Goals of Endpoint Security
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Welcome back to intermediate endpoint security course and this lesson I'm going to talk about goals off endpoint security. So what is the main goal of endpoint security? And what are the security specifics of personal computers
00:13
So important? Security.
00:16
A zits goal has to protect essentially devices from being compromised, and they have to be protected on hardware level.
00:27
Andi, when I'm saying hargo level are not saying somebody will remain replace the mother board, that's ah,
00:35
that's the thing that was really happening, although might happen. What I'm talking about is protecting the firmer off the device or bias of the device,
00:46
then protecting the operating system of the device
00:51
and then protecting the programs off the device. When you say protecting the operating system, I mean protecting its integrity in terms of the somebody could use some ways to to alter some things in the operating system and make it
01:10
open for intrusion.
01:11
And in the end, it has to protect data.
01:15
Um, off Uh
01:19
uh. They all had that stored on the PC itself. So, for example, data that is stored on the corporate backup is not the subject of this course, and it's not subject of endpoint security that is, general data security in the company.
01:38
Also, when it comes to endpoint security, the goal is also to protect networks from being compromised the Y endpoint devices. So if somebody installs, for example, ransomware on that 11 of devices via phishing email
01:53
on point security has to find a way to protect other pieces from being compromised
02:00
from the device. It's usually being done by being by by preventing that the ways from being compromised in the first place.
02:08
And finally, the goal of Friend Point security is to protect users off endpoint devices. So if you give ah PC to your in play,
02:17
you have to make sure that
02:21
sorry that their personal in the identifiable data is not leaked outside the company because you can get sued. Also, you have to protect their personal and professional integrity on the level off
02:37
security off the devices and software itself.
02:42
And you have to protect them from legal consequences off
02:47
something being done in their name without their knowledge.
02:53
So B. C.
02:55
As the device needs to be protected from outside threats,
03:00
and the first thing on the list is phishing and spear fishing So basically somebody sending you an email in which you
03:07
click on some link or opened the attachment and then you create whole lot of mess.
03:13
Then you have to protect the ways from its password being checked so down somebody by, for example, shoulder surfing while the user reason,
03:24
for example, at the airport
03:27
off course, you have to protect it from viruses or, let's say yeah, in general malware.
03:34
And of course, you have to protect it from
03:38
attacks by USB flash drives because thes things can also deploy on virus. So these are all things that are happening, Let's say from the outside, somebody is doing that.
03:50
Also, you have to protect the PC from inside threats,
03:53
and first thing is on secure browsing. So you have to find the way
03:59
that even if users, for example, click on that fatal link in a phishing email, their PC doesn't get infected.
04:09
Then you have to protect it from somebody from the inside insert in terms of disgruntled employee, which will do something to their PC by intentionally in terms off malicious action
04:21
or stuck in the U. S. B. With the virus inside the PC
04:29
and also uh, PC protection needs to be maintained and update so when it comes to maintaining, you have to have fleet monitoring. So you have to have something. The software that is going toe look in your devices and see. For example, somebody has changed
04:48
security settings and otherwise, making it more open to attacks. How does it happen? It usually happens when when somebody has a problem in PC. And then you said the centre engineer or technician to fix something on that device, and in order to do these things, they, for example, have to enter the
05:08
the ministry T password, and then they would get to look out.
05:12
And then you leave the rice open to all sorts of things.
05:15
Off course, you have to do the regular or security updates
05:20
because these things ah have to be taken care where they have to be given a greatest possible care because new security flows in operating systems are discovered every day
05:35
or almost every day.
05:38
Then you have to define and uphold policies,
05:42
for example, prohibiting access to control panel and then again, service technician or engineer comes to the user to fix the problem with their PC they unlock these things and they leave it unlocked. So you have to uphold this polities on the voices on a regular basis.
06:00
Um,
06:01
so these are the things you need to do about protecting the PC. So is the a short knowledge or lending check. So what is not to the task of endpoint security? Is it not to protect network from comprise BC's
06:17
to protect network from motorized access or protect PC's on the network from malware?
06:24
The correct answer is,
06:26
and point security does not have to take care about protecting network from Matori access. This is part of network security.
06:34
Okay, so about printers they need to be protected in general, about from embedded Web server attacks of somebody going into embedded observer of the device and changing something
06:46
then against print job attacks. So somebody scenting sending the malicious spring job
06:54
ah, toe device that can change settings,
07:00
for example,
07:02
killing the embedded Web server password or something like that.
07:06
Then you have to protect devices from BIOS or firmer attack,
07:13
meaning somebody installing the buyers that has been modified in order to provide the malware inside the printer.
07:20
And at the end you have to protect the device from somebody installing malicious app or plugging to the device
07:30
and as well a species. Printers need to be managed, so you have to have fleet management tools that can look into security settings of the device.
07:42
And without management and permanent
07:47
knowledge, you simply cannot achieve the
07:53
protection of the printing printers printing devices.
07:59
The's management tools are specific for a Wender or their universal, but they are completely different from any kind of management tools that he used on the network
08:11
or on PCs.
08:13
So in this video, you have learned about main goals of entire security and some essentials in achieving these goals separately for printers and for PCs and in next lesson, and going to talk about protecting the harder off the PC.
Up Next
Instructed By
Similar Content