Module 2 Conclusion

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

3 hours 20 minutes
Video Transcription
Hey, everyone. My name is Peter Sip alone. And this is the network Security course.
This is going to be module to the conclusion video.
So therefore, requisites before watching this video are module once the introduction and everything else that's in this module. So what do we What do we learn here in module to? Well, we took a look at the C I A and D a d triangle. These are the three pillars of cybersecurity
the C I A. Stands for confidentiality,
integrity and availability and the D A. D stands for disclosure, alteration and deniability.
These two triangles are mutually exclusive, and every point
on that each triangle winds up with the upper other point on the other triangle. So confidentiality winds up with disclosure
integrity lines up with alteration
and availability lines up with being denied.
So the way the cybersecurity works is
thes Two triangles are mutually exclusive.
You need to have one or the other. So you either have commented Gee ality or you have disclosure. You cannot have both.
What we want is the C I A triangle and what we don't want is the D a d triangle. We also took a look at access control and how access control has the three parts. This is the identification,
the authentication
and the authorization. So the identification you're making it claim I am this person authentication is you are proving that you are who you say you are through a means off password or an I D card or something like that.
And then authorization what you are allowed to access on a network
after you've been authenticated. So the old example that I used back in the lesson you know, I, Peter, go to the club standing outside a club. I go to the bouncer at the door and I say, Hey, on Peter, sip alone and I'm over 21. So you need to let me in?
Bounces says, Okay, prove it. So I showed him my i d hard my driver's license and on that driver's license, I have my name, my picture and my birthday, which shows I am over 21.
Bouncers sees that, and he says, OK, come on in to club. So I go into the club and then from there, since I've been authenticated, it determines what I am allowed to access at this point. This is the process of authorization, so I might be allowed to the dance floor allowed to the bar. But I might not be allowed to the
V I. P Lounge or any of the upstairs offices or something like that.
We took a look at si ves and C w ease. These are how you can track cybersecurity, vulnerabilities and weaknesses, and we also discussed how we could stay plugged in an ever changing cybersecurity world. I like the recommended RSS feed. I use Feed Lee
and you from there you can have these stop security information come to you
instead of you going to it.
We just took a look at ethics and why Ethics air so important ethics are merely the moral boundary line between good cyber people and bad cyber people. Most of techniques, the practices, everything that's done is the same. The only difference is ethics,
and we also walked at laws, regulations and policies.
These dictate what you can and cannot do as a cyber security professional,
and with these laws, regulations, policies, obviously states the objective who would applies to how it's going to be enforced and what are the consequences and penalties for not following the laws, regulations or policies. A couple of good examples this on the NIST standards for regulations,
and you have very important privacy laws, like Hip up and GDP are.
I hope you guys learned a lot in this lesson and I'll see you next time.
Up Next