Protecting Data Part 3
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
welcome back, plus its security course. And in this video I'm going to continue what I have started in the previous one, and this is explanation how to make ideal PC protection. So you have seen in previous video how the standard the way of protecting PC today looks,
00:19
and I'm going now to talk about things that some
00:24
off the manufacturers event of PC Wenders do as an extra thing to protect their PC.
00:34
So
00:35
we no longer can have the assumption that our hardware is trustworthy
00:43
because the buyers might be compromised.
00:46
In order to prevent that from happening,
00:49
we can put a piece of hardware, a chip on a mother board.
00:55
Let's call it security model,
00:57
which can do multiple things, but it has to do at least two to make a lot of things function well.
01:06
So the first thing the security model has to do is to prevent any unauthorized writing rewriting of buyers. So three only way that you can do something with bias on the machine that has this kind of security model
01:23
is to do their legitimate bias or firmer upgrade off the device.
01:29
How it's done.
01:30
Basically, we never the security model the text that there is unauthorized
01:38
attempt to write into bias.
01:41
It will simply freeze the machine and signal to operating system. Before that, that there has something has happened so that you can intervene or it can just simply restart device.
01:55
The other thing is on the boot off the PC.
01:59
The security module can track the content of the bias to the golden copy of buyers that is stored not in standard flesh but in this security model.
02:09
And if there is any difference, it can rewrite the bias on the on the board with the Golden Copy, making sure that then the bias in the board is the good one and then the restart the machine.
02:25
So this is
02:28
what security model has to do.
02:31
Next step would be to have some piece of software that is also guarded by security model,
02:42
and this piece of software is basically checking if crucial security processes in your operating system like, for example, of anti Mellors after or anti virus after
02:57
is functioning. So if that process hasn't been stopped, why? Because some malware first thing they do is they stop anti malware software. They'll for Windows, stand they go into Windows 10 Security Center, see what is the current
03:14
software that is stated as anti mellower, and then they simply stop that process.
03:20
So Guardian Software has to restart that process, which is anti Melber.
03:29
If they noticed that it has been stopped
03:31
and the execution of the Guardian software itself
03:36
can be
03:37
somehow,
03:38
uh, told to security model so that it the functioning of that process is somehow being monitored from Harvard. I'm not going to go into details. I'm just telling you how these things work.
03:51
And final part off ideal PC protection would be
03:55
that that asset management software
04:00
can also check the status of bio settings of the PC.
04:04
Why? Because, for example, if the PC goes if it's broken and madame or has to replace them, then PC's taken to the Service Depot or service partner or service contractor.
04:17
They replaced the mother board, but they don't know how to put to the bias. Password and bias password is absolutely necessary thing to have
04:28
if you want to protect to the buyers from being misused. So uh,
04:35
that s it. Management's after should be able to at least report that now, suddenly we have a PC on the network that doesn't have bias passwords, for example, Set
04:47
and also even better, would be to force the change. So to implement the policy off bias passwords to the device. Why? Because bios passwords on all machines in one company are usually the same,
05:03
makes absolutely not no sense from management perspective, toe have them
05:08
the different in every PC so it can implement the bus password. Or if not, it can at least signal to the to whoever is in charge that this many pieces they don't have by his password there.
05:23
So this is how the ideal PC protection looks.
05:27
And in in the next video, you will be able to see a little bit more about protecting other types of data in your company.
Up Next
Instructed By
Similar Content