Network Security Model

Поділитися
Вставка
  • Опубліковано 23 жов 2024
  • Network Security: Network Security Model
    Topics discussed:
    1) Explanation of the need for a network security model.
    2) Four major tasks for designing a model for network security.
    3) Explanation of the need for network access security model.
    4) Role of a gatekeeper function to protect the information systems.
    Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
    Contribute: www.nesoacademy...
    Memberships: bit.ly/2U7YSPI
    Books: www.nesoacademy...
    Website ► www.nesoacademy...
    Forum ► forum.nesoacad...
    Facebook ► goo.gl/Nt0PmB
    Twitter ► / nesoacademy
    Music:
    Axol x Alex Skrindo - You [NCS Release]
    #NetworkSecurityByNeso #Cryptography #NetworkSecurity #NetworkSecurityModel

КОМЕНТАРІ • 31

  • @ಪದ್ಮಹಸ್ತಂ
    @ಪದ್ಮಹಸ್ತಂ Рік тому +8

    It is so sweet like a grand mother telling a very beautiful story to the kid who is curiously listening.. kudos to the great teacher who is telling the niche with all zeal and enthusiasm.. we need teachers like this in all schools and colleges.

  • @butterfly12397
    @butterfly12397 3 роки тому +19

    Actually I am searching for this topic at the correct time u have uploaded this thank u once again😍

  • @mahimudhiraj158
    @mahimudhiraj158 21 день тому +1

    Thank you so much sir ❤

  • @prodiptamondal1758
    @prodiptamondal1758 3 роки тому +26

    Please draw some annotations on the PPT, otherwise it is hard to concentrate

  • @saimrudula2140
    @saimrudula2140 3 роки тому +6

    Really a good session sir, thank you

  • @RolandIllig
    @RolandIllig 2 роки тому +9

    On one of the slides you had the item "Design an algorithm". Did you actually do this designing in the rest of the presentation? I seem to have missed it.
    Furthermore, it is common knowledge in the IT security community that you should not design your own cryptographic algorithms, you should rather use the established ones. Would it be more appropriate to say "Choose an algorithm" instead?

  • @basictech8337
    @basictech8337 2 роки тому +2

    Good explain

  • @EzekielSanda-c4h
    @EzekielSanda-c4h 6 днів тому

    Interesting

  • @mrcool..3168
    @mrcool..3168 3 роки тому +1

    Please upload some videos on project related topics based on security!!

  • @Rvindaavu
    @Rvindaavu 3 роки тому +4

    Nice explanation .

  • @butterfly12397
    @butterfly12397 3 роки тому +3

    Thank u sir

  • @ndidirichard9473
    @ndidirichard9473 6 днів тому

    I want to know is the learning courses we are supposed to learn week 8

  • @sangitazare.1258
    @sangitazare.1258 Рік тому

    Thank you sir.

  • @Kittenstreetbym
    @Kittenstreetbym Рік тому

    Amazing lecture sir

  • @learninginstudentscafe7284
    @learninginstudentscafe7284 3 роки тому +2

    Impressive video lecture

  • @htgrevanth8019
    @htgrevanth8019 3 роки тому +3

    Tq ,sir

  • @deepakr7242
    @deepakr7242 2 роки тому +2

    Nice 👍 thanks 👍😊

  • @saicharan4081
    @saicharan4081 3 роки тому +1

    Excellent.

  • @pulse5863
    @pulse5863 3 роки тому

    Thank you so much

  • @priyaammu1526
    @priyaammu1526 3 роки тому +1

    Tq sir

  • @learninginstudentscafe7284
    @learninginstudentscafe7284 3 роки тому

    Excellent

  • @butterfly12397
    @butterfly12397 3 роки тому +1

    When will u upload the next video.plz make it soon sir.

  • @avejessi4175
    @avejessi4175 2 роки тому +6

    Starts at 0:34

  • @benmacdormatt7773
    @benmacdormatt7773 2 роки тому +1

    How can a gate keeper identify a legitimate and non legitimate user

  • @KameNight
    @KameNight Рік тому +1

    Sir slides???

  • @mukul1162
    @mukul1162 3 роки тому

    👍👍

  • @vyshnavireddy932
    @vyshnavireddy932 Рік тому +3

    Koncham mellaga cheppu ra

  • @jiyajha
    @jiyajha 10 місяців тому +12

    Actually it is boring