Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
welcome back to intermediate endpoint Security course. In this lesson, I will be talking about protecting data from being destroyed or lost.
00:07
And when we talk about these topics, we will talk about backing up data and storing dating the club. Because this is we're now not talking about some kind of cyber activities have a crime being in the world. We're just going to talk about
00:23
what happens if some harder fails or people just delete something by mistake.
00:31
So when we talk about backups, we have storage Bates backup. So you have storage systems in in the company, and you can have. It's a very traditional approach to protecting data
00:45
requires, usually in house storage. So it's a separate system than runs in the separate network.
00:52
It is very safe because it's Ah, As I said, it's on a separate network. It's really protected. And the access to that storage may be limited through some kind off interface, which is like Web interface, which, for example, prevents you from deleting data there without special privileges
01:10
or excessive their data
01:11
so it can hear essentially very, very safe system.
01:18
Um, also, the way the storage based backup works is that you usually have some kind off agent on users. BC's,
01:30
and it performs back up on a regular basis on and usually the users. They don't have to worry about these things, and this is usually the incremental backup. So you ads only those things that have been changed. Only those files,
01:44
and also, if some far has been accidentally deleted. It doesn't get deleted. It just adds things that have been changed. It doesn't remove anything from storage. That means that capacity of storage has to grow
01:59
in time. It's usually the leaner grown of the exponential growth. So it it adds to the cost.
02:05
Uh, but that way you can track things. Even that was that They were created, like, five years ago. There still there, which is very nice thing. Also, if somebody gives his the something play gets a PC stolen or lost,
02:22
you have all the data they have been working on because everything has been backed up. So this is very safe
02:29
in terms of protecting data.
02:30
Now you have clogged
02:32
and you can use external cloud, and you have inside internal corporate crock crowd cloud. Sorry. Usually when you use somebody else's cloud. You also search security together with outsourcing the storage space
02:50
so you don't have to worry about securing. They tell McLeod it can be cheaper because it's scalable and because it's essentially
03:00
done in a way that you
03:04
you probably you don't need the basic starter infrastructure. Just paying for the storage you leasing. So it's, um,
03:14
it can be cheaper on its potentially more, more vulnerable. Why? Because communication can be
03:23
eavesdropped and also if the security and the cloud provider fails.
03:29
Yeah, it's a huge thing. And these things are magnet for hackers. You know, if you if you were, if you're aspiring, hacker or cyber criminal and you want to make a name for itself looking after breaking into some cloud like
03:45
cloud storage, like Google or Amazon or Microsoft, one drive
03:50
is the thing you want to do. It's like the famous gun slingers in the in the old Wild West. They were
03:58
constantly called upon a dual because every young hotshot wanted to make the name for themselves. Same thing is here so potentially. These things they're protected by very professional people. A huge amount of money is given into their protection, but it doesn't mean it's absolutely safe because nothing is
04:19
what is the learning trick on? The question is, why is cloud better than in how storage. So what is the advantage of cloud? Is it because it's safer?
04:30
Is it because it's possible to back up when outside come outside company network? So when they're here, for example, at home? Or is it because it's faster?
04:40
And the correct answer is, uh,
04:44
it is because it's possible to do back up when you're not connected to corporate network. So if you're somewhere like on a holiday and, for example, your creepy in doesn't work really well, then you you still can do some kind of backup by just connecting toe cloud.
05:02
So in this lesson, you have learned about protecting data from being lost or destroyed.
05:11
And the next lesson? I'm just going to do a recap off the model that is talking about protecting data

Up Next

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor