Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:03
everyone. My name is Peter Sip alone. And this is the network Security course. This is going to be module three. Lesson one, the application section.
00:16
So the prerequisites for this video are really just modules one and two. Model one was simply an intro demonstrating how the courses leading out and module to was really a basic foundation off core cybersecurity, knowledge and principles.
00:34
And we're to had to keep up to date with the different laws and regulations and what's going on in the cybersecurity world.
00:42
So, like I said, we are now in the application information section off this course in this section, we're really gonna learn about specific applications and how they're broken down and why they're important to network security in this video. Specifically,
00:59
we're gonna learn how to manage data. We're gonna prevent it,
01:03
control it, had a handle it properly, and we're gonna look at some encryption practices that relate to the data. And obviously, when we're done using all the data, we're gonna look at the proper way to dispose of it.
01:19
So
01:19
data leak it prevention, also known as DLP DLP, is a cycle or process off controlling data and handling it in a responsible manner, So we're going to start up the top and work our way around clockwise.
01:37
So the first part of data leakage prevention is the discovery section. This is finding the data. You can't prevent data leakage, and you can't prevent the misuse of data if you don't know where it is. So actions in this section really include kind of scrolling through your network. Checking out your servers
01:56
PC's what information is on there trying to locate the data
02:00
that you want to protect?
02:01
The second step is labeling. This is where you tagged the data with sensitivity levels or basically other kinds of labels that can help track it for when the data moves throughout the system. Remember mandatory access control back in the second module.
02:17
While the labels sign demand for access control usually get assigned here.
02:23
The third step is policy creation. In this step, we defined the data rules and what the users can and can't do
02:31
with the with the data. You know, this is where rules get to find for where certain people might not open things. They might not be able to look at some things they might not be print certain aspects of data or send data from one spot to another. And then after we define the policy, we obviously have to watch the data
02:51
in order to make sure that the policy is being applied.
02:54
So this is where the content monitoring section comes in.
02:59
In this section, we watched the flow of data go back and forth across the network when it gets loaded on USB drives, how it gets emailed out
03:08
and basically just keeping the high on the day and make sure the policy creation the policies created in the policy creation section of being enforced.
03:15
When we do see something that's not being on fourth, probably we have the option to stop the data from leaving. This happens in the prevention and blocking section of data leakage prevention in the section This. This is where data can get filtered out either through Web, Web filter
03:36
or maybe an email attachment gets stripped out, or the far wall blocks the data from getting in from one spot
03:43
to another. And now, obviously, in the last section reporting, we got a snitch on the offenders we gotta figure out who tried to send the data to the spot that shouldn't have been doing why they were doing it and any other information to make sure that doesn't happen again.
04:02
Data encryption. There are three general areas off data. That conduct could possibly happen.
04:12
There is data at rest. That means in the date is not being used. That means being stored on a hard drive or on a server. Somewhere
04:18
there's data in motion. That means when data is going from point A to point B flowing across the network in route to do something, and then there is data and use. This is when the data is actively being queried, used, visualized in order to accomplish whatever the gold might be.
04:38
Thankfully, data can her data encryption rather can be applied in all three of these sections. Now there's storage level encryption. This is where the hard drive gets encrypted or the data gets encrypted before going into the database,
04:54
so no one can access or read the data while it's encrypted. So even if you broke into the database
05:00
wouldn't have access to the data
05:01
data in motion. This is taken care of through encryption through the use of special protocols are programs which will take a look at little bit later on in this course, specifically I, p, SEC, VP Ends and TLS and SSL.
05:18
More on that coming up later
05:20
and finally dating use is for information rights management. This is where the information basically is determined to what it can do.
05:32
So some people might have the rights to view information. Some people might have the right to print it out, right? It Some people might not have the rights to do any of that. All that's all that information is being used comes back to information rights management,
05:53
data retention and disposal. Obviously, the data can only be held onto or should only be held on to for so long and then, after which it could be disposed of in a proper and secure manner.
06:04
Data retention and disposal is a valuable part of the policy creation. It's not enough to simply say, what can a person can or can't do with the data. It's very important that the data gets recycled at the end of its life.
06:18
Now there are a couple different common ways off handling and disposing of data properly. The 1st 1 is known as disk wiping, where all the streams of zeros and ones are written over completely with all zeros or all ones. And the 2nd 1 is de glossing,
06:38
where the gloss er is a machine
06:40
that scrambles up the data so it looks like scrambled eggs and therefore the data is no longer readable. The pictures to the right show into Gosar. And what happens after the Gosar has run its course through the data
06:55
important note here, erasing or reformatting data is not enough. You actually have to make sure it leaves the computer or it is destructed in such a way that it cannot be put back together. Most people think at moving day to the recycle bin on the computer and then emptying the recycle bin deletes the data it does not.
07:15
What happens is
07:15
the data merely state the data remains on the hard drive and merely the path that the computer knows to access the data is the latest. The date is not actually gone. It's still sitting on the hard drive, waiting to be over written, so you want to make sure that it's something very sensitive.
07:34
You can't actually delete it in that manner.
07:40
So in today's lesson, we discussed the data leakage prevention of life cycle. We took a look at data encryption in a network,
07:47
and then we took a look at proper data retention and how to dispose of properly when we're done with it.
07:57
Quiz question.
07:58
All of these are components of the data leakage prevention lifecycle except
08:03
a blocking
08:05
be dated disposal. See content monitoring or D reporting.
08:11
If you said B day disposal, you are correct. Remember, data disposal is not necessarily its own step in the data leakage prevention lifecycle, but rather it's like a subset off the policy creation area.
08:28
Hope you guys learned a lot in this video, and I'll see you next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor