### Infrastructure Security

Course
Time
4 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
4

### Video Transcription

00:01
Hi and welcome. Teoh lesson 2.3. And this lesson, we're gonna talk about the network layer everything. In the last couple of lessons, we've been talking about the perimeter, which is that boundary between our internal devices and that external entity. Now, we're gonna move a little bit more inward on that layered approach. We're gonna talk about the network layer, which is
00:19
all of that backbone infrastructure, the routers and switches that connect
00:24
us to the outside world. As as well as connect devices together internally.
00:30
Now, within the network layer, we're gonna talk about a few different components. One is encryption we're gonna talk about We touched on encryption before a little bit when we talked about VP ends. But in this lesson, we're gonna go into how encryption works and dive in a little bit deeper on encryption itself.
00:47
We're gonna talk about Web proxies. What practice? Their basically just those devices that help us control how we interact, how our organization interacts with the Internet and with the outside web,
00:59
we're gonna talk about knack, which is network access control. And that's all about how we how we allow devices onto our network and what types of devices we allow onto our network,
01:07
and then we'll get into a little bit about wireless security towards the end of the lesson towards the end of the module,
01:15
01:18
encryption, and it's in its basic form. Before we start to actually talk about functionality. Let's talk about some definitions because we're gonna use these over and over again.
01:26
When we say the word algorithm, we're referring to a mathematical formula used for encrypting. It's ah, it's just actually a formula A plus B equals C.
01:38
We talk about the word key. We're talking about a secret variable. It's something that secret. It's a variable that's used within that encryption algorithm. So if the algorithm is X plus one equals three than X is our key. It's what's unknown. It's what secrets what we have to solve for
01:56
We use the term cipher text. We're talking about the data that's actually been encrypted once the data is encrypted and we transmitted across the wire and an encrypted format. That's what we refer to sometimes a cipher text.
02:08
Symmetric encryption is encryption where both sides are using the same key, so that same secret or variable is in is hard coded or is known by both sides of the equation, whereas asymmetric encryption is where each party on each side uses a different key.
02:27
And then finally, public key Encryption is a nen crip shin method of mechanism that uses both asymmetric and symmetric encryption. We're gonna go. We're going to show you that towards the end of this lesson.
02:39
All right, let's talk about how encryption works.
02:42
In its most basic form, encryption is just creating a secret. It's just scrambling data in a way that others who don't know the secret can't read it.
02:53
So let's say we've got this computer over here on the left that wants to communicate with computer on the right
02:58
and what it actually wants to communicate is a password. In this case, we've got a password in clear text in our password is not on my watch.
03:07
The computer on the left is going to send that password through an encryption process, and that process is simply taking the data, which is the password, and applying it to an algorithm. And the output of that is gonna be our cipher text. And this cipher Texas. Nothing but jumbled up data. It's just random characters that if we transmit that over the wire
03:28
and someone happens to see that or intercept that, they're not gonna have any idea what that means, because it's just
03:32
gobbledygook. It doesn't mean anything.
03:36
Peter on the right is gonna receive that cipher text. It's gonna run it through a decryption process, which is simply applying it to that algorithm again.
03:44
And the output is gonna be the clear texts. And now the computer on the right. Kenly read the actual clear text.
03:50
That's all. Encryption is at its highest, highest level. That's all it's really doing. It's very complicated, the mechanisms that do that, but at its highest level, that's what it iss.
04:00
Now
04:02
let's get into a little bit more details about the keys and the algorithms first off keys, as I said, our mathematical formulas used in the encryption and decryption process. But keys or not, I'm sorry. Algorithms air not secret algorithms are actually public. There's plenty of them out there. There's a handful of them that are stronger than others.
04:20
Um, they're all publicly available. They're not
04:25
any secrets at all. The formulas themselves are not secrets.
04:28
What our secrets are the keys, and those are the things that we need to keep. Keep quiet, keep a secret and protect. Because if you know the algorithm because it's public and you acquire the key, then you can solve the equation and you can read the data.
04:43
Good algorithms use a combination of both keys and the data itself to populate parts of the formula to make them more complex. So if we're starting, we want to encrypt some data. And we have We actually have two secrets. When we start, we have the key, which we know, and that's our secret. We also have the data.
05:00
If we haven't transmitted that data yet,
05:02
that data is secret as well. We can use that as part of our algorithm.

### Infrastructure Security

This course will cover the concepts needed to identify and prevent threats across an enterprise environment. The course content will cover the practical application of security principles, models, and technology covered in previous courses.

### Instructed By

Scott Russ
Security Architect at Nerdery
Instructor