Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back toe acid security course. And I'm going to continue in this video to talk about protecting physical.
00:08
Yes, it's, um,
00:10
especially about protecting the right equipment.
00:15
So you have seen about using off asset management suffer.
00:19
And now I'm going to talk about some other methods. And one of the method that is used
00:25
is video surveillance. So with your surveillance is used when you have to protect, for example, devices like hallway printers and the camera you see here has
00:38
ah violists and wired connection.
00:41
And by all means, if you want to create good surveillance off your equipment that is located in holes and any location where somebody from the outside can access and take the equipment
00:59
you have to skip for and not use a wireless connection for cameras. So if they have only violent, this connection just avoided.
01:10
So, uh, these things can be easily hacked.
01:15
They're notoriously unreliable, and the main reason for that is that manufacturers usually don't issue security updates when, after some security bridge on that type of device has been found have been found. Sorry. So
01:34
now somebody decides that the WiFi trip there has some security. Um
01:40
ah failure. Sorry, not decide that fire find. And then the logical step would be for camera manufacturers to issue for updates. Some of these cameras even cannot be updated. The firmer on these cameras cannot be updated, and usually they don't issue
02:00
the update. Uh,
02:00
in time, if ever. So in these cases, thes these things can be hacked and made
02:07
basically useless.
02:09
The second thing about the protection off the right equipment second way is to have the Y striking softer. This is, for example, useful toe have on mobile phones and on noble species
02:28
or tablets. The problem is that this is more like a measure to find the lost item instead of protected from being stolen. Because if you're a thief and you have any kind of knowledge about these things, first of all,
02:46
you're going to If the device you have stolen is turned down, you're going to switch it off,
02:53
and then you are going to switch it on again in an environment that doesn't have WiFi or in case of mobile phones, mobile reception. So that and then you can remove the wireless remote device rankings off for,
03:09
or you can and enter in the wireless on or you can. If it's a PC, you can just wiped the hard drive If you're not looking for a date, if you're actually steering stealing
03:21
the hardware itself, you can simply wiped the hard drive. And then the software is gone.
03:25
So
03:28
there is a way to have some kind of protection or tracking of a device, but it has to be embedded in Harbour And, for example, Intel processes that have the pro can give you the opportunity to track the device, even if the hard drive has been wiped out
03:45
because the thing is turned on in bios and it's on process of level
03:50
or on ships that level. So, Aled, these things allow you to track your devices even if they don't have the operating system on themselves. The only thing they need to have is to be connected to the Internet, and you can locate them instantly.
04:08
So this is This is very nice thing about tracking softer,
04:12
and the 13 that is included in in the whole thing is simple. Tracking hardware, so drinking harder is especially useful if you want to protect your mobile phone or tablet to be stolen because these things
04:29
they have, ah, be peering inside the hardware itself
04:32
so you can keep it in pocket. There is a software that bears this. Why blue to two pairs, the mobile phone or mobile device with little gadget.
04:43
And once you
04:46
once they're disconnected. So if the Bluetooth connection is gone, or the blood of single simply drops below a certain point, you can have alarm on both your tracking device and your phone, even if your phone is on silent. So in this case you can
05:03
it can be signal it can signal that it it has separated from the tracking device,
05:10
So if somebody is stealing it units in its pocket, it will just go BBB beat, and that will be enough for you to find it. Person. Also, you have lost the rise. You can press the button on your tracking harder, and in the case it will perform well deep. So if it's lost somewhere and
05:30
in your home or in your office, you don't know where you left that. You can find it easily
05:34
using drinking harbor.
05:36
So this is all about protecting I T equipment. And in next video, you will be in a position to check your learning. So far, with a short quiz

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor