The Swiss Cheese Model for Cyberattacks

Поділитися
Вставка
  • Опубліковано 17 лис 2024
  • Today defense against cyber-attacks is becoming more and more difficult. Companies and organizations spend millions of dollars to protect their systems and data and ensure their information security.
    Information security may be achieved in many ways, and multi-layer defense is one of the most used.
    Today my topic is the Swiss Cheese Model, a model to understand the importance of layering: using several security defense layers against cyber attacks.
    Playlists:
    Business continuity
    • Business continuity
    Cyber Attacks and Defense
    • AAA framework: TACACS+...
    Basic Cryptography
    • Private Key Encryption...
    Advanced Cryptography:
    • What is digital signat...
    Public Key Infrastructure
    • Why digital certificate?
    Remote Access & WAN Technologies
    • Circuit Switching vs. ...

КОМЕНТАРІ • 10

  • @atomattacker0670
    @atomattacker0670 3 роки тому +1

    Strange how these brilliant videos valued by so little people.

  • @aravindc9232
    @aravindc9232 3 роки тому +2

    Nice and Clear . Just as always💟

  • @marcosalameh8677
    @marcosalameh8677 3 роки тому +4

    As usual so amazing informative video, Sunny you are my favorite professor all over the world, You are best of the best!

  • @chickennugget8880
    @chickennugget8880 3 роки тому

    I found you through a search for kerberos videos, great videos, many thanks for taking the time to do them, learning loads.👍

  • @FTYPdzouz
    @FTYPdzouz 3 роки тому

    I’m French and I speak a little English, I am Studying informatics. Your videos are very interesting, because it’s easy to understand and y learn lot of things, thanks you for your work 😉

  • @madds2547
    @madds2547 3 роки тому

    Your content provided via your channel is so great for learning, and revising content that I study at university. Thank you for your informative and well explained videos. Very helpful!

  • @Tyrelli1
    @Tyrelli1 3 роки тому

    Thank you professor Sunny

  • @franceleeparis37
    @franceleeparis37 3 роки тому

    This is all superfluous because most hack are inside jobs… maintenance engineers have access, admin staff have access, designers have access… the only way outsiders can gain full access is either due to incompetence or someone leaving a back door open (not logging out, sharing their log in details, using non secure wifi…).. but this is good presentation

  • @cydia6758
    @cydia6758 3 роки тому +1

    Sunny teacher, please teach us what is BGP routing protocol?

  • @Ragingwasabi9000
    @Ragingwasabi9000 3 роки тому +2

    swiss cheese is delicious