now, the next responsibility that we have to our organization is to do everything that we can to protect the network.
So, of course, our network everything that's necessary to allow our computers to communicate.
So whether it's the hardware people,
the router switches, hubs, laptops themselves, their protocols and applications, you know all of those elements come together to create a successful network.
And unfortunately, any one of those elements that come together can also be compromised and can lead to a compromise of the entire network.
So what we want to do is we want to do our part is in users to make sure that we don't introduce anything that would have a negative effect to the network.
we want to make sure that we don't do anything that could compromise company data or customer data or patient data again. You know, just really depending upon the line of work that we are.
And we talked about network attacks, it could be sniffing the network eavesdropping on the network.
Ah, it could be intercepting data transfer. As data goes from a server to a client, for instance, it could be intercepted.
We want to make sure that we do our part and do not spread any sort of denial of service attack, and now, out of service attacks are becoming very popular thes types of attacks. Are you simply to render a service on available?
So they're very popular for things like Web servers and Theoneste servers. They can. You know, if I could take Amazon's Web server, for instance, off line for 15 minutes, they would lose hundreds of thousands of dollars. Perhaps even
so, what? I want to make sure some of these common network attacks,
you know, as an infuser, I don't have,
uh, control the security policies, but I can certainly played my part.
So the things that I can do to assist I make sure that I'm using secure protocols whenever I can,
Connecting to the company intranet server or connecting out to the Internet.
Ah, many Web server support. Both http and H t v p s will. The s at the end of http stands for secure. So obviously that's gonna be a better protocol to use. Try to use that for each connection to the web rather than http.
Uh, you know, the big problem is a lot of our protocols aren't secure, but we usually have a secure alternative. So using those whenever we can't be helped,
make sure that I protect physical access to my system while I'm lovin.
Don't wander off from a computer
while you're logged in. Always lock or log off.
Make sure that you're not connecting to the system at any of your systems to the network without proper
permissions from the security team. Don't bring your company laptop in and plug into the corporate network.
That's something that really should be considered and approved by security. Even though your your laptop or your system maybe working fine at home, it may introduce some compliance issues to the network.
You never know what it could be infected with something
always winning out. Go to your security team. Anything that you're gonna do. Alter the current environment. Get approval for
Don't bring anything from home in
on media. Don't bring screen savers in on a thumb drive. Don't even bring files or any of that stuff. Anything that you've downloaded.
Be very careful what you connect to your corporate computer.
Uh, anything that you want that you've brought in from home that you've downloaded to a DVD,
anything that you put on the thumb drive into. A lot of companies don't allow thumb drives for this very reason,
but the bottom line is
anything from home needs to go through your security team before bringing it in.
Ah, to a network connected device. Anything that you do download from the Internet. Scan it with your any virus programs, regardless of whether or not you feel like the source is trustworthy.
Download from trusted sites on Lee. You know, a lot of times people are looking for utility and they Google. And then, um, you know your lead to website. Just because the software you're looking for is legitimate doesn't mean the site that is offering it in, So be very careful about down bones.
Also, your mail messages, anything of a sensitive nature always go that additional step and encrypt those messages again to keep them sure to protect their confidentiality.
So our goal here is making sure that we keep the network, said
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered