Hello and welcome back to Sai Berries. 2019 comp T A Security plus certification
We can continue in our discussion of margin number two,
and the topic of discussion will be domain to technologies and tools.
Here, again is one of the objectives which we're going. Continue discuss. In fact, this one of many objectives we're gonna highlight during this particular course of instruction or this particular video. In fact,
we continue our discussion. 2.1. We just had it installed It get bigger network components, both hardware software based to support organizational security.
This brings us to our pre assessment quiz
and a question or quiz res. Ask balls
what could be used to ensure that someone cannot steal sister data by using a USB flash drive or email and data to that personal email account. Is it a data loss prevention? Be network access control,
see a sim serve or deport security.
If you say that the air you're absolutely correct. The correct method would be data loss prevention, because what it does if events data from being email I or taking from the file server using a USB drive
here again are the topics of discussion, which again encompasses this particular objective. Here,
we're gonna take a look at mail Gateway, and it's well asked, defined exactly. The bridges discuss SSL and also discuss hardware security module as well,
and the first thing we want to take a look. It's called a mail gateway.
Now mail Gateway is a device that sends and receives email, often
a mail gateways used on the edge of a network to enhance the security of the email environment.
It could indicate and validate traffic before the traffic reaches the internal email server.
Some important concepts that fall within the parameters of a mail gateway. We have spam filter.
Now. Spam Filter is a program that used to take unsolicited and unwanted email and prevent those Mrs from getting to a user's in box.
The LP with Stanford Data Loss prevention, is in fact a strategy from making sure that the end users do not send sensitive or critical information outside the corporate network.
Additionally, the terms used to describe software products that help a network administrator control what data and uses can in fact, transfer.
Then we have to take a look at encryption.
It's a method by which plain text or any other type of data is converted from a readable form to an encoded version. They can only be decoded by another entity if they have access to the decryption key.
AH bridges. AH, hardware devices software that is used to join two separate computer networks to enable communication between them.
Ah Bridge serves the same purpose it could next to arm or local area networks. Together, the cars or the data in this case used the bridge to travel to and from different areas of the network devices similar to around it, but it does not analyze the data being afforded.
versus TLS accelerators.
It's a method of offloading processes intensive
public key encryption for transport layer security, RTL S
and it's a predecessor to SSL, which again SSL not considered more likely legacy. In other words, to a hardware accelerator.
An SL decrypt ER is an injury standard for transmitting secure data over the Internet,
a media gateway. It this, in fact, is a device in the core network of a telecom network operator to provide transformation and inter networking between media screams that use different network standards, communication protocol, Kodak's and as well as physical connection so that the phone calls can
work properly between the network using different types of technology.
So, in fact, is the device that translate different media screams, typically on a telephoning network.
Hotwire Security Module
This is a physical computing advised that safeguards and managed physical keys for scrum with Indication and also but by crypto processing you well,
this brings us to our post assessment questions for this particular video and the course. It is as follows
state specific, that the bridge is a network device that connects to arm or networks together. Is that true or false?
If you said that you you're absolutely correct,
this brings us to our key takeaways. From this particular presentation we learned at a branch of the network device that connects two or more networks Together
we're under that media Gateway is a device that translate different media screen, typically
on a telephone network.
We learned it a mail gateway, the device that sends and receives email.
We also highlight the fact that SSL decrypted is a interest ended for transmitting secure data over the Internet
and our upcoming video we're taking a look at a brand new section of this particular module. We take a look at 2.2. Given a scenario, you're gonna use appropriate software to to assess the security posture. Often organization
Look forward to seeing you in a very next video.