3 hours 35 minutes
hello and welcome to P C Security Intermediate Course.
In this video, I will continue talking about details off your five buyers,
and in the particular I'm going to talk about the impact off the unify on the security of a PC.
So let's go directly to the story. What is impact of purifying security? As
you have ah, learned in previous video,
your fire reserves a piece of memory booting, and it's available only to unify, not to operating system.
So if there is something running under your if I some kind off your fire application, which is
some kind of malware
any software that runs under operating system, which includes anti Melber or anti virus solutions Air Software's,
they simply cannot touch that piece of memory. So you have something running there, you concede from the operating system.
Um, so far, there are no applications from for you if I that are
auntie wires for your if I so there is no such thing
and this is a problem. This is the way the if I is impacting security of a PC in in a very, very special way.
As I said again, there is no limit, but to what can be done from you If I Okay, there is limit as it is you mentioned.
You cannot browse Internet. You cannot. But you can go to a certain I P address on the Internet and download the payload. You can do that,
but to do what you can do is you can extract data so you can look at the hard drive periodically and just send whatever is in documents folder on the under, windows and Sunday somewhere else. Or you can You can even
do the incremental sending so you can start sending him when you have finished sending than what they were changes in that folder. You send it back again, or you can look,
if you're using one drive under windows, it can look in the folder in which your, you know, putting files to be stored on the cloud. The one drive and you can you can just send these files somewhere else on bond
unless you have very, very sophisticated diagnostics checking on WhatsApp ritually happening on the network. With that PC, you won't be able to detect it. This is even happening because this will be happening below the operating system And if that power is written
smartly drill, it will use the PC only when operating system is in idle state. Or
you know, for example, when you go to lunch and you just lock your PC. And then you won't even notice that. For example, network speed is dropping down because it's busy sending files outside your PC.
It can be used to create a back door into into your PC
the ways it's it's handling the sun you can remotely logging into the PC and then just browse through file structure.
It can read email while being sent or received. It can do email sniffing or network sniffing for not just that PC but everywhere in the network.
And it can also be used to drop payloads to other pieces on the network because it's working on on the low and level. It can even bypass some things in the operating system
on the other PC's or in the service.
And the biggest problem and the biggest way the here fight today. Impact security of a PC is that we have at least one recorded case off your If I'm Alber in the wild when you say in the wild. For those who don't know
what the term means, it means that it's out there. It has not Bean just used as
a za tool for some covered agency to attack us, um, particular individual or a company or organization. Now it's basically spreading freely on the Internet, and I will talk about that in the future.
But for now, let's do
a short lending checks off. I will ask you a question, which is Rich Militia section can be done from bias.
Um, and the possible answers are infecting other devices is browsing or changing bias password
and the militias
action that can be done from biases infecting other devices?
Eso browsing, as I said, is not there. It's really difficult to do. Browsing from the bias
you're five buyers and changing bios passwords is something you actually do from a buy set up utility. So changing bias passport is not the militia section that can be done from within bias. If if somebody can access buys to that level,
I mean, there is absolutely no need to change my password if you have control over bias itself.
in this video you have learned about the impact of what beautifies in previous lesson in this one. What is the impact off your if I two pieces security
and in next lesson, I'm going to be talking about what the u F I'm our is how it looks and in details a little bit about existing known your five bias, your Farmall, We're sorry.
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...