

    Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
    Thank you, Sir.
    Greetings from Germany.

    • @jeffcrume
      @jeffcrume Рік тому +1

      Very kind of you to say, nnoK!

  • @Psalm-z6f
    @Psalm-z6f 12 днів тому +2

    Your teaching is on point.

  • @jesperkragh7701
    @jesperkragh7701 Рік тому +4

    the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats

    • @jeffcrume
      @jeffcrume Рік тому +1

      Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊

  • @claudiabucknor7159
    @claudiabucknor7159 Рік тому +8

    Mr. Jeff, you are a hero for this.

    • @jeffcrume
      @jeffcrume Рік тому +2

      You are very kind to say so!

  • @kabantsh
    @kabantsh Рік тому +10

    Dear Mr. Jeff
    Greetings,
    Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
    1- Syn
    2- Syn + Ack
    3- Ack
    Appreciate your efforts 😊
    Regards
    Mohamed Ayman

  • @ravijeganathan329
    @ravijeganathan329 11 місяців тому +16

    CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time

    • @jeffcrume
      @jeffcrume 11 місяців тому +2

      Thank you for such kind complements! 😊

  • @gabrielagalindo6339
    @gabrielagalindo6339 11 місяців тому +3

    Thank you for these videos Jeff, you are a great teacher

    • @jeffcrume
      @jeffcrume 10 місяців тому

      Very nice of you to say so! Thanks for watching!

  • @xrobot8052
    @xrobot8052 Рік тому +2

    Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...

    • @jeffcrume
      @jeffcrume Рік тому

      I’m so glad you liked it!

  • @ingchristianleal
    @ingchristianleal Рік тому +6

    Excellent Video

  • @amoprince4353
    @amoprince4353 Рік тому +3

    Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.

    • @jeffcrume
      @jeffcrume Рік тому +1

      Thanks so much for watching and for giving the great feedback!

  • @seetsamolapo5600
    @seetsamolapo5600 Рік тому +25

    Confidentiality
    - utilizes two technologies: Access Control and Encryption
    - Access control comprises of authentication: who are you, authorization: what you're allowed to do
    - MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
    Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
    2. Integrity
    - ensuring a transaction or data retains it's original form - not modified
    - utilizes Digital Signatures and Message Authentication Codes

    • @jeffcrume
      @jeffcrume Рік тому +2

      You have taken good notes, Seetsa!

    • @seetsamolapo5600
      @seetsamolapo5600 Рік тому +2

      @@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud

  • @bbarnaby8516
    @bbarnaby8516 Рік тому +4

    Thank you for making these videos Jeff

  • @giselesarian8484
    @giselesarian8484 11 місяців тому +1

    Absolutely fantastic!! Thank you so much.

    • @jeffcrume
      @jeffcrume 10 місяців тому

      Thank you for watching!

  • @mawellyankah
    @mawellyankah 10 місяців тому +1

    This is wow

    • @jeffcrume
      @jeffcrume 9 місяців тому +1

      Thank you!

  • @nafe844
    @nafe844 Рік тому +2

    What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.

    • @jeffcrume
      @jeffcrume 11 місяців тому

      Thanks so much! 😊

  • @EmeldaKate
    @EmeldaKate 9 місяців тому +1

    Thank you much Jeff, this is very interesting source of information.

    • @jeffcrume
      @jeffcrume 9 місяців тому

      I’m so glad you liked it!

  • @eliaszeray7981
    @eliaszeray7981 10 місяців тому +1

    Great ! Thank u.

    • @jeffcrume
      @jeffcrume 10 місяців тому

      You’re welcome!

  • @wayback1531991
    @wayback1531991 Місяць тому +1

    Very useful,
    Thanks so much!

    • @jeffcrume
      @jeffcrume 25 днів тому

      So glad you liked it!

  • @aleksandrkubar6255
    @aleksandrkubar6255 Рік тому +3

    Thanks for the lesson!

  • @aruizsilva
    @aruizsilva Рік тому +1

    Great job, as usual. Thanks!

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 Рік тому +3

    Thank you!

  • @Fahimfasail
    @Fahimfasail Рік тому +1

    amazing skill sir love to understand the concept

  • @ahmad1239112
    @ahmad1239112 Рік тому +1

    Thanks for this channel. High quality content ❤

  • @mohamedalpha3430
    @mohamedalpha3430 Рік тому +1

    Great ideas

  • @dangnabbit1379
    @dangnabbit1379 Рік тому +5

    Here for the beautiful randomness, waiting for the Series:Playlist

  • @frabsurdity
    @frabsurdity 8 місяців тому +1

    Thanks

  • @taiwoobalola68
    @taiwoobalola68 7 місяців тому +1

    Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).

    • @jeffcrume
      @jeffcrume 6 місяців тому +1

      Yes, I was trying to keep the video from getting too long. Typically SYN flood can be detected by network security tools (or even the server, itself). The key is to not allow all the resources to be tied up indefinitely so a timeout can help

  • @aisosadevtech527
    @aisosadevtech527 10 місяців тому +1

    please which is the beginning before this?, where should I start from before coming to this?.

    • @IBMTechnology
      @IBMTechnology  10 місяців тому

      You can find part 1 here: ua-cam.com/video/jq_LZ1RFPfU/v-deo.html

    • @jeffcrume
      @jeffcrume 9 місяців тому

      I hope you enjoy the series

  • @samsos7210
    @samsos7210 9 місяців тому +1

    Security by simplicity 😉

  • @kabusko12101979
    @kabusko12101979 Рік тому +1

    Hi Mr Jeff. Greetings from Canada.
    What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
    You know, I loved it and specifically the setup of the course presentation.
    I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
    Thanks again so much❤

    • @jeffcrume
      @jeffcrume Рік тому

      Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it

  • @neshepartal2327
    @neshepartal2327 11 місяців тому +16

    Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack

    • @baimini986
      @baimini986 7 місяців тому +1

      I noticed this too

    • @ModeCyber
      @ModeCyber 6 місяців тому +2

      As far as I know, we understand what he was trying to say, and there is no need to raise any concerns

    • @zahidmarwat3533
      @zahidmarwat3533 3 місяці тому +1

      Yes

  • @jonniuss
    @jonniuss 2 місяці тому +1

    ok if this is 2 of 10 vids, so where is the link to the full playlist in description ?

    • @IBMTechnology
      @IBMTechnology  2 місяці тому

      You can check out the full series here: ua-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html

  • @Companyellivera
    @Companyellivera 3 дні тому

    watching always sir wait soon now i need to protect tcp in my hand soon

  • @XBLMA
    @XBLMA 11 місяців тому +1

    So what controls were in place for Availability??

    • @jeffcrume
      @jeffcrume 11 місяців тому +1

      Keep watching other videos in the series that relate to detection and response

  • @premsoni0143
    @premsoni0143 7 місяців тому +1

    Is it related to IBM cloud services? Or in general cyber security?

    • @jeffcrume
      @jeffcrume 6 місяців тому

      These are general cybersecurity principles - not specific to any platform or product

  • @tibsyy895
    @tibsyy895 5 місяців тому

    CampTIA ITF+ :)

  • @SecurityCompliance-x5b
    @SecurityCompliance-x5b Місяць тому +1

    Isn't it SYN, SYN/ACK and ACK? or am missing something?

    • @jeffcrume
      @jeffcrume 25 днів тому +1

      Apologies, I got them backwards

    • @Fife_knight
      @Fife_knight 19 днів тому

      @@jeffcrume No worries champ, I appreciate everything you do.

  • @rober7o
    @rober7o 7 місяців тому

    I once had a 3 way handshake

  • @karashevf
    @karashevf 5 місяців тому

    24K

  • @karashevf
    @karashevf 5 місяців тому

    233

  • @rakshithreddy767
    @rakshithreddy767 2 місяці тому +1

    CIA ( not the spy guys) 🤣🤣🤣LAMO .