AUTOSAR | CYBER SECURITY | FUNDAMETALS OF CYBER SECURITY | BASIC OVERVIEW

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • This is Basic Overview of Cyber Security Stack and the key concepts used in it. It will give you the overview of working principle of Cyber Security Stack.

ความคิดเห็น • 28

  • @MudiamVishnuKumar
    @MudiamVishnuKumar 3 ปีที่แล้ว +5

    Nice Explanation bro. Should have spoken a bit loudly

    • @autosarworld4858
      @autosarworld4858  2 ปีที่แล้ว

      Sure. Thanks for the feedback. Will improve in future videos

  • @kirankommalapati6279
    @kirankommalapati6279 หลายเดือนก่อน

    Can I get your contact
    I am looking for Autosar Cybersecurity Training

  • @nitinsasture6516
    @nitinsasture6516 หลายเดือนก่อน

    Why SecOC is not part of your cyber security data flow?

  • @sangavim1026
    @sangavim1026 7 หลายเดือนก่อน

    Please update secure boot and secure update

  • @Raja-ct9xq
    @Raja-ct9xq 4 หลายเดือนก่อน

    MAC is just hash of the message, signed with Private Key of the sender, so the tampering can be detected at the receiver end. Receiver would calculate the hash of the message and then decrypt the encrypted hash sent by the sender, if both match then it is considered as not tampered.

  • @devadathddr314
    @devadathddr314 3 หลายเดือนก่อน

    Nice explanation 👏
    Waiting for part 2

  • @curiousworld6644
    @curiousworld6644 ปีที่แล้ว

    Nice explaination. Volume is low. We want still more video in depth about crypto stack.

  • @yeshajain1821
    @yeshajain1821 2 ปีที่แล้ว +1

    Where are the other topics? As you committed in video?

    • @autosarworld4858
      @autosarworld4858  2 ปีที่แล้ว +1

      Hello Yesha, sorry for the trouble, I will be back with creating the videos and as promised. I will cover up the topics in comings days. Thank you for your comment

    • @yeshajain1821
      @yeshajain1821 2 ปีที่แล้ว +1

      @@autosarworld4858 it's been 7 months you have not uploaded the next video.

  • @prashanthimurali1108
    @prashanthimurali1108 ปีที่แล้ว

    Sound is very low brother but good content go ahead

  • @eaglehunt7176
    @eaglehunt7176 2 ปีที่แล้ว

    Could please upload new videos. Great effort thanks

  • @mudemsrinivasreddy304
    @mudemsrinivasreddy304 2 ปีที่แล้ว

    Hi,
    It was clear and informative
    Could you please share other videos link
    Thanks

  • @devangbhatt3096
    @devangbhatt3096 2 ปีที่แล้ว

    Great presentation... please keep it up bro...I am waiting for your next video

  • @ThePradeepchamp
    @ThePradeepchamp ปีที่แล้ว

    Very nicely explained. Thank you :)

  • @hemavathimuthusamy4386
    @hemavathimuthusamy4386 2 ปีที่แล้ว

    Very nice. Crisp and clear. Have a doubt. Can u pls explain the mathematical derivation or linking between asymmetrical keys

  • @Leepdeep
    @Leepdeep 2 ปีที่แล้ว +1

    Good insight. Keep it up 👍

  • @warrior5741
    @warrior5741 ปีที่แล้ว

    Thank you so much for the part1... waiting for part2

  • @shrivastavpiyush
    @shrivastavpiyush 2 ปีที่แล้ว

    Where is the next video you mentioned about??

  • @curiousworld6644
    @curiousworld6644 ปีที่แล้ว

    Nice explaination . Thank you

  • @sushanttodkar8294
    @sushanttodkar8294 2 ปีที่แล้ว

    Thanks for the explanation

  • @subhrasoiandvlogs
    @subhrasoiandvlogs 2 ปีที่แล้ว

    Short, crisp and to the point explaination

  • @balatr3826
    @balatr3826 ปีที่แล้ว

    Too low sound

  • @roopeshmotewar7702
    @roopeshmotewar7702 2 ปีที่แล้ว

    Not sure is it correct
    In packet it shown as mac plus data but in block diagram it shown only encrypted data.
    If Symetric key used in that case no need to send plane data.
    If it has CRC then plan data and CRC (MAC).
    Kindly confirm

    • @autosarworld4858
      @autosarworld4858  2 ปีที่แล้ว +5

      Hello Roopesh, Thank you for your comment. CRC is a check for the integrity(whether the data is modified unintetionally) but MAC is used for Authentication(intended data for specific user).
      MAC+DATA= Encrypted Data. To Decrypt the data Key is used.
      Let me know if this resolves your query. If not, let me know.
      Thank you

    • @warrior5741
      @warrior5741 ปีที่แล้ว

      Hello Roopesh in cyber security, you can compare MAC with CRC and message counter with freshness value....there is no CRC and message counter in message when it is authenticated message ... you can see Mac and freshness value