6.2 Hardening the Server and Client Part 2
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello and welcome back to Cy Berries. Empty. A 98 3 67 security fundamentals certification prep course
00:10
in this particular martyr, which again is a continuation of Mark number five. We will be discussing hard in the server and decline.
00:18
Now let's take a look at the learning objectives and the order in which they will be covered
00:23
in this particular video will be discussing securing in the Explorer,
00:27
configuring Microsoft Itch
00:31
and also protecting your server In the private video to this one, we discuss protecting a client computer Man declined security using Windows Offender as what it's protecting your email
00:42
after this particular video presentation on margin number five, we can continue on by discuss and using security baselines Lock and I got down our devices to run only trusted applications and also managing Windows Store APS.
00:57
Now let's begin by engaging in a pre assessment question,
01:00
and the course is follow. Which tavern? The next four setting is used to delete history and cookies. Is it a general?
01:07
Is it be privacy isn't see security or D advance?
01:12
If you say like a you're absolutely correct.
01:17
This brings us to the topic of browsing the intimate
01:21
Now, did you know that browsing means searching for something specific while another hand surfing means randomly searching for something? It's very important for us, particularly started professionals to realize that when when we're going through the process of locked down our server,
01:36
we must also look at the Internet Explorer as well, or whatever browser that we're utilizing
01:41
in this case we were gonna be discussing called in an Explorer browsing. Now there are six ways you could enhance the security your browser. First of all, you configure your browser security and privacy settings. Secondly, you can keep your browser update it there you can sign up for alerts for. You could be very cautious when installing plug ins.
01:59
Number five. Make sure that you have the latest, greatest
02:01
antivirus software. Install number six. Install security plug ins.
02:08
Now when you think about a cookie, we're not talking about a cookie that you eat. Basically what a cookie is in terms of a computer networking uh, from a networking uh,
02:19
computer concept is that a cookie is a small amount of data generated by website. It's saved by your Web browser. Its purpose is to remember information about you similar to the preference file created by your software application.
02:34
Now again, you can also delete cookies and other information is, well again when you browse the Web. So what happened? You computer stores the files for later use as a means of enhancing your overall browsing experience.
02:46
Now, within inner Explorer, you consider the tool button and dancer like in next options, select the security tap and customize again your security zones.
02:58
Now another area is important. It's called like content zones. Obviously, in order for us to have bust Amanda and explore security while we visit these sites again, our network is he actually explore divine to what we call four specific content zones. You have you in that zone again. You also have your Internet zone.
03:15
You're loca Internet's own trusted site's owners will issue a script that site zones and, well,
03:22
this next screen shots show the example of content zones. This is what you able to actually configure that
03:28
another area of key importance is called term called Fishing. Now it's similar to efficient in the lake, But instead of trying to capture fish, what happens is fishes attempt to steal your personal information what happened? Essentially a sound. These emails that appear to come from a legitimate Web site
03:46
such as eBay, PayPal and others.
03:49
The email state that your information needs to be updated or validate and acts that you enter your user name. That's what it's password. Obviously, we're not gonna fall for that particular type of situation,
03:59
continuing with fishing again to help protect against fishing. What happened within an explorer. They included what we call a new technology called smart screen and that filter what does examined Try for evidence of fishing activity and what it does for you. It would display a warning in the user to the use of a fine indium.
04:17
Then we come to farming. Now farming is a cyber attack intended to redirect your website traffic to another. Other words we're talking about a fake site farmer can be conducted can can be conduct either by changing the host files on the victim's computer or by exploring exploring a vulnerability in the dinner service software.
04:38
I know many you've put her to term called S S M, which stands for secure second layer. Obviously, it's considered nowadays antiquity, because nowadays we have TSL so when you served in that There are there times when you need to transmit private data over the Internet, such as your credit card numbers. You're so scared number. Now, during these times,
04:57
you should be using https.
04:59
Other words that employers the technology called secure socket layer
05:03
by convention that your ego that requires the SS second connection starts with https instead of a C T. P. If you just add a http and you were engaged in some kind of financial transaction, gets what you have Mr Going over in clear text
05:19
night. Next, we get into configuring Microsoft Edge. Now Michael is a browser created for Windows Stand. It replaced the in and explore the browser debate. De Beers. Other words was introduced but Windows 95 was part of Windows operating system for the following two decades.
05:39
Now how can I go about protecting my server now? Obviously, there's some steps you need to follow. Put into place. The service will be kept in a secure location. In addition of service that we kept being their own sub net and be land to reduce traffic to the server, including broadcast the next step of security service their hardness servant, where you reduce the tax service.
05:58
That's very important.
05:59
So you wanna minimize the external footprint? You wanna manager server access? Did just mention something that you might want to do particular. When you're looking at trying to harden your server, I want to mention a couple of more. Here again, you can minimize the external footprint.
06:15
You can also engage in patch bone again. Make sure you patch your vulnerabilities. You would also minimize your tax service you didn't opposite. You need to know what's happening to. Hence you need to make you invent some form auditing and monitoring you and makes you establish communication. You want to use the best
06:31
data encryption protocols and Cyprus sweets
06:34
for your communication. You also wanna go about the process of minimizing your user access permission.
06:41
That's important. Further harden and protected credentials. So these are just some things that you can do proactively again to again heartened. You're certain your survey itself
06:51
that this brings us to a post assessment course in
06:55
and the question is followed.
06:57
Which of the following is a collection Security settings that can be used to configure your client settings isn't a biometrics. Is it be local Internet zone, is it see trusted site zone or D security? Baseline.
07:13
If you like the date, you're absolutely correct.
07:16
Now, during this particular presentation, we discuss security in and explore. We look that configuring Mike's off EJ is well, that's protecting your server again. Your service should be kept in a secure location, and additional service should be in their own sub net. To reduce the amount of traffic to the server, you need security server. It means the hardness serve about reducing
07:36
the tax service and thereby reducing your
07:40
server vulnerabilities.
07:49
An upcoming marginal number. Five. We'll be discussing again Part three of this martyr doing this particular marker we discussing using security baselines as Where's locker diamond advice is run on Lee trusted application and last night, certainties of which manning out window store APS
Up Next
Course Assessment - MTA 98-367 Security Fundamentals
Assessment
30m
Instructed By
Similar Content