All language subtitles for 1. OSI Model Layer Questions

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew Download
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,660 --> 00:00:08,700 In this video, we will see that our interview, which type of questions they ask regarding Osama questions. 2 00:00:08,970 --> 00:00:09,810 So let's see. 3 00:00:09,810 --> 00:00:12,150 I mean, definitely they are going to ask you that. 4 00:00:12,150 --> 00:00:13,620 What is Osama there? 5 00:00:13,650 --> 00:00:21,210 What protocols on every layer they can ask you how many there are layers and what what is the function 6 00:00:21,210 --> 00:00:21,780 of those? 7 00:00:21,790 --> 00:00:22,320 Right. 8 00:00:22,410 --> 00:00:32,280 And one important question is that for us, a layer that they can ask that what are what different validity 9 00:00:32,280 --> 00:00:36,600 is related to different different OSA layer means layer wise. 10 00:00:36,600 --> 00:00:38,580 They are asking you they will limit it. 11 00:00:38,610 --> 00:00:42,480 So these type of questions we are going to see in this video. 12 00:00:43,200 --> 00:00:45,250 So firstly, what is OSA model layer? 13 00:00:45,270 --> 00:00:50,010 It is open system interconnection we know is a reference model for how application communicate over 14 00:00:50,010 --> 00:00:50,590 a network. 15 00:00:50,610 --> 00:00:54,920 The only there there is seven layers and how actually the communication is happening. 16 00:00:54,930 --> 00:00:57,210 That is what OSA model layer. 17 00:00:57,660 --> 00:01:03,720 Now second question we have, can you tell OSA last name and at least one protocol for each layer? 18 00:01:03,960 --> 00:01:07,500 So generally we have several layers in OSA layer. 19 00:01:08,370 --> 00:01:14,400 The first one, we have physical layer right on which we are actually the bits is started where actually 20 00:01:14,400 --> 00:01:18,890 the bits converted into for the next layer. 21 00:01:18,900 --> 00:01:22,890 That is, if you can see, send it on to the physical wire. 22 00:01:22,920 --> 00:01:23,460 Right. 23 00:01:23,460 --> 00:01:29,940 And if we talk about the protocols, if you can see here, hops and cables, these are the protocols. 24 00:01:30,690 --> 00:01:35,670 Second, we have data link layer, right, where the data framing is happening. 25 00:01:35,760 --> 00:01:36,330 Right. 26 00:01:36,330 --> 00:01:41,370 And here we all get to get the physical address and protocol like switches. 27 00:01:42,160 --> 00:01:44,310 So this is the layer second switches, right. 28 00:01:44,670 --> 00:01:50,060 And network layer on this we have protocol routers and layer three switches. 29 00:01:50,070 --> 00:01:53,460 Now what is the difference between that layer three switches and layer two? 30 00:01:53,550 --> 00:01:57,180 So on layer three, there is routing and switches would work, right? 31 00:01:57,180 --> 00:01:58,650 And here only switches. 32 00:01:59,160 --> 00:02:04,710 Now we have the fourth layer transport layers where there is end to end connections and reliability 33 00:02:04,710 --> 00:02:13,470 and the protocol like TCP and UDP session layer, we have we use it for generally for the establishment 34 00:02:13,470 --> 00:02:15,150 and connections between two host. 35 00:02:15,270 --> 00:02:24,720 So for example, our protocols like net bias, PDP, present presentation layer, we have HTTPS, SSL, 36 00:02:24,750 --> 00:02:27,150 GPG, these are some protocol. 37 00:02:27,240 --> 00:02:33,240 And at the last application layer here we have SMTP, Telnet, SDP, FTP. 38 00:02:33,270 --> 00:02:39,150 So whenever any, any interview, ask you on which layer SDP works, right? 39 00:02:39,150 --> 00:02:41,210 So it is application layer. 40 00:02:41,220 --> 00:02:45,870 They can ask some simple terms like on which layer https works. 41 00:02:45,870 --> 00:02:47,370 So it's presentation layer. 42 00:02:48,260 --> 00:02:51,260 So this type of questions also can be made. 43 00:02:53,560 --> 00:02:55,000 Next question we have. 44 00:02:55,330 --> 00:02:56,260 Do you know. 45 00:02:56,620 --> 00:02:57,670 Attack on every. 46 00:02:58,540 --> 00:02:59,630 Sorry, every website. 47 00:02:59,710 --> 00:03:02,240 Leo, this is what I was talking about. 48 00:03:02,260 --> 00:03:04,690 So on application layer, if you can see. 49 00:03:05,530 --> 00:03:08,420 These are attacks actually injection cross-site scripting. 50 00:03:08,550 --> 00:03:08,800 Okay. 51 00:03:08,830 --> 00:03:15,130 So if you remember, we we were talking about client side, you know, client side attack about cross-site 52 00:03:15,190 --> 00:03:15,580 scripting. 53 00:03:15,580 --> 00:03:17,020 So what is client side? 54 00:03:17,020 --> 00:03:19,000 That is obviously application, right? 55 00:03:19,000 --> 00:03:21,370 So that is what application layer. 56 00:03:22,140 --> 00:03:24,540 And parameter tempering can be happened slowly. 57 00:03:24,540 --> 00:03:29,670 Surtax, which is only used for details on present day presentation layer. 58 00:03:29,670 --> 00:03:36,570 We have attacks like SSL, hijacking decryption attacks and coding attacks on Chechen layer. 59 00:03:37,580 --> 00:03:42,260 We have again session hijacking attack man in the middle, which is important. 60 00:03:42,260 --> 00:03:46,310 They can ask on which layer man in the middle attack generally works. 61 00:03:46,320 --> 00:03:47,750 So it's session layer. 62 00:03:48,390 --> 00:03:51,440 Now such sniffing can also be. 63 00:03:52,670 --> 00:03:54,620 Transport layer on transport layer. 64 00:03:54,640 --> 00:04:00,410 This sequence prediction can be happens in flood and UDP based amplification attacks can be happened 65 00:04:00,770 --> 00:04:03,200 on network layer IP spoofing and jamming. 66 00:04:03,200 --> 00:04:03,950 Definitely. 67 00:04:04,130 --> 00:04:08,750 Here we got the actually IP rate we have already seen here. 68 00:04:08,780 --> 00:04:10,250 If let me show you again. 69 00:04:11,660 --> 00:04:12,260 Yeah. 70 00:04:12,380 --> 00:04:15,380 Then we got the logical logic. 71 00:04:16,050 --> 00:04:17,450 That is IP address. 72 00:04:20,560 --> 00:04:20,950 Okay. 73 00:04:20,950 --> 00:04:25,120 So we were on the network layer, so IP spoofing and jamming can happen here. 74 00:04:25,990 --> 00:04:31,210 Black hole attacks are civil attack packages, thing can be happen. 75 00:04:31,450 --> 00:04:39,520 Data link here, layer here, ERP spoofing can be happen because there generally we got the MAC address, 76 00:04:39,730 --> 00:04:40,180 right? 77 00:04:40,180 --> 00:04:42,040 So ARP spoofing can be happened. 78 00:04:42,040 --> 00:04:47,470 Mac cloning you can read about ERP that what actually the address resolution protocol. 79 00:04:47,470 --> 00:04:54,070 So this is nothing but just it is used for the mapping of Mac Mac address and IP address. 80 00:04:54,070 --> 00:05:00,490 So how actually spoofing work you can you can read out Google I gave you just an introduction that what 81 00:05:00,490 --> 00:05:01,570 actually the ERP. 82 00:05:02,950 --> 00:05:07,720 Now expanding to your deck villa and hoping these attacks can be happening happen here. 83 00:05:07,960 --> 00:05:12,280 Physical layout there at the last layer. 84 00:05:12,370 --> 00:05:20,500 Definitely physical damage can be happened and it has been seen many times that there is always a physical 85 00:05:20,500 --> 00:05:21,940 damage on physical layer. 86 00:05:22,060 --> 00:05:24,220 Apart from that data sniffing can be happen. 87 00:05:24,220 --> 00:05:26,290 Unauthorized access also. 88 00:05:27,740 --> 00:05:28,010 Okay. 89 00:05:28,010 --> 00:05:32,630 So on which layer is be protocol work that is application layer. 90 00:05:33,670 --> 00:05:34,780 What is middle? 91 00:05:34,960 --> 00:05:37,390 How can you prevent men in the middle attack? 92 00:05:38,050 --> 00:05:41,810 So my idea was working where it was working on the second layer. 93 00:05:41,830 --> 00:05:46,120 If you can see here, let me show you again. 94 00:05:47,450 --> 00:05:48,170 Concessionaire. 95 00:05:48,170 --> 00:05:49,680 It was working man in the middle deck. 96 00:05:49,700 --> 00:05:50,180 Right. 97 00:05:52,630 --> 00:05:52,850 Okay. 98 00:05:52,870 --> 00:05:59,350 So Amsterdam attack happens when the communication between two parties is intruded or intercepted by 99 00:05:59,350 --> 00:06:00,010 an outside. 100 00:06:00,010 --> 00:06:05,170 So let's say there is A and B, right? 101 00:06:05,620 --> 00:06:12,220 And you are the third party or you just light in in the center part is sending something to be. 102 00:06:12,220 --> 00:06:19,300 So you are sitting in the middle so you are taking something some data from and sending to B by modification. 103 00:06:19,300 --> 00:06:23,440 But B is thinking that data is coming from A, so it's vice versa. 104 00:06:23,440 --> 00:06:25,360 So this is what MIT attack. 105 00:06:25,360 --> 00:06:30,400 So what we can do to mitigate it, so we can use the encryption right between both parties. 106 00:06:30,400 --> 00:06:37,120 Whatever the data is transferring, we can avoid using open Wi-Fi networks and we can use HTTPS, forced 107 00:06:37,240 --> 00:06:38,380 TLS or VPN. 108 00:06:38,680 --> 00:06:40,750 So why we are using VPN? 109 00:06:40,750 --> 00:06:45,970 Because it it gives us the option of encrypted. 110 00:06:46,510 --> 00:06:51,430 You can say that with the help of encrypted tunnel, we can communicate securely. 111 00:06:53,470 --> 00:06:56,500 What is sniffing so. 112 00:06:56,530 --> 00:06:59,680 And do you know, do you any tool? 113 00:06:59,760 --> 00:07:00,100 Okay. 114 00:07:00,130 --> 00:07:01,270 There is something at it. 115 00:07:02,740 --> 00:07:04,990 Do you know any tool for sniffing? 116 00:07:05,320 --> 00:07:08,470 Obviously, Wireshark is one of the sniffing tool. 117 00:07:08,500 --> 00:07:13,780 A sniffer attack corresponds to the type of interception of data by capturing the network traffic using 118 00:07:13,780 --> 00:07:14,440 a sniffer. 119 00:07:14,470 --> 00:07:16,930 I hope you have already used the Wireshark. 120 00:07:16,960 --> 00:07:17,500 Right. 121 00:07:17,500 --> 00:07:19,540 So this is what they sniffing is. 122 00:07:20,590 --> 00:07:27,340 So that's it in this video and we'll talk in the next video that how actually you can prevent your organization 123 00:07:27,340 --> 00:07:28,480 from ransomware. 10847

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.