Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:01
Hey, everyone. My name is Peter Sip alone. And this is the network Security course.
00:06
This is going to be module to the conclusion video.
00:11
So therefore, requisites before watching this video are module once the introduction and everything else that's in this module. So what do we What do we learn here in module to? Well, we took a look at the C I A and D a d triangle. These are the three pillars of cybersecurity
00:31
the C I A. Stands for confidentiality,
00:34
integrity and availability and the D A. D stands for disclosure, alteration and deniability.
00:44
These two triangles are mutually exclusive, and every point
00:49
on that each triangle winds up with the upper other point on the other triangle. So confidentiality winds up with disclosure
00:58
integrity lines up with alteration
01:02
and availability lines up with being denied.
01:07
So the way the cybersecurity works is
01:11
thes Two triangles are mutually exclusive.
01:12
You need to have one or the other. So you either have commented Gee ality or you have disclosure. You cannot have both.
01:21
What we want is the C I A triangle and what we don't want is the D a d triangle. We also took a look at access control and how access control has the three parts. This is the identification,
01:34
the authentication
01:36
and the authorization. So the identification you're making it claim I am this person authentication is you are proving that you are who you say you are through a means off password or an I D card or something like that.
01:52
And then authorization what you are allowed to access on a network
01:57
after you've been authenticated. So the old example that I used back in the lesson you know, I, Peter, go to the club standing outside a club. I go to the bouncer at the door and I say, Hey, on Peter, sip alone and I'm over 21. So you need to let me in?
02:14
Bounces says, Okay, prove it. So I showed him my i d hard my driver's license and on that driver's license, I have my name, my picture and my birthday, which shows I am over 21.
02:27
Bouncers sees that, and he says, OK, come on in to club. So I go into the club and then from there, since I've been authenticated, it determines what I am allowed to access at this point. This is the process of authorization, so I might be allowed to the dance floor allowed to the bar. But I might not be allowed to the
02:46
V I. P Lounge or any of the upstairs offices or something like that.
02:51
We took a look at si ves and C w ease. These are how you can track cybersecurity, vulnerabilities and weaknesses, and we also discussed how we could stay plugged in an ever changing cybersecurity world. I like the recommended RSS feed. I use Feed Lee
03:08
and you from there you can have these stop security information come to you
03:14
instead of you going to it.
03:16
We just took a look at ethics and why Ethics air so important ethics are merely the moral boundary line between good cyber people and bad cyber people. Most of techniques, the practices, everything that's done is the same. The only difference is ethics,
03:35
and we also walked at laws, regulations and policies.
03:38
These dictate what you can and cannot do as a cyber security professional,
03:45
and with these laws, regulations, policies, obviously states the objective who would applies to how it's going to be enforced and what are the consequences and penalties for not following the laws, regulations or policies. A couple of good examples this on the NIST standards for regulations,
04:03
and you have very important privacy laws, like Hip up and GDP are.
04:09
I hope you guys learned a lot in this lesson and I'll see you next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor