Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
In this video, I will continue talking about details off your five buyers,
00:09
and in the particular I'm going to talk about the impact off the unify on the security of a PC.
00:17
So let's go directly to the story. What is impact of purifying security? As
00:24
you have ah, learned in previous video,
00:27
your fire reserves a piece of memory booting, and it's available only to unify, not to operating system.
00:34
So if there is something running under your if I some kind off your fire application, which is
00:41
some kind of malware
00:43
any software that runs under operating system, which includes anti Melber or anti virus solutions Air Software's,
00:52
they simply cannot touch that piece of memory. So you have something running there, you concede from the operating system.
01:00
Um, so far, there are no applications from for you if I that are
01:06
auntie wires for your if I so there is no such thing
01:11
and this is a problem. This is the way the if I is impacting security of a PC in in a very, very special way.
01:21
As I said again, there is no limit, but to what can be done from you If I Okay, there is limit as it is you mentioned.
01:30
You cannot browse Internet. You cannot. But you can go to a certain I P address on the Internet and download the payload. You can do that,
01:42
but to do what you can do is you can extract data so you can look at the hard drive periodically and just send whatever is in documents folder on the under, windows and Sunday somewhere else. Or you can You can even
01:59
do the incremental sending so you can start sending him when you have finished sending than what they were changes in that folder. You send it back again, or you can look,
02:07
if you're using one drive under windows, it can look in the folder in which your, you know, putting files to be stored on the cloud. The one drive and you can you can just send these files somewhere else on bond
02:23
unless you have very, very sophisticated diagnostics checking on WhatsApp ritually happening on the network. With that PC, you won't be able to detect it. This is even happening because this will be happening below the operating system And if that power is written
02:42
smartly drill, it will use the PC only when operating system is in idle state. Or
02:50
you know, for example, when you go to lunch and you just lock your PC. And then you won't even notice that. For example, network speed is dropping down because it's busy sending files outside your PC.
03:02
It can be used to create a back door into into your PC
03:07
because of
03:09
the ways it's it's handling the sun you can remotely logging into the PC and then just browse through file structure.
03:20
It can read email while being sent or received. It can do email sniffing or network sniffing for not just that PC but everywhere in the network.
03:30
And it can also be used to drop payloads to other pieces on the network because it's working on on the low and level. It can even bypass some things in the operating system
03:43
on the other PC's or in the service.
03:46
And the biggest problem and the biggest way the here fight today. Impact security of a PC is that we have at least one recorded case off your If I'm Alber in the wild when you say in the wild. For those who don't know
04:00
no
04:00
what the term means, it means that it's out there. It has not Bean just used as
04:09
a za tool for some covered agency to attack us, um, particular individual or a company or organization. Now it's basically spreading freely on the Internet, and I will talk about that in the future.
04:28
But for now, let's do
04:30
a short lending checks off. I will ask you a question, which is Rich Militia section can be done from bias.
04:39
Um, and the possible answers are infecting other devices is browsing or changing bias password
04:46
and the militias
04:48
action that can be done from biases infecting other devices?
04:54
Eso browsing, as I said, is not there. It's really difficult to do. Browsing from the bias
05:00
you're five buyers and changing bios passwords is something you actually do from a buy set up utility. So changing bias passport is not the militia section that can be done from within bias. If if somebody can access buys to that level,
05:17
I mean, there is absolutely no need to change my password if you have control over bias itself.
05:25
So
05:27
in this video you have learned about the impact of what beautifies in previous lesson in this one. What is the impact off your if I two pieces security
05:38
and in next lesson, I'm going to be talking about what the u F I'm our is how it looks and in details a little bit about existing known your five bias, your Farmall, We're sorry.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor