Vigyata.AI
Is this your channel?

Excerpt from the IMO Tech's RMF Training During Week 1

2.4K views· 68 likes· 23:16· Jun 13, 2023

🛍️ Products Mentioned (8)

In this video excerpt we discussed the Cybersecurity Objectives of Confidentiality, Integrity and Availability (C.I.A). Encryption Algorithm Link: https://hat.sh/ MD5 Download Link: http://www.winmd5.com/ The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** Buy me a coffee if you appreciate my work https://buymeacoffee.com/kamilsec CashApp: $Kamilzak Zelle: kaamilzak@gmail.com paypal: https://paypal.me/MZakari Venmo: @kamilsec Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION AS WELL AS ON THE JOB CONSULTATION** *************************************************************** Udemy Affliate link: https://track.flexlinkspro.com/g.ashx?foid=1.39197.1000020157&trid=1257621.161087&foc=11&fot=9999&fos=2&fobs=380496&fobs3=1.39197.1000020157 VeeFLY Referral Link: https://veefly.com?referrer=318243 ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 Facebook: https://www.facebook.com/kamil.kamilsec E-Mail: Kaamilzak@gmail.com

About This Video

In this Week 1 excerpt from IMO Tech’s RMF training, I break down the CIA Triad—Confidentiality, Integrity, and Availability—because this is the core of everything we do in cybersecurity. I explain why a security program is not “complete” unless it addresses all three objectives, and I walk through what each one really means in practical terms. For confidentiality, I talk about protecting information from unauthorized access or disclosure, and I tie it back to real compliance drivers like HIPAA, PCI DSS, ISO, and for my government folks, FISMA. Then I go hands-on. I demo encryption using hat.sh to show you plaintext going through an encryption algorithm and turning into ciphertext (gibberish) until you decrypt it with the password. For integrity, I show how hashing/message digest/“fingerprint” (same concept) helps you detect tampering—especially when you’re dealing with large files or software downloads. I use an MD5 tool demo to prove that a single change in a document produces a different hash. Finally, I cover availability and why downtime is real money (think Amazon on Black Friday), and I connect it to backups, alternate processing sites, AWS availability zones, and contingency planning (CP controls like CP-9).

Frequently Asked Questions

🎬 More from KamilSec