Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Hey, everyone. My name is Peter Sip alone. And this is the network Security course. This is going to be the conclusion. Video off module three.
00:13
So the prerequisites for this video are modules 12 and all of module three. Up until this point.
00:23
Simple. Because this is the conclusion. Video of module three.
00:28
So what do we What do we learn so far in model three in the information application section of the network security pyramid? Well, we learned about data leakage prevention.
00:40
You know, we took a look at the data leakage prevention process, which goes through the entire cycle of finding data defining data, creating policies to protect the data toe, monitor the data and to block the data from leaking or from going places It shouldn't. We also took a look at data encryption.
01:00
Whether the data is at rest,
01:02
in transit or being used, it could be encrypted in all three steps, and we took a look at the proper disposal of data how to dispose of it correctly in a safe manner, usually using disk wiping or dig awesome.
01:19
We also took a look at incident response. We took a look at the incident response process and teams the people that are associated with that process. The team members being HR public relations incident handlers, managers I t.
01:36
People like that have also took a look at the disaster recovery plans,
01:40
which focused on I t infrastructure after a disaster, getting that back up and running as quickly as possible and also business continuity plans. These plans therefore other critical business operational aspects.
01:57
We've also taken a look at risk management. We saw the risk management process and how to calculate a risk assessment by preparation, taking the assessment and then really communicate your findings in order to handle the risk effectively, we saw how to
02:15
calculate risk. We saw
02:16
the risk matrix determine whether risk could be considered low, medium or high. And we also saw several formulas for putting a dollar sign amount to this risk through single loss expectancy and annualized loss expectancy.
02:34
And lastly, we also took a look how to medicate the risk properly. But whether it be through mitigation, where we kind of put in some more controls and get rid of it transference, where we transfer the risk to 1/3 party
02:47
avoidance where we just completely step aside and don't even touch the risk. Or we can do risk acceptance where the probability is not that high. That happening, so is okay. If we accept that risk in the organization
03:04
now,
03:05
why does all this matter?
03:07
This'll matters because of data breaches, because it's important for people to know, be familiar with network security to make sure they don't become victims. At the end of this video here, I just wanted to introduce a little lessons from the field, as I like to call it, the
03:25
good examples off why
03:28
information security is very important and the things we've learned in this module, why they are important and why they should be applied.
03:37
So in this, in this lesson here from the field, I want to take a quick look at the Marriott data breach. So this Madeira Marriott data breach Sure everyone's heard of at this point happened in 2018 or was discovered in 2018
03:53
and had up to 500 million guests impacted.
03:59
Now that's
04:00
that's a lot of people.
04:02
That's a lot of people. And, you know, most people have stayed in a Marriott hotel. At least one thorough life. I know I have. And this data breach took place from 2014 through 2018. That's four years for
04:19
four years off, bad guys coming in and out of Marriotts
04:25
Data's systems, using their stuff
04:28
without, um without Marriott, even even knowing that this was going on four years. So what happened? How did this happen?
04:36
It's not very clear that information has not really been revealed as to how exactly this breach took place. But here's what didn't happen.
04:47
First thing that didn't happen was data leakage prevention.
04:51
Whole point of DLP is to prevent data from leaving, and Elks, like data, has been leaving the Marriott organization for four years,
05:02
and that's that's a really long time.
05:05
What also didn't happen was that there wasn't any really good risk management going on. The whole point of risk management is discovering risk. Discovering what's at ST, discovering the potential impacts and the fallout, discovering
05:21
the likelihood of something happening, the probability what the exposure factor is.
05:27
All right, all these play a part in the risk, and this is didn't happen. Something of this magnitude should have been deemed a high risk for it to get involved and you know it. It wasn't so for some reason, this risk wasn't picked up on, but the Attackers picked up on it.
05:44
And from there they were able to exploit one thing or maybe even exploit several things.
05:49
Um, and they were able to get the data and they were successful for four years. And that's why this chapter is very important, especially when it comes to data leakage, prevention and risk management.
06:02
I really hope you guys learned a lot in this module and I will see next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor