Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
And in this video, I will be talking about physical PC protection.
00:08
So not actually physical PC protection. I'm not going to talk about men and guns guarding your PC. I'm going to talk about how to prevent PC or in data in case it's being lost or stolen, so
00:22
that the physical protection of the device is not the subject to PC Security. It's a It's a physical security thing. But
00:31
there are things to protect devices from being stolen.
00:35
So there are just some common sense things, like
00:38
If you are not inside the office, don't leave it unattended even if you're in the office. If you have a way to lock it with cable
00:47
like dancinto lock or something like that, do it.
00:50
Um, if you're traveling on business, don't leave your PC at the car seating like a passenger seat under or on the back seat, even if you're in the car, because there are people stealing these things by just driving next to your car on the motorcycle work, for example, your
01:10
the red light,
01:11
they just break the window and take your PC. So just leave it in the bag sour behind your seat or in the trunk.
01:19
Um, I know I have been doing this sometimes I was driving
01:26
and ah, like on the highway with the speed limiter turned down. So and there was no one on the high risk or just had toe pull the wheel straight and do some things on a PC.
01:38
It's really dangerous. I know people do it. I've been doing it, so I stopped doing it.
01:44
But don't do it. So it's Ah, it's not smart thing to do, not just from the driving safety perspective from PC safety perspective.
01:53
So if if you're on a meeting somewhere, just take your,
01:57
you know, protective cable with the lock, And if you're leaving the room, just locker PC. And, uh,
02:07
look, it, uh uh with this cable and so that nobody can steal it and just close it or shut it down so that nobody can access it.
02:17
And if you're of if it's in your bag,
02:21
then there are these proximity things that you can put in your bag.
02:25
Basically, that will sound the alarm with the bag stolen. So maybe somebody is not going to steal your entire just the PC, but your entire bag, like, for example, Europe Conference. And there is a break between,
02:42
you know, two things and somebody's talking to you, and you're just very close to your PC, and then you talk to people so
02:51
you don't have it in your hands like you're drinking something.
02:54
In that case, if somebody takes this thing away from you more than a couple of meters, it will sound the alarm. And okay, maybe it's extreme thing. Sometimes it you might forget yourself and go to toilet, and it will sound the alarm so you will embarrass yourself. But
03:14
anyway,
03:15
this thing is useful. You don't have to have it turned on all the time, but in some situations you should.
03:21
Also, there is a recommendation that I'm not saying you should do it, but it's a smart one. Don't put your
03:30
your PC in the bag. That looks like it's PC bag you. Can you just the backpack now? If you're a manager high level executive in the company, that might be something that you don't want to do because you're expected to look smart all the time. So back back, sir, Maybe not the smartest idea
03:51
on then We have a possible theft protection. So you have lost your PC or it has been stolen.
03:58
And remember when I was talking about logic,
04:01
some something like that can be used to track it. So it has been stolen. You have locked it, so we're pretty sure that they won't crack the lock in terms off. They cannot access data,
04:15
but they connect this PC, and it connects to the WiFi, the switch it on and immediately You know where this is. So the truth is slow Jack, that is, inside the
04:26
that the bias. But there is also something that the process of manufacturers like Intel is offering with their V pro processes and with service that can help you track your PC anywhere in the world if it has been connected to the Internet
04:42
off course. The other thing that you can use this to use boost but boot password always have hard drive encrypted.
04:48
There is discussion between software and hardware encryption.
04:54
In theory, hardware encryption doesn't help you. If somebody can listen, toe your bus before the data comes to a hard drive, and then it's not encrypted.
05:03
If you're using softer encryption, you're probably using bit locker. If you're using Windows because it's come, it comes free with windows.
05:12
And also there is one thing. Don't store passwords in your notebook, so try to remember them.
05:17
Don't don't. For example, if you're using notebook toe, pay some banking things.
05:24
Um, don't let the browser remember because it can be retrieved.
05:30
So this is all about physical protection. And just to ask your questioning to see if you have been,
05:40
you know, listening this carefully. Which method is not used for the protection? Is it using handcuffs to tie laptop to bag off our laptop back to your hand?
05:50
Is it not to leave PC and attended or easy to use Kensington Lock to secure
05:56
number?
05:58
And, of course, the using handcuffs that I laptop back to your hand is not the thing to protect yourself from theft, because
06:06
if it comes to being physical with you, they can just use a razor blade to cut through your bag and take the notebook out of it. So it really doesn't help.
06:18
Okay,
06:19
in this video, you have learned about the ways to physically protect PC and data in it
06:26
and in the next video, I will be doing the re capital, the whole this module, which is about protecting the harder of a PC.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor