Criptografia e Segurança de Rede Unidade 1 - Parte 5: Modelos de Segurança de Rede
Discussão sobre modelos de segurança em redes.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
In this video, I have discussed about model of network security and model of network access security.
Explanation or Description
In considering the place of encryption, its useful to use the following two models. The first models information flowing over an insecure communications channel, in the presence of possible opponents. Hence an appropriate security transform (encryption algorithm) can be used, with suitable keys, possibly negotiated using the presence of a trusted third party.
The second model is concerned with controlled access to information or resources on a computer system, in the presence of possible opponents. Here appropriate controls are needed on the access and within the system, to provide suitable security. Some cryptographic techniques are useful here also.
Trusted system can also be seen as level base security system where protection is provided and handled according to different levels.
Follow on Instagram - https://www.instagram.com/the_kanagu/
Follow on Facebook - https://www.facebook.com/kanagaraj.narayanasamy (if you are need to be added as friend then send me as short message about you and send the request- thank you!)
Subscribe our channel - https://www.facebook.com/kanagaraj.narayanasamy
Video Information
Views
442
Total views since publication
Likes
18
User likes and reactions
Duration
8:25
Video length
Published
Aug 8, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#network security #cryptography #udemy #nptel #cryptograhy and network security #cns #network security model #network access model
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.