00:04
okay. As we continue to move on, we're gonna look at Module six, which is looking at the actual technology itself, the information security technology. Now, as far as this goes from a technical perspective, the scissor does not need to be a technology expert.
00:21
As a matter of fact, many chief information security officers
00:24
have been removed from the technical aspect of the job for quite a while. They've been in management, whether it's project management, whether they've been lied technicians, they've been strategists or architects or whatever that may be. Many scissors haven't had their hands on in
00:45
expert in the technical elements, especially the newer technologies. But in the principles of secure design and secure structure and architecture, they absolutely must be well versed. So they've got to be able to understand and discuss current technologies.
01:03
That really is the understanding of the concepts underneath. And, you know, there's a phrase that I particularly like and the phrases that security transcends technology.
01:15
Security transcends technology, and ultimately, what that comes down to is in order to secure an organization, you need a lot more than gadgets in place. You need a foundational understanding of the importance of security, unique
01:32
good security principles that are in place, like separation of Judy's.
01:36
Isolating, trusted from untrusted networks, the cost benefit analysis. You need those elements in place, and those really transcend whatever. The latest greatest firewall is, for example, so always focus on security principles,
01:53
and that's what a scissor really has to have an understanding of.
01:57
All right, so speaking on these principles or speaking of these principles, there's some concepts of secure network design that we really want to talk about, and then we'll go into each of these a little bit more in depth. The 1st 1 is separation of trust by isolating trusted networks from untrusted networks.
02:17
Many times we use firewalls to create that separation.
02:23
We can also use the lands or routers that provide that segmentation that isolation. Often these devices will firm perform network address translation things. They're all security concepts will get into deeper
02:38
as well as single sign own, which helps us control access to the main environment
02:43
and then finally will wrap up with the importance of configuration management