Security Attacks
ฝัง
- เผยแพร่เมื่อ 4 ส.ค. 2024
- Network Security: Security Attacks
Topics discussed:
1) The OSI security architecture.
2) Explanation of security attacks.
3) Types of attacks: Active and Passive attacks with examples.
4) Explanation of passive attacks - Release of message contents and traffic analysis.
5) Explanation of active attacks - Masquerade, Replay, Modification, and Denial of Service (DoS) attack.
6) Difference between active and passive attacks.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy.org/donate
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy.org/recommende...
Website ► www.nesoacademy.org/
Forum ► forum.nesoacademy.org/
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #SecurityAttacks
I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much.
And also, I loved the Indian accent especially the way he pronounced Tim, haha.
Did you got job bro?
Such a beautiful and precise explanation, neso team always rocks.
Very useful for your explanation easily .
Thank you bro😊
Excellent Video.
Amazing explanation.
Great lecture!
Awesome explanation!!
Darth will cause breakup of Bob and Alice 😂😂😂 I think darth is ex of Alice
🤧😂🤧🤧🤧
Yarraa nengallaaa🤣🤣🤣
@@revathye4886 😂😂😂tamil ha semma
😂
😂🤣🤣🤣
Such a clean and clear explanation tq
easy to remember with your example well explained
Thank you sir it's really helpful
Great explanation...❤️
The bestest explanation i have ever seen ❤
Beautiful lecture thanks a lot
What an amazing explanation 🎉 hat's off
Very helpful video thank you
Nice lecture:)
thankQ for great explanation
Thank you so much!!
thank you my god bless you ; this is very helpful
Thanks. ....😊
best explanation. Thank you. Helped a lot
well explained...🤝🏿🇿🇲
thank you so much!
Thanks ✨
Very nice
Thank you .
Useful one
Your video watch and I am very very happy
thank you so much :)
Thanks
Great 👍
thank you
Awesome
Tqsm sir
Clear cut..
Please upload data structures videos
Please complete control systems asap
Modification of messages is also called as Man In The Middle Attack right ?? @NesoAcademy
thx thankss alot
Sir/mam where do I find yours complete notes on this subject
thanks a lot,
which playlist is this ?
can you please add the playlist link of each video from now on 💛💛
in the description box
th-cam.com/play/PLBlnK6fEyqRgJU3EsOYDTW7m6SUmW6kII.html
@@nesoacademy thanks 💛💛💛
0:52 is what you are looking for !
Passive attack can be classified a police callyou and tries to learn more about you these are triad cia messages....
Is phishing a Masquerading or identity theft ?
now i came to know that alice is female and bob is male
Thanks dear its very helpful
lessom
poor Bob xD
Darth vader is dangerous ;)
A little bit of slow speed speaking would be good
He already speaks so slow. I watch in 2x.
All jntuh students raise a like
Clean me
Darth Vaderr
kenapa ini buk :")
Untuk belajar
Would not be better if you could use Indian names or its important to fuch English culture everywhere?
Great idea