Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
welcome back to acid Security Course. In this lesson, I'm going to talk about protecting data, which is the most important asset that I t security needs to protect in the company.
00:14
And in this video or lesson, I will stock specifically about to take declassification and how to protect the daytime storage.
00:25
So
00:26
when you talk about classification of data based on their in importance,
00:31
uhm I'm going to talk about sensitive data,
00:35
then crucial data.
00:38
Um, then we have something that is essentially
00:42
regular data and then, in the end, redundant data.
00:49
So, uh,
00:53
for example, data did you have on the cloud drive
00:59
then, based on the state of data,
01:02
we have older data that is in storage.
01:06
Then we have all the data that's on user PCs.
01:10
Then we have data that is currently being worked on, and this data can be
01:15
both in some kind of server or cloud,
01:19
or it can be on user BC,
01:22
and then we have data that is in communication or on the network.
01:27
So when we talk about older data that is in storage,
01:32
the two things we usedto protect this data is encryption and access rights. So we make sure that not everybody can conexes data in storage or if they can, it is being logged. But also toe have the older daytime the storage encrypted,
01:52
so it cannot be easily copied.
01:53
One of the things which is usually used is that you access toe older data not through shared that were drive, but through Web interface, which reduces the things you can actually do with the data. So, for example, you cannot open it.
02:14
The file, for example, Excel file that is in storage. But you can copy to your PC and then open it.
02:21
Um,
02:23
when you talk about older day town on user PC,
02:29
we're talking about this contraption and we're also using that method from data currently being worked on.
02:36
Now this contraption is not enough. Because if somebody can count with the unauthorized, you know now in unauthorized, they access that users BC
02:46
then they can access the daytime,
02:50
which is on the PC like that, the user itself. So if it's open for me on my PC, if somebody, for example, installs backdoor malware on my PC, they can access, is it as well? So this conscription is not enough
03:07
eso in these cases were trying to add some authentication, more complex go dedication,
03:15
which allows reduces the chance of being unauthorized access. We also use anti virus software. Which real is there to prevent the
03:29
the possibility off members after being installed.
03:36
And there are other methods. But I'm not going to talk about them at this point. So when we talk about databases, the communication on the network, we use encryption. So if it's wired network, if its corporate network,
03:51
it's pretty much protected. If somebody can break into the network from the outside, then they're already in. So ah, wire network is not,
04:02
I think, to some kind of specific need for, for example, encryption of data.
04:09
But if it's over wireless network, then VPN or some other kind off accessing on encrypting data that's going over VPN is highly recommended. So if you have, for example, inside the company and so the office space you have, ah,
04:28
sometimes meeting rooms that are accessible for people from outside the company,
04:32
and it's in big companies, usually the way you have the office space, where people who work there sit down. If somebody comes for a meeting, then there are meeting rooms outside, and then we usually give these people the privilege off using the
04:46
by fight.
04:46
But if there is somebody working in the company that has to be in that meeting in the meeting room,
04:53
and they are supposed to use WiFi to provide some information during meeting, then they should be forced to use a VPN connection to the server, which is encrypted and which make sure that no data they're communicating with several getting from the network is visible
05:11
easily to somebody from the outside.
05:15
So
05:15
when you talk about dating storage, um,
05:18
it can be networked. Get touch storage. So if it's a small company, it's usually way to keep dating storage. So you have one box, a couple of drives there either mirrored or there is some kind of operating system that allows for these things to
05:34
be recovered in case of one off physical hard drives girls down.
05:40
And the thing that I always recommended the situation is, as I mentioned, you don't access the storage as shared drive. You access the storage. Why are some kind off Web interface
05:53
in which there is a limiting thing, amount of things you can do with every possible file. So, for example, you cannot delete it. If you're
06:01
accessing from the outside,
06:03
it can be done only by administrator by logging into nice device on different way. But if it's, um, if you're just a common user, you can just look at the data copied, put it there, but nothing else you don't see it is. So, for example, if your PC catches some kind of ransomware,
06:23
that's ransomware won't be able to access that storage and in credit data on it,
06:29
which is
06:30
very important thing.
06:33
So then we have backup systems, and backup systems essentially work in a similar way as, ah, Mass. On Lee. They are automatically so, For example, they can be set up to or their convince after on every PC,
06:49
some kind of agent or some kind off script that will automatically back up Whatever is important on your PC to the backup system.
07:00
It's slightly different than network attached storage in
07:04
in a sense that the whole process is automatic. So it's not something you do by yourself, putting files there and getting it firm it there just, for example, if your if your hard drive goes down if it breaks, If it's broken, has to be replaced.
07:23
You have the latest back up there. You can put the new hard driving on your PC.
07:28
You can restore from your backup, and if it's done once a day, you're safe that you will lose only what you have been doing that day and nothing else.
07:38
Then you have, AH, enterprise level storage. And these are much more smarter systems, which are usually located on a separate network, which is called San or Secure US the storage area network.
07:55
It is usually much faster than the network
07:59
that is used to communicate with your PC's air used to communicate with servers and outside world on, and the storage is usually attached to servers. As an external storage, it can be used for storage for physical servers or virtual servers. It doesn't matter,
08:20
and it's pretty much secured. The access is controlled. Users don't access it. A tall it is accessed through two applications on the server on because there is
08:31
just a few servers in a company can they can be monitored, monitored 24 7 and there can be in a lot alarm going on, even from software or from some people monitoring. If something is happening, that shouldn't be happening. So these things
08:48
are pretty safe. And I'm not going to talk about ways to secure enterprise level storage at this point,
08:54
scoring discourse it all
08:56
on. Of course, there is a cloud storage, and the cloud storage can be storage that he's rented by some some of the else, like, for example, Amazon or Google or Microsoft
09:09
and the cloud storage. In that case, the security off that storage is no longer responsibility of fighting security and the company. It is responsibility off somebody who is renting you that space.
09:26
But if you're having your own corporate stuff, cloud storage,
09:30
then it can be pretty secure. If all the security protocols are followed again, because if you're accessing cloud storage, you don't see it is a hard drive. You see there's a,
09:43
uh, you connected through to it through Web interface, and essentially the only thing that somebody who is militias can do is look at that data. If they found a way, they usually cannot destroy it, especially if you have ah set up that cloud properly.
10:03
So now in this lesson, you have learned about types of data that existing and company and I have told you that there is sensitive and critical daytime
10:15
on sensitive data is basically a data that,
10:18
uh, if leaked out, can
10:22
produced damage to company in some other way than just the value of data. For example, you can if it is medical data, your can be legal responsible for leaking them.
10:35
Then it's a crucial data that is used, usually used for day to day operation of a company. So if this data is lost,
10:41
the leakage can cause the damage to accompany. But the biggest problem if it if the data is lost, then in that case, um, you simply you cannot work. So so you lose money by not
10:58
making day to day operations.
11:01
Um, and of course, there is less important data which is redundant on different locations in the data in everyday operations. And then you we talked about protecting data that is in storage

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor