Network Security Model

  Рет қаралды 261,572

Neso Academy

Neso Academy

Күн бұрын

Network Security: Network Security Model
Topics discussed:
1) Explanation of the need for a network security model.
2) Four major tasks for designing a model for network security.
3) Explanation of the need for network access security model.
4) Role of a gatekeeper function to protect the information systems.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #NetworkSecurityModel

Пікірлер: 34
@ಪದ್ಮಹಸ್ತಂ
@ಪದ್ಮಹಸ್ತಂ Жыл бұрын
It is so sweet like a grand mother telling a very beautiful story to the kid who is curiously listening.. kudos to the great teacher who is telling the niche with all zeal and enthusiasm.. we need teachers like this in all schools and colleges.
@SanjayKumar-lk7qi
@SanjayKumar-lk7qi Жыл бұрын
pooyi podukora pukaa
@butterfly12397
@butterfly12397 3 жыл бұрын
Actually I am searching for this topic at the correct time u have uploaded this thank u once again😍
@bharathkunchepu1579
@bharathkunchepu1579 Ай бұрын
00:03 Understanding the Network Security Model 01:39 Message transformation and secure transmission on the internet. 03:05 Network security model is essential for protecting sensitive information 04:56 Encryption algorithm is crucial for network security. 07:10 Focus on distribution and sharing of information securely 08:17 Network Security Model for difficult tasks 09:28 Internal security controls protect information internally and externally. 10:32 Gatekeeper functions analyze traffic and identify legitimate users Crafted by Merlin AI.00:03 Understanding the Network Security Model 01:39 Message transformation and secure transmission on the internet. 03:05 Network security model is essential for protecting sensitive information 04:56 Encryption algorithm is crucial for network security. 07:10 Focus on distribution and sharing of information securely 08:17 Network Security Model for difficult tasks 09:28 Internal security controls protect information internally and externally. 10:32 Gatekeeper functions analyze traffic and identify legitimate users
@saimrudula2140
@saimrudula2140 3 жыл бұрын
Really a good session sir, thank you
@mahimudhiraj158
@mahimudhiraj158 4 ай бұрын
Thank you so much sir ❤
@Rvindaavu
@Rvindaavu 3 жыл бұрын
Nice explanation .
@SivaraniAngirekula
@SivaraniAngirekula 2 ай бұрын
Your videos are super sir
@deepakr7242
@deepakr7242 3 жыл бұрын
Nice 👍 thanks 👍😊
@basictech8337
@basictech8337 2 жыл бұрын
Good explain
@prodiptamondal1758
@prodiptamondal1758 3 жыл бұрын
Please draw some annotations on the PPT, otherwise it is hard to concentrate
@learninginstudentscafe7284
@learninginstudentscafe7284 3 жыл бұрын
Impressive video lecture
@butterfly12397
@butterfly12397 3 жыл бұрын
Thank u sir
@avejessi4175
@avejessi4175 2 жыл бұрын
Starts at 0:34
@sangitazare.1258
@sangitazare.1258 Жыл бұрын
Thank you sir.
@mrcool..3168
@mrcool..3168 3 жыл бұрын
Please upload some videos on project related topics based on security!!
@Kittenstreetbym
@Kittenstreetbym Жыл бұрын
Amazing lecture sir
@saicharan4081
@saicharan4081 3 жыл бұрын
Excellent.
@pulse5863
@pulse5863 3 жыл бұрын
Thank you so much
@htgrevanth8019
@htgrevanth8019 3 жыл бұрын
Tq ,sir
@EzekielSanda-c4h
@EzekielSanda-c4h 3 ай бұрын
Interesting
@learninginstudentscafe7284
@learninginstudentscafe7284 3 жыл бұрын
Excellent
@RolandIllig
@RolandIllig 3 жыл бұрын
On one of the slides you had the item "Design an algorithm". Did you actually do this designing in the rest of the presentation? I seem to have missed it. Furthermore, it is common knowledge in the IT security community that you should not design your own cryptographic algorithms, you should rather use the established ones. Would it be more appropriate to say "Choose an algorithm" instead?
@priyaammu1526
@priyaammu1526 3 жыл бұрын
Tq sir
@ndidirichard9473
@ndidirichard9473 3 ай бұрын
I want to know is the learning courses we are supposed to learn week 8
@KameNight
@KameNight Жыл бұрын
Sir slides???
@benmacdormatt7773
@benmacdormatt7773 3 жыл бұрын
How can a gate keeper identify a legitimate and non legitimate user
@butterfly12397
@butterfly12397 3 жыл бұрын
When will u upload the next video.plz make it soon sir.
@DurgadeviB-nz2lk
@DurgadeviB-nz2lk 19 сағат бұрын
@jiyajha
@jiyajha Жыл бұрын
Actually it is boring
@mukul1162
@mukul1162 3 жыл бұрын
👍👍
@vyshnavireddy932
@vyshnavireddy932 2 жыл бұрын
Koncham mellaga cheppu ra
@ravikurra4615
@ravikurra4615 Жыл бұрын
🤣😆
@sathwikasathwika9742
@sathwikasathwika9742 Жыл бұрын
Speed thakuva petti vinu😂
Cryptography
13:34
Neso Academy
Рет қаралды 404 М.
Security Mechanisms
11:59
Neso Academy
Рет қаралды 197 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
Cat mode and a glass of water #family #humor #fun
00:22
Kotiki_Z
Рет қаралды 42 МЛН
Правильный подход к детям
00:18
Beatrise
Рет қаралды 11 МЛН
Why Network Security ? - Salaries, Certifications, Cons and a lot more
10:02
Why Cybersecurity Training is a SCAM
10:37
Technical Institute of America
Рет қаралды 317 М.
Security Attacks
15:54
Neso Academy
Рет қаралды 330 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
The Complete Cybersecurity Roadmap: Land a Cybersecurity Job in 10 Months
5:54
Programming with Mosh
Рет қаралды 94 М.
Classical Encryption Techniques
8:32
Neso Academy
Рет қаралды 208 М.
CIA Triad
16:08
Neso Academy
Рет қаралды 350 М.
КАК УСТРОЕН TCP/IP?
31:32
Alek OS
Рет қаралды 288 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН