greetings and welcome to the Sai Buri 2019
Karp Tia Security Plus certification
We begin in a brand new module, which is margin number two, and the topic of discussion will be domain to technology and tools.
Here, again is the objective, which encompasses domain to 2.1 with simply states and stall configuring network components, both hardware software base to support organizational security.
Before we get going here today, it's perhaps the best place begins by First are engaging in a pre assessment quiz,
and the quiz reads as follows.
How many layers of stacks comprised at Westar model? Is it a four
In this case, if you select the B, you're absolutely correct is actually Seven Layers, which comprises the ESA model.
He again would turn on tinted toward the objective, which encompass domain number two, which is stalk and figure network component in both hardware and software base. To support your organization of security, some sub topic which encompassed this objective, we could begin by taking a look at a firewall
access control lists, application based versus network base state ful versus stateless and, lastly, implicit deny
So, without further ado, let's take a look at that first agenda item, which is titled The Open System Interconnection Model.
And so that makes a course in Who made this particular model.
Basically, the International Standards Organisation was created by a large amount of people.
The open stand in a connection or side model was created back in 1984 and it comprised a bunch of documents. It's a model of how protocols and networking could be made.
You can't buy this, and so that makes it also a question while you lies, this particular model. First of all, it's an excellent model for analyzing and also neighbors you as a future security professional to compare as well as troubleshoot various issues within your network.
It's based upon seven layers or other words. Seven stacks.
It's a network of modern office, a generic means to separate computer networking functions into multiple layers.
Each of these layers A relies on layers below it to provide supporting capabilities and perform support to the lives above it.
Such a model of layer functionality is also called a protocol stack or a protocol suite.
So let's take a look at the horse armada in terms of what happened at the various layers off the S. Our model.
What I'm gonna begin by first are taking a look at the physical layer now, within the physical that what happens is it transmits bits
over a medium to about mechanical and electrical specifications
and then data Letelier. What happens is it organizes bits into frames to provide hop two hop delivery
at the network layer. What happened? It moves package from the source to the destination to provide Internet working.
Then we come to the transport Lear.
At this particular what happens, it provides with LABA process the process message delivery and error recovery.
At the session Lee of what happens it established, maintain orders, manage and terminate the sessions.
Then we have the presentation layer at the presentation that would happen to translate, encrypt and compress your data. And lastly, at the application layer, what happens? It allows access to the network. Resource is
let's not turn our attention toward a discussion of a firewall.
Did you know that a firewall remains the foundation of your network security technology? Even today,
some additional information regarding firewall Ah firewall is a system designed to protect a computer or a computer network from network based attacks.
A follow does is buy, filter the data packages transfer, sing the network,
and lastly, a firewall is, ah, Heartwood advice or software solution that inspects and then permits organize network communication
in terms of some various firewall concepts. We have a term called the Access Control, this
application based versus Network Base
State full versus stateless.
And then we have the unpleasant deny. Now these particular terminology is a concept will be discussed in the upcoming slides here.
The 1st 1 address is called The Access Control. This
and Access Control. This is a single injury in a firewall that dictates whether specific communications permitted other words aloud or the night of the words blocked.
Now, when you look at application based versus network base,
an application firewall is a formal firewall that controls input,
output in or access from two or by an application a service.
On the other hand, a network baseball controls traffic going in and out of a network. It does this by filter in traffic based on the firewall rules and allows only authorized traffic to pass through it.
When we compare a state full versus Stateless,
a state full firewall. What it does. It watches your communication and maintains knowledge of the connection.
A statements firewall permits organized communication based on source destination
protocol. A port, a stateless firewall excels at hammerin large volumes of traffic.
The last firewall concept we need to discuss doing this particular video presentation is title in Prison did not.
It is a security stance that treats everything not given specific and selected permission as suspicious.
Then we have our post assessment quiz, which in fact is a true or false statement, and it reads as follows.
The process of creating a packet or encapsulation begins at near seven, which is your application layer rather than level one, which is a physical layer.
In this case, if you select the true, you're absolutely correct.
The last item Arjuna is a key take away
doing this particular video presentation.
We learned that the open System Interconnection Reference model has been an essential component of computer network design since its inception. Back in 1984
we learned it. A firewall is, ah, hardware device or suffer solution that inspects and then permits or denies network communication.
We learned that implicit in that is a statement in a firewall that did takes that all traffic not permitted on the night in existing
A. C s or access control. This is the night or treated as suspicious.
We learned in a state for far wall watches, communications and maintain knowledge of the connections.
We learned that a stateless firewall permits organized communication based on source
A statements follow excels at handling large volumes of traffic
and access control. This is a single entry in a firewall that dictates weather. But simply communications permitted other words aloud or the night. In other words, block
and our upcoming video. We'll continue discussing of 2.1 install configure network components, both hardware and software based to support organizational security. And again, I look forward to seeing, you know, very next video.