Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate course.
00:04
And this. Listen, I'm will be talking about goals, goal or goals off pieces, security. So accept what are the goals of PC Security and going to touch some of those goals in a bit more detail. So I'm going to talk about protecting the
00:20
PC below the US, India s and above the OS.
00:26
So, um,
00:27
the goal of peace and security is very simple and can be stated months sentence. It is establishing trust into PC as a component of I t infrastructure. So if you have a PC, we want to make sure
00:40
that it's not compromised and that it's doing only those things it's supposed to do and not something without our knowledge.
00:49
This goes for personal PC's as well as for business PC's used in the company.
00:56
As a matter of fact, in business pieces much more, it's much more important because PC's can do a lot of damage toe some things that are outside the PC itself.
01:10
Well, if you have your own PC and it's compromised, it will do damage to whatever you keep on your PC. But if you're in a networked in the company. It can do more damage to your servers, storage and
01:23
the function of company itself.
01:26
So
01:27
what is protecting the PC below the OS So it is making for establishing trust in hardware? So means making sure that your hardware
01:38
is doing what just the things it's supposed to do.
01:42
And when we talk about hardware, you're not actually talking about the physical mother board or trip set or your
01:49
memory or processor. Now we want to make sure that
01:56
piece of code, which is called firmer or bios, that binds these things together and make them work in the way they're supposed to it to deliver the functionality of harder to the operating system
02:12
is not compromised.
02:15
So we have to protect the firmer of the components some of those components that can be used in the with malicious intent. And again we have to protect bias. So we have to make sure that bias is doing
02:29
what manufacturer the PC intended and nothing else.
02:34
Ah,
02:36
I will elaborate on these things in the future, but the reason why we have to protect bios is because it's ah, it's ah,
02:46
link between operating system and harder and if that link is compromised,
02:51
you have a problem.
02:53
Then you have to protect PC in the OS, and the first thing you need to do in order to achieve protection off the OS and inside the OS is to protect the way the users authenticating on. Otherwise,
03:07
it means to make sure that whoever is logged in on the PC is actually that person, and not some but the some kind of imposter.
03:16
So it means establishing trust in the US in terms off,
03:23
uh, doing all the things that are supposed to do in order to make us safe and then hardening the OS, meaning that you have to make sure that all the security updates off the operating system are installed immediately after they're released.
03:44
This is very important. People sometimes avoid these because they're afraid that these updates my endanger the functionality of some customized after they're using. Under that us.
03:58
And there have been documented cases in the pies that some updates have made some programs not working anymore. And because these programs are the essential for the functioning of the company in which the pieces air used, administrators sometimes
04:15
make up some kind of delay in order to test these things. Okay, this is understandable. But as soon as you're OK, you have to make sure that they are there. They're so that all the security falls that have been documented for the OS are removed.
04:30
And then you have to protect yours itself for malware because there is malbert that will attack the always changed things in the operating system.
04:39
And the,
04:41
uh, simply do some malicious things on the PC
04:46
and finally, the third parties to protect the PC above the OS. So essentially to establish trust in programs or applications that run on the PC
04:56
and to create secure yet functional
05:00
application Where what does it mean? It means that
05:03
sometimes if you
05:05
fully locked the PC, some programs won't work. For example, if people need to use
05:13
ah
05:14
browser based applications to do their daily work, can you looks imports, those applications, my network or my network properly and then you have a problem. So it's a balance between just locking everything
05:30
or allowing everything because allowing everything means that somebody can enter your
05:38
PC easily and do whatever they want with it.
05:42
And of course, you have to maintain the security in time. So you have to make sure that if you have imposed some rules for security of a PC
05:51
and you have your giving this PC to an employee, you have to make sure first that the template doesn't change these settings.
06:00
Um, in order to make employee's life easier.
06:04
That's one thing. And the other thing is, if something happens with the PC, for example, breaks so it goes to be repaired. The service
06:14
partner replaces the mother board getting back, But then the settings are recent to default. So you have to make sure that in these went,
06:23
uh, settings, Aaron implemented as well.
06:27
So this is all about goals off,
06:30
uh, security of a PC. And then I will talk in details about some of how to implement these things in free lessons to come
06:40
at the end of this lesson. Let's do a short learning check. So ask yourself what is not to the goal of PC security,
06:47
and the possible answers are managing installed applications on the PC, protecting bias or protecting user authentication.
06:58
Correct Answer is managing installed applications on a PC, so in order to protect the PC, you have to protect bias, you have to protect user authentication. But managing installed applications on a PC is not essentially security thing.
07:15
It's something that you do to make sure that no unauthorized applications are installed on a PC, but not from security reasons. It can be just a licensing issue
07:26
or
07:28
you know, that people are using the latest version off application. So in these cases, managing installed application on PC is important. But it's not the same species security issue
07:41
at the nd this lesson in this video you have learned about the goals of PC security, and in next lesson, I will be talking about this whole section importance of PC security and do a recap of the whole module.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor