Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back to asset security. Of course, in this lesson I'm going to talk about I mean, in this video, I'm going to continue this lesson, and I'm going to talk about protecting data and in particular, in this lesson, I'm going to talk about how to protect local store data. So data stored on the user's PC,
00:20
um, and it simply sometimes
00:24
essential toe have data on the local PC. For example, if you have sales people traveling around, they need to have all day that they need to do sales, even if they're not connected to the Internet. For example, if they're in the plane and they have to do something,
00:41
or if they go to a customer site
00:44
and they cannot use Internet there,
00:47
then you simply have to have local data on a PC, and I'm going to talk about how to protect its data.
00:57
So when you talk about protecting data on PC, we're talking about protecting the device itself and to put fully protected device itself. We have to do it below the OS,
01:07
and when I say below the US, it means that we have to make sure that harder is trustworthy.
01:15
Then we have to protect data India, as so protect from Alber backdoors and such things.
01:23
And again, we have to protect it above the earth. So we basically have to control the software that is installed on a PC.
01:32
So,
01:34
um, this is how ideal PC protection, and very few companies have that. But I'm going to talk about this because this is this important. First, I'm going to start about the standard configuration of a PC from a softer perspective. So you have hardware,
01:51
and then you have bias. And bias is basically today a meaning operating system that is communicating with hardware
01:59
on the one side and the on the operating system from the other side. So if you if your software is retrieving something from a hard drive, it's not talking to God right directly. It's using some bias coal
02:10
and which says, Okay, I need that data from this hard drive, and then it gets back.
02:17
So in operating system, you have usually protection like anti malware. You can have software,
02:25
um, firewall on the device if needed, and, for example, if it's no dope, if it's up,
02:34
if it's ah, best of PC, sometimes you don't need it because you already have corporate firewall. But it's, ah,
02:40
it's not bad to have both of them as well.
02:46
And then on top of that you have acid management software.
02:49
And, um, that's after can look on devices and, for example, see how, what what software is installed on your PC? And let's just look at the short example of how
03:06
one asset management software can do that. How do you see all the software installed on a PC?
03:12
So now we're Beckett
03:15
Spice Works, and we are going to look into the softer portion of the device.
03:21
So if it taken softer, here is the list off all software packages that have been installed on this device. You can see the license status. You can see the, um,
03:38
for example, the license number if needed
03:42
on and everything is there. And now if somebody would install something else on this device, like for example, one, some our would get installed and it's visible on the list of software installed, it would appear
04:00
here. Now, we're not going to install malware on this device, but just for the
04:04
ah,
04:06
this demonstration, you can see that pretty much everything that is there, including the spice work agent, is visible in the list of software installed. Also, if some of the softer would be uninstalled. For example,
04:20
if somebody would maliciously want to uninstall anti wire software, it would be recorded here
04:29
and you could see the that it's missing from the list.
04:32
So this is the way that an asset management's after account and also monitored the softer installed on the each individual device.

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor