CISM

Course
Time
8 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:00
All right. Next to pieces. Last two pieces of network protection. We have inspection and detection on this slide. Not really gonna spend time here because we've already talked about the benefits of sniffers and intrusion detection systems. Honey pots and I'll mention that a group of honey pots is called the Honey Net.
00:20
It's there to look like a sub net that's available. Vulnerable
00:26
law reviews we've talked about be proactive with your log reviews and an internal versus external audit. They're both can be objective, and they both have pros and cons, right? You have a greater control over the audit if its internal external might give you more objectivity.
00:45
But the last piece that I want to talk about his network access control it's referred to his neck network access control. And the whole purpose of Nak is to protect your network your environment from unhealthy systems so
01:00
Nak will allow access to a system or resource or service
01:06
based on help.
01:07
And if you think about help oven individual system, what would make up a healthy system?
01:14
Well, for one thing, it wouldn't have viruses, right? So does the system have anti virus software that's up to date,
01:21
doesn't have a firewall, Doesn't have spyware protection. Does it allow audit? Or does it? This this this and this have firewall, whatever. So, with network access control, this is really best applied on laptops for your employees that travel and connect lots of different networks.
01:41
They're much more susceptible to getting garbage on their systems.
01:45
So before we allow that system to come back to our whole to their whole network, if you will and connect to the network, they have to be able to prove to our validation server that they're healthy. Okay,
01:59
so obviously they're moving pieces to this. You've gotta have a next server. You've gotta have that. You could have to have a service that understands knack like D H E P. For instance,
02:08
you're gonna have to have a client that runs next software, so it's not quite as easy as it sounds to implement. But ultimately, when you have these moving pieces together, then you're ultimately going to be able to have a lot better control. And it's not like you just have to deny or allow access.
02:28
It's someone doesn't. If a system doesn't have any virus software, for instance,
02:31
you could relocate them to an isolated sub net that has an any virus server, right? They can download that software than they can come back and access the main network. So Nak is a really nice feature. Like I said, it's all about help of the client.

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor