You are on page 1of 34

1

00:00:06,912 --> 00:00:09,472


<font color="#fcfcfc">You're watching</font>

2
00:00:12,032 --> 00:00:16,384
<font color="#b6b6b6">Why do they give watching IP Pro TV and powering the world to
engaging learning</font>

3
00:00:16,640 --> 00:00:19,456
<font color="#989898">I mean hozak Meadows for this episode of ceh v10</font>

4
00:00:19,712 --> 00:00:23,808
<font color="#cecece">This episode Internet Security controls</font>

5
00:00:24,064 --> 00:00:26,624
<font color="#f9f9f9">Let me say that again just so we get the full gist of
it</font>

6
00:00:27,392 --> 00:00:33,536
<font color="#ababab">Intruder ethical hacking security controls and bring us
information we need your expert in the field and Studios and everywhere</font>

7
00:00:34,304 --> 00:00:40,448
<font color="#cccccc">Daniel Lowery Daniel</font>

8
00:00:41,472 --> 00:00:41,984
<font color="#d9d9d9">Joining us</font>

9
00:00:42,240 --> 00:00:45,568
<font color="#fcfcfc">Hopefully you are ready to digest a large chunk</font>

10
00:00:45,824 --> 00:00:49,920
<font color="#d8d8d8">Of the intro to ethical hacking because it is a large portion
of that</font>

11
00:00:50,176 --> 00:00:51,712
<font color="#e2e2e2">Domain for the exam</font>

12
00:00:52,224 --> 00:00:54,272
<font color="#c5c5c5">So this will be a multi-part or it's going to fix</font>

13
00:00:55,040 --> 00:00:56,576
<font color="#f9f9f9">Get through all the nuance</font>

14
00:00:56,832 --> 00:00:58,112
<font color="#8c8c8c">Book a baby ciss</font>
15
00:00:59,136 --> 00:01:02,720
<font color="#989898">Right at the beginning of seeing a sandwich should be aware
of a lot of</font>

16
00:01:02,976 --> 00:01:03,488
<font color="#efefef">Security</font>

17
00:01:03,744 --> 00:01:06,304
<font color="#9a9a9a">Angie and things that nature so we got to laugh</font>

18
00:01:09,632 --> 00:01:12,448
<font color="#e1e1e1">These terms definitions we need to be aware of when it
comes</font>

19
00:01:12,704 --> 00:01:18,848
<font color="#aeaeae">Security control that's a great question because there are
plenty of them we're going to start off with information assurance</font>

20
00:01:21,920 --> 00:01:22,688
<font color="#9e9e9e">Security or infosec</font>

21
00:01:23,456 --> 00:01:23,968
<font color="#f3f3f3">Properly</font>

22
00:01:26,528 --> 00:01:27,040
<font color="#fcfcfc">Is</font>

23
00:01:27,552 --> 00:01:30,112
<font color="#c8c8c8">Actually Beyond sweets extremely similar to infosec</font>

24
00:01:30,624 --> 00:01:32,160
<font color="#f9f9f9">So similar that it's</font>

25
00:01:32,416 --> 00:01:33,952
<font color="#e9e9e9">That's actually kind of a nuance</font>

26
00:01:36,000 --> 00:01:37,792
<font color="#f5f5f5">When I was looking this up</font>

27
00:01:38,816 --> 00:01:41,120
<font color="#c0c0c0">Do the same thing what is it that differentiates</font>

28
00:01:41,376 --> 00:01:43,680
<font color="#fcfcfc">These two things and that's the key that's the thing</font>
29
00:01:43,936 --> 00:01:45,472
<font color="#c3c3c3">The big takeaway you need to take</font>

30
00:01:45,728 --> 00:01:47,520
<font color="#fcfcfc">From this episode</font>

31
00:01:47,776 --> 00:01:51,104
<font color="#c1c1c1">Which is the difference list for the similarity so you get
the idea okay</font>

32
00:01:52,384 --> 00:01:54,432
<font color="#eeeeee">They are concerned with things like risk assessment</font>

33
00:01:55,200 --> 00:01:56,480
<font color="#dfdfdf">I'm trying to figure out what are the risks</font>

34
00:01:56,736 --> 00:01:58,016
<font color="#c0c0c0">To our companies or systems</font>

35
00:01:58,272 --> 00:01:59,296
<font color="#eeeeee">Organization</font>

36
00:01:59,808 --> 00:02:01,344
<font color="#f8f8f8">And you know someone so far</font>

37
00:02:01,856 --> 00:02:03,392
<font color="#f2f2f2">Security policy developer</font>

38
00:02:03,904 --> 00:02:05,952
<font color="#ececec">We have to develop okay now we know the risks are</font>

39
00:02:06,208 --> 00:02:09,024
<font color="#bebebe">What's developer policy to try to help ourselves</font>

40
00:02:09,280 --> 00:02:10,816
<font color="#fafafa">Stay away from those things are or</font>

41
00:02:11,072 --> 00:02:12,096
<font color="#dbdbdb">Divert them away</font>

42
00:02:12,608 --> 00:02:15,936
<font color="#e4e4e4">Then it is also is concerned with implementation of</font>

43
00:02:16,192 --> 00:02:17,728
<font color="#fcfcfc">Security controls</font>

44
00:02:17,984 --> 00:02:19,776
<font color="#e4e4e4">Security controls are anything that we implement</font>

45
00:02:20,288 --> 00:02:22,592
<font color="#d7d7d7">To that that increases the security of our</font>

46
00:02:23,872 --> 00:02:25,152
<font color="#b8b8b8">That's really easy</font>

47
00:02:26,688 --> 00:02:28,224
<font color="#d7d7d7">I use these terms security</font>

48
00:02:29,248 --> 00:02:30,528
<font color="#f4f4f4">Makes everybody who has a</font>

49
00:02:30,784 --> 00:02:31,552
<font color="#c3c3c3">The PHD sound</font>

50
00:02:33,088 --> 00:02:35,136
<font color="#f7f7f7">Really that's what it boils down to is just the</font>

51
00:02:35,904 --> 00:02:36,416
<font color="#fcfcfc">Security measures</font>

52
00:02:39,232 --> 00:02:43,840
<font color="#d8d8d8">So what are some of the differences Dave right now we got to
move the difference now we see how they're the similar</font>

53
00:02:44,352 --> 00:02:48,448
<font color="#ececec">What makes them one of those nuances that really sets one
apart from the other</font>

54
00:02:48,704 --> 00:02:50,752
<font color="#d4d4d4">Let's start off with</font>

55
00:02:53,568 --> 00:02:56,640
<font color="#fcfcfc">On the risk assessment side and mitigation</font>

56
00:02:57,408 --> 00:03:00,736
<font color="#cbcbcb">Then infosecurity.</font>

57
00:03:00,992 --> 00:03:04,832
<font color="#ececec">Is more concerned with the implementation of security
controls actual</font>

58
00:03:06,624 --> 00:03:08,160
<font color="#eeeeee">Okay well they both do that</font>

59
00:03:08,928 --> 00:03:12,000
<font color="#fcfcfc">One is more focused on one thing or the other</font>

60
00:03:12,256 --> 00:03:14,048
<font color="#cacaca">Okay so I is focus more on</font>

61
00:03:14,304 --> 00:03:15,328
<font color="#fcfcfc">The risk assessment</font>

62
00:03:15,840 --> 00:03:16,864
<font color="#f4f4f4">Mitigation side of things</font>

63
00:03:17,120 --> 00:03:18,144
<font color="#f4f4f4">Infosec</font>

64
00:03:19,424 --> 00:03:19,936
<font color="#a4a4a4">InFocus</font>

65
00:03:20,192 --> 00:03:21,728
<font color="#f8f8f8">On actually implementing</font>

66
00:03:24,288 --> 00:03:24,800
<font color="#dfdfdf">System</font>

67
00:03:25,056 --> 00:03:26,592
<font color="#fcfcfc">Let's see here also</font>

68
00:03:26,848 --> 00:03:30,176
<font color="#c4c4c4">Because I ate heavily influences a Security Management
program</font>

69
00:03:30,432 --> 00:03:33,248
<font color="#efefef">Because of its being very risk assessment Orient</font>

70
00:03:33,760 --> 00:03:36,064
<font color="#fcfcfc">Myself once we start to develop</font>

71
00:03:36,320 --> 00:03:37,088
<font color="#eaeaea">Our security manager</font>
72
00:03:37,344 --> 00:03:37,856
<font color="#fcfcfc">Program</font>

73
00:03:38,368 --> 00:03:39,392
<font color="#d5d5d5">And how that's going to look</font>

74
00:03:39,648 --> 00:03:43,488
<font color="#fcfcfc">And this is the overarching framework of which will be the
guideline</font>

75
00:03:43,744 --> 00:03:45,280
<font color="#b5b5b5">How we Implement security</font>

76
00:03:47,584 --> 00:03:48,864
<font color="#f2f2f2">Or what have you</font>

77
00:03:49,120 --> 00:03:50,144
<font color="#f3f3f3">Inside of our system</font>

78
00:03:50,656 --> 00:03:52,704
<font color="#e7e7e7">I am so this is going to be our guiding star</font>

79
00:03:52,960 --> 00:03:57,312
<font color="#f7f7f7">Keep us on the straight and narrow to follow the objectives
that we've deemed worthy because</font>

80
00:03:57,568 --> 00:03:58,080
<font color="#e4e4e4">Other risks</font>

81
00:03:58,592 --> 00:03:59,104
<font color="#d9d9d9">That we found</font>

82
00:04:01,920 --> 00:04:05,248
<font color="#f3f3f3">Let's see here in this will Encompass things like
compliance</font>

83
00:04:05,504 --> 00:04:07,296
<font color="#979797">End-user security awareness</font>

84
00:04:07,552 --> 00:04:09,600
<font color="#fcfcfc">Security policies</font>

85
00:04:10,112 --> 00:04:14,464
<font color="#c2c2c2">For saying in general I also bcdr business continuity and
disaster recovery</font>

86
00:04:14,720 --> 00:04:17,791
<font color="#fcfcfc">All these things will be a part of our Security Management
program</font>

87
00:04:18,559 --> 00:04:24,703
<font color="#c2c2c2">Now I have done this for us I found an example of a current
mostly current Security Management framework</font>

88
00:04:24,959 --> 00:04:27,263
<font color="#fcfcfc">That's been developed by the Australian government</font>

89
00:04:27,519 --> 00:04:30,847
<font color="#f3f3f3">Like I'm going to look up and see if I can find a good
example one pop right away</font>

90
00:04:31,103 --> 00:04:35,967
<font color="#878787">And we got it right here we can take a look at it in just to
see what they have done so here it is the ismf</font>

91
00:04:36,479 --> 00:04:38,271
<font color="#fcfcfc">Information Security Management framework</font>

92
00:04:38,783 --> 00:04:40,063
<font color="#e2e2e2">The government framework on Severus</font>

93
00:04:40,319 --> 00:04:41,599
<font color="#fcfcfc">Security for the government of South</font>

94
00:04:43,135 --> 00:04:47,231
<font color="#ebebeb">So and then don't worry that this is like this isn't part of
the exam I just wanted to give you guys</font>

95
00:04:47,743 --> 00:04:49,279
<font color="#d7d7d7">A good example that you can fall</font>

96
00:04:49,535 --> 00:04:51,071
<font color="#dcdcdc">Link to this in the show notes</font>

97
00:04:51,327 --> 00:04:54,143
<font color="#e3e3e3">Follow along and approves this document your Ledger</font>

98
00:04:54,399 --> 00:04:55,423
<font color="#e6e6e6">Start to see</font>
99
00:04:55,935 --> 00:05:02,079
<font color="#bdbdbd">What's going on here first aid coming to find the coverage
here south Australian public authorities required to adhere to this Frame</font>

100
00:05:02,847 --> 00:05:04,383
<font color="#bfbfbf">ISO becomes a regulatory</font>

101
00:05:05,151 --> 00:05:08,479
<font color="#919191">In the framework of the policies and standards contained
herein are intended for use by</font>

102
00:05:10,783 --> 00:05:12,319
<font color="#ededed">If you move on you start seeing</font>

103
00:05:13,087 --> 00:05:13,599
<font color="#e3e3e3">Terminology</font>

104
00:05:13,855 --> 00:05:17,439
<font color="#b3b3b3">Convention so if you see the words must must not show it
should not or May</font>

105
00:05:17,695 --> 00:05:19,743
<font color="#e5e5e5">Define for you so they're not ambiguous</font>

106
00:05:19,999 --> 00:05:21,279
<font color="#dfdfdf">You don't have any room to move</font>

107
00:05:21,791 --> 00:05:23,583
<font color="#eeeeee">If they say you should not do this</font>

108
00:05:23,839 --> 00:05:28,191
<font color="#c8c8c8">And you do it once in awhile you are doing it and it doesn't
count right</font>

109
00:05:28,447 --> 00:05:31,263
<font color="#fcfcfc">So should not not recommended</font>

110
00:05:31,519 --> 00:05:36,639
<font color="#bbbbbb">Not recommended means that there may exist valid reasons in
particular circumstances</font>

111
00:05:36,895 --> 00:05:38,687
<font color="#f1f1f1">What's behavior is acceptable or even useful</font>

112
00:05:39,455 --> 00:05:39,967
<font color="#aeaeae">But</font>

113
00:05:41,247 --> 00:05:43,039
<font color="#adadad">Implement implications</font>

114
00:05:43,295 --> 00:05:44,575
<font color="#fcfcfc">Should be understood</font>

115
00:05:44,831 --> 00:05:46,623
<font color="#efefef">And the case carefully weighed before Apple</font>

116
00:05:47,391 --> 00:05:47,903
<font color="#f1f1f1">Behave yourself</font>

117
00:05:48,927 --> 00:05:49,695
<font color="#fcfcfc">Approval before</font>

118
00:05:51,487 --> 00:05:55,583
<font color="#bababa">So that kind of stuff what's we want to hear this is always
nice when I give you a table console. See what's going on</font>

119
00:05:56,095 --> 00:05:57,375
<font color="#fcfcfc">High-level View</font>

120
00:05:57,887 --> 00:06:00,191
<font color="#f1f1f1">Terms and definitions the scope of the icmf</font>

121
00:06:00,703 --> 00:06:04,287
<font color="#d1d1d1">Accountability and information security management agencies
nomenclature more</font>

122
00:06:05,567 --> 00:06:06,079
<font color="#cbcbcb">Creekland first</font>

123
00:06:06,591 --> 00:06:07,359
<font color="#fcfcfc">Requirements</font>

124
00:06:07,615 --> 00:06:09,407
<font color="#fcfcfc">Executive overview introduction</font>

125
00:06:09,663 --> 00:06:11,199
<font color="#f6f6f6">And then getting into the risk</font>

126
00:06:12,991 --> 00:06:14,783
<font color="#cacaca">Ears are actual security policy on</font>
127
00:06:15,295 --> 00:06:15,807
<font color="#d0d0d0">41</font>

128
00:06:16,063 --> 00:06:17,343
<font color="#9b9b9b">And is that a clickable link</font>

129
00:06:17,855 --> 00:06:18,367
<font color="#656565">It is</font>

130
00:06:18,623 --> 00:06:19,135
<font color="#dadada">Gotta love that</font>

131
00:06:20,415 --> 00:06:22,975
<font color="#eeeeee">Here's where it really the metal meets the meats</font>

132
00:06:23,231 --> 00:06:26,047
<font color="#e6e6e6">Each agency must establish and maintain an information</font>

133
00:06:26,303 --> 00:06:27,839
<font color="#c3c3c3">Security policy will we know that</font>

134
00:06:28,095 --> 00:06:30,143
<font color="#999999">I want to know what you want us to do</font>

135
00:06:30,655 --> 00:06:33,983
<font color="#dcdcdc">Are we go policy should have a minimum incorporate the
implementation guidance</font>

136
00:06:34,239 --> 00:06:35,519
<font color="#efefef">I love when they reference other guy</font>

137
00:06:35,775 --> 00:06:37,055
<font color="#d5d5d5">Material culture</font>

138
00:06:37,567 --> 00:06:38,335
<font color="#cacaca">That will go read that if you</font>

139
00:06:38,591 --> 00:06:39,103
<font color="#e3e3e3">You want to know what's up</font>

140
00:06:39,615 --> 00:06:42,431
<font color="#f7f7f7">So you will find that a lot of times if you are looking up
other</font>
141
00:06:42,687 --> 00:06:43,967
<font color="#e1e1e1">A-frame or should not building one from</font>

142
00:06:45,503 --> 00:06:47,807
<font color="#d9d9d9">Bill will probably be looking at other</font>

143
00:06:50,879 --> 00:06:52,415
<font color="#f1f1f1">You may not reference them but you might</font>

144
00:06:52,671 --> 00:06:54,719
<font color="#fcfcfc">Using them as a reference to build your own</font>

145
00:06:54,975 --> 00:06:55,743
<font color="#e4e4e4">If you are starting from</font>

146
00:06:55,999 --> 00:07:02,143
<font color="#9e9e9e">The ground-up give you this so you can take a look at it it
is quite extensive this says that it's what is it</font>

147
00:07:03,167 --> 00:07:05,215
<font color="#dfdfdf">226 pages long</font>

148
00:07:05,471 --> 00:07:11,615
<font color="#c5c5c5">So in typical governmental form at this will take you a
minute it's probably full of red tape bureaucracy</font>

149
00:07:14,431 --> 00:07:18,783
<font color="#e9e9e9">If you do work your way through good for you you will
understand and have a practical idea</font>

150
00:07:19,039 --> 00:07:20,319
<font color="#dfdfdf">What these things look like</font>

151
00:07:20,575 --> 00:07:21,855
<font color="#fcfcfc">It's not the only game in town</font>

152
00:07:22,367 --> 00:07:23,391
<font color="#d1d1d1">Well if you don't like this</font>

153
00:07:23,647 --> 00:07:24,159
<font color="#eeeeee">That's totally fine</font>

154
00:07:25,695 --> 00:07:26,463
<font color="#cecece">Again</font>
155
00:07:27,231 --> 00:07:27,743
<font color="#fcfcfc">Look at</font>

156
00:07:28,255 --> 00:07:30,559
<font color="#efefef">Practical reference for that security man</font>

157
00:07:31,327 --> 00:07:37,471
<font color="#d1d1d1">Focuses more on technical control implementation is that
right that's what I was saying earlier right</font>

158
00:07:37,727 --> 00:07:39,519
<font color="#e5e5e5">That just means they're getting your hands dirty kind
of</font>

159
00:07:39,775 --> 00:07:45,919
<font color="#b1b1b1">They're the ones that so infosec versus IA is going to
actually come in they're going to say okay well</font>

160
00:07:46,175 --> 00:07:49,503
<font color="#d9d9d9">The Security Management program tells us we have to have a
password policy</font>

161
00:07:49,759 --> 00:07:51,295
<font color="#f6f6f6">And it contains these attributes</font>

162
00:07:52,063 --> 00:07:54,111
<font color="#e1e1e1">Passwords must be at least 12 characters long enough</font>

163
00:07:56,927 --> 00:07:57,439
<font color="#eeeeee">So</font>

164
00:07:57,695 --> 00:07:58,975
<font color="#f8f8f8">Infosec those are the</font>

165
00:07:59,231 --> 00:08:01,791
<font color="#e6e6e6">Guys and girls are actually implementing the</font>

166
00:08:02,815 --> 00:08:05,119
<font color="#fcfcfc">They're going into the server software</font>

167
00:08:05,375 --> 00:08:07,935
<font color="#fcfcfc">And configuring that to be the case</font>

168
00:08:08,959 --> 00:08:10,495
<font color="#bbbbbb">A2B comply with password policy</font>
169
00:08:13,311 --> 00:08:17,151
<font color="#fcfcfc">So that's the real difference hopefully I've made that
abundantly clear at this point</font>

170
00:08:17,407 --> 00:08:22,783
<font color="#e6e6e6">Between Ina and infosec giving you a really good way to find
andymark</font>

171
00:08:23,039 --> 00:08:24,063
<font color="#fcfcfc">Out who is who</font>

172
00:08:24,319 --> 00:08:24,831
<font color="#fcfcfc">In the game</font>

173
00:08:26,879 --> 00:08:30,975
<font color="#f8f8f8">So that's about all I have is far as information assurance
and infosec</font>

174
00:08:31,231 --> 00:08:32,511
<font color="#f6f6f6">As far as definitional terms</font>

175
00:08:32,767 --> 00:08:33,535
<font color="#c4c4c4">Helping you understand</font>

176
00:08:34,047 --> 00:08:34,815
<font color="#cecece">Between the two</font>

177
00:08:35,071 --> 00:08:35,583
<font color="#efefef">And August</font>

178
00:08:36,607 --> 00:08:38,655
<font color="#d2d2d2">Network segmentation dough Zone</font>

179
00:08:38,911 --> 00:08:45,055
<font color="#b5b5b5">What what exactly is that about security control is very
common one this is just the idea that we</font>

180
00:08:45,311 --> 00:08:47,359
<font color="#c1c1c1">Reset Mentor Network in our networks out</font>

181
00:08:47,871 --> 00:08:48,639
<font color="#eeeeee">Into</font>

182
00:08:48,895 --> 00:08:52,479
<font color="#aaaaaa">Pipes and I say types I mean maybe by roll</font>

183
00:08:52,735 --> 00:08:54,015
<font color="#dcdcdc">Or</font>

184
00:08:55,039 --> 00:08:59,647
<font color="#d6d6d6">What else could I say basically I want to say danger
zones</font>

185
00:08:59,903 --> 00:09:01,695
<font color="#a3a3a3">Rise and I guess that's a good way to put it</font>

186
00:09:01,951 --> 00:09:03,231
<font color="#eeeeee">Where I have</font>

187
00:09:03,743 --> 00:09:04,511
<font color="#f3f3f3">Like my DMZ</font>

188
00:09:04,767 --> 00:09:09,119
<font color="#c6c6c6">Hey my DMZ is expected to be in a bit of a higher danger
zone</font>

189
00:09:09,375 --> 00:09:10,911
<font color="#fcfcfc">Then my production server</font>

190
00:09:12,191 --> 00:09:15,519
<font color="#fcfcfc">So I don't want those things together I don't want them on
the same network</font>

191
00:09:15,775 --> 00:09:17,311
<font color="#d0d0d0">Because I don't want the traffic</font>

192
00:09:17,567 --> 00:09:18,591
<font color="#e9e9e9">Death comes from</font>

193
00:09:18,847 --> 00:09:20,383
<font color="#bdbdbd">Untrusted zones like the internet</font>

194
00:09:20,895 --> 00:09:23,711
<font color="#c7c7c7">To be able to access her be on the same network</font>

195
00:09:24,223 --> 00:09:24,735
<font color="#fcfcfc">As</font>

196
00:09:24,991 --> 00:09:29,855
<font color="#bdbdbd">Secure service things that are sent in DMZ is demilitarized
zone</font>

197
00:09:30,111 --> 00:09:33,183
<font color="#a0a0a0">So DMZ hopefully you guys are aware of what a DMZ is it
is</font>

198
00:09:34,207 --> 00:09:34,975
<font color="#f4f4f4">If you're not</font>

199
00:09:35,487 --> 00:09:35,999
<font color="#afafaf">Probably read</font>

200
00:09:36,255 --> 00:09:42,143
<font color="#dbdbdb">I just said that to my grandpa and grandma</font>

201
00:09:42,399 --> 00:09:45,215
<font color="#c6c6c6">Put on her you can do it grandma</font>

202
00:09:46,495 --> 00:09:52,639
<font color="#c7c7c7">But that's that's what's up so we segment our networks out
and this isn't anything uncommon I mean I don't want</font>

203
00:09:52,895 --> 00:09:55,199
<font color="#cacaca">1hr traffic to be on sales traffic either</font>

204
00:09:55,711 --> 00:09:57,247
<font color="#f1f1f1">There's no purpose in it.</font>

205
00:09:57,759 --> 00:10:02,367
<font color="#aeaeae">I I do need to make a way for them to be able to talk to each
other and we do that but for the most part they're</font>

206
00:10:02,623 --> 00:10:03,903
<font color="#e3e3e3">Broadcast traffic or</font>

207
00:10:04,159 --> 00:10:05,439
<font color="#b2b2b2">Their Collision domains</font>

208
00:10:05,695 --> 00:10:07,487
<font color="#b5b5b5">It's separated out because they're unnecessary</font>

209
00:10:07,743 --> 00:10:08,767
<font color="#e1e1e1">I don't need ARP sitting</font>

210
00:10:09,279 --> 00:10:10,559
<font color="#b7b7b7">Over here and in going on go</font>

211
00:10:10,815 --> 00:10:12,351
<font color="#cfcfcf">So we just use things like lands</font>

212
00:10:12,863 --> 00:10:15,679
<font color="#ababab">These firewalls and use firewall rules</font>

213
00:10:16,191 --> 00:10:17,471
<font color="#fcfcfc">To implement segmentation</font>

214
00:10:17,727 --> 00:10:23,359
<font color="#e7e7e7">You can use both could use a router to do it as well and I
use a combination of all three and start creating these different</font>

215
00:10:23,615 --> 00:10:24,127
<font color="#9d9d9d">Network zones</font>

216
00:10:24,383 --> 00:10:29,247
<font color="#d2d2d2">I'll give you a couple of examples like uncontrolled zones
would be something like the internet</font>

217
00:10:29,503 --> 00:10:31,551
<font color="#c9c9c9">Then you have your DMZ where you have</font>

218
00:10:32,063 --> 00:10:33,855
<font color="#fcfcfc">Devices that need access</font>

219
00:10:34,111 --> 00:10:35,135
<font color="#9c9c9c">To internal</font>

220
00:10:35,391 --> 00:10:36,159
<font color="#fcfcfc">Resources</font>

221
00:10:36,415 --> 00:10:38,207
<font color="#fcfcfc">As well as be accessible from</font>

222
00:10:38,719 --> 00:10:40,511
<font color="#dedede">External untrusted zones</font>

223
00:10:40,767 --> 00:10:45,375
<font color="#a7a7a7">Rights over your DMZ administrative zones would also be
something you probably want to build</font>

224
00:10:45,631 --> 00:10:49,215
<font color="#e6e6e6">You take your administrators their administrative
workstations</font>

225
00:10:49,471 --> 00:10:51,263
<font color="#fcfcfc">And you will put them in that admit</font>

226
00:10:51,775 --> 00:10:52,287
<font color="#fcfcfc">Zone</font>

227
00:10:52,543 --> 00:10:53,311
<font color="#fcfcfc">If you have jump boxes</font>

228
00:10:53,567 --> 00:10:54,847
<font color="#d3d3d3">Their sauce things of that nature</font>

229
00:10:55,359 --> 00:10:56,127
<font color="#dbdbdb">It's a great place to put</font>

230
00:10:57,407 --> 00:10:58,431
<font color="#fcfcfc">Standard</font>

231
00:10:58,687 --> 00:10:59,455
<font color="#afafaf">Zone soap</font>

232
00:10:59,711 --> 00:11:02,527
<font color="#bfbfbf">Where you put your every average everyday production
user</font>

233
00:11:03,039 --> 00:11:03,807
<font color="#d9d9d9">And their energy</font>

234
00:11:04,063 --> 00:11:07,903
<font color="#c4c4c4">You're fine if some access to the internet but they still are
firewalled often somewhere shapes</font>

235
00:11:08,159 --> 00:11:10,975
<font color="#c0c0c0">Where is your your administrative zones probably going to be
much more can</font>

236
00:11:19,167 --> 00:11:22,239
<font color="#c0c0c0">And I just kind of give you an idea networks on here we
go</font>

237
00:11:22,751 --> 00:11:24,799
<font color="#bbbbbb">Of what this would look like diagram.</font>
238
00:11:25,311 --> 00:11:31,455
<font color="#f0f0f0">So here we have our different networking devices I got a ride
or switching out a firewall your untrusted Zone which would be</font>

239
00:11:31,711 --> 00:11:37,599
<font color="#bdbdbd">Be the internet's and over here I've even gone as far as to
label the zones for East once I've got corporate</font>

240
00:11:37,855 --> 00:11:39,903
<font color="#f7f7f7">Desktop users and I just called his own user</font>

241
00:11:41,183 --> 00:11:44,511
<font color="#cbcbcb">Over here at the sysadmins I'll call this Zone
sysadmin</font>

242
00:11:44,767 --> 00:11:45,535
<font color="#fcfcfc">And servers</font>

243
00:11:47,071 --> 00:11:51,423
<font color="#fcfcfc">So each one of them will have their own capabilities of
network connectivity</font>

244
00:11:51,679 --> 00:11:53,471
<font color="#ececec">On who they can and cannot talk to</font>

245
00:11:53,983 --> 00:11:55,007
<font color="#fcfcfc">For security reasons</font>

246
00:11:56,287 --> 00:11:58,079
<font color="#fcfcfc">It's all about remember this is all about security</font>

247
00:11:58,847 --> 00:12:00,639
<font color="#fcfcfc">How do I keep my networks</font>

248
00:12:00,895 --> 00:12:01,919
<font color="#a7a7a7">How do I keep my end-user</font>

249
00:12:02,943 --> 00:12:03,967
<font color="#c5c5c5">My device is secure</font>

250
00:12:04,223 --> 00:12:07,295
<font color="#fcfcfc">This is definitely something that if you're not already
doing</font>

251
00:12:07,551 --> 00:12:09,599
<font color="#f7f7f7">I highly recommended</font>

252
00:12:09,855 --> 00:12:11,647
<font color="#cbcbcb">Because he's very very helpful in this</font>

253
00:12:11,903 --> 00:12:13,695
<font color="#f8f8f8">Security of your system self</font>

254
00:12:13,951 --> 00:12:17,279
<font color="#d2d2d2">Get in there and start creating vlans use a firewall
to</font>

255
00:12:17,535 --> 00:12:19,839
<font color="#fcfcfc">Control who can and cannot pass through what</font>

256
00:12:20,607 --> 00:12:21,375
<font color="#e2e2e2">Use router as well as</font>

257
00:12:27,263 --> 00:12:33,407
<font color="#d1d1d1">Definitely want to take a look at security</font>

258
00:12:35,455 --> 00:12:38,527
<font color="#ebebeb">Where am I at A- oh yes what are the goals of security
policy</font>

259
00:12:38,783 --> 00:12:40,319
<font color="#b4b4b4">That's things we need to know right</font>

260
00:12:40,575 --> 00:12:42,623
<font color="#fcfcfc">What else do we need to know about this</font>

261
00:12:42,879 --> 00:12:46,207
<font color="#cccccc">Exile give me some examples animal look at security</font>

262
00:12:47,487 --> 00:12:52,351
<font color="#d8d8d8">The flow that I want to go through what is the goal</font>

263
00:12:52,607 --> 00:12:54,399
<font color="#fcfcfc">Of a security policy</font>

264
00:12:54,911 --> 00:12:56,447
<font color="#efefef">I remember a security policy</font>

265
00:12:56,959 --> 00:12:58,751
<font color="#fcfcfc">Is a formalized</font>

266
00:13:01,055 --> 00:13:02,591
<font color="#cecece">Not Justa everybody knows</font>

267
00:13:04,895 --> 00:13:06,431
<font color="#e6e6e6">You want to write these things down</font>

268
00:13:06,687 --> 00:13:07,967
<font color="#dfdfdf">Management is involved</font>

269
00:13:08,223 --> 00:13:10,271
<font color="#fbfbfb">HR disseminates all that other good stuff right</font>

270
00:13:11,039 --> 00:13:13,343
<font color="#f6f6f6">It is that formalized</font>

271
00:13:15,647 --> 00:13:16,927
<font color="#c6c6c6">That comes down from on high</font>

272
00:13:17,439 --> 00:13:19,487
<font color="#fcfcfc">And tells you what you can and cannot do</font>

273
00:13:20,255 --> 00:13:20,767
<font color="#fcfcfc">As far as</font>

274
00:13:24,351 --> 00:13:24,863
<font color="#eeeeee">So</font>

275
00:13:25,119 --> 00:13:27,167
<font color="#bebebe">This is to maintain</font>

276
00:13:27,423 --> 00:13:28,959
<font color="#eeeeee">CIA confidentiality</font>

277
00:13:29,727 --> 00:13:30,495
<font color="#b4b4b4">An availability</font>

278
00:13:31,007 --> 00:13:32,287
<font color="#fcfcfc">Without those three things</font>

279
00:13:33,311 --> 00:13:34,335
<font color="#e8e8e8">You're not going to do well as an</font>

280
00:13:35,359 --> 00:13:37,407
<font color="#fcfcfc">And you want to safeguard</font>

281
00:13:39,199 --> 00:13:41,759
<font color="#d1d1d1">We also want to reduce again this is at these are the
goals</font>

282
00:13:42,015 --> 00:13:45,343
<font color="#f7f7f7">To maintain CIA we want to reduce</font>

283
00:13:47,647 --> 00:13:48,415
<font color="#8b8b8b">Resource</font>

284
00:13:49,439 --> 00:13:50,463
<font color="#bfbfbf">That's always a good thing</font>

285
00:13:50,719 --> 00:13:56,095
<font color="#e3e3e3">So it's kind of like that loss prevention guy</font>

286
00:13:56,351 --> 00:13:58,399
<font color="#eaeaea">He's picking up Fritos and out</font>

287
00:13:59,167 --> 00:14:05,055
<font color="#f7f7f7">Members only jacket</font>

288
00:14:05,311 --> 00:14:07,871
<font color="#e7e7e7">Nevada guys away from our data we're trying to keep</font>

289
00:14:08,127 --> 00:14:10,687
<font color="#cecece">Resources from being lost or stolen</font>

290
00:14:10,943 --> 00:14:12,991
<font color="#f8f8f8">That's that's what we're looking at here so</font>

291
00:14:13,503 --> 00:14:14,271
<font color="#cfcfcf">Waste</font>

292
00:14:14,783 --> 00:14:15,551
<font color="#959595">Los</font>

293
00:14:15,807 --> 00:14:18,367
<font color="#fcfcfc">Destruction or even modification</font>

294
00:14:18,623 --> 00:14:19,391
<font color="#f3f3f3">Because that is a</font>
295
00:14:19,647 --> 00:14:20,927
<font color="#fcfcfc">As a form of the</font>

296
00:14:22,463 --> 00:14:25,535
<font color="#fcfcfc">So that is what we're trying to reduce or prevent</font>

297
00:14:25,791 --> 00:14:26,815
<font color="#d2d2d2">We want to lower</font>

298
00:14:27,071 --> 00:14:28,095
<font color="#fcfcfc">The overall risk</font>

299
00:14:28,607 --> 00:14:29,631
<font color="#f9f9f9">To our organization</font>

300
00:14:30,143 --> 00:14:30,911
<font color="#fcfcfc">That's our goal</font>

301
00:14:31,679 --> 00:14:34,751
<font color="#d9d9d9">Liability of employees and third-party is also
something</font>

302
00:14:36,031 --> 00:14:36,799
<font color="#dadada">As a goal</font>

303
00:14:37,055 --> 00:14:37,823
<font color="#e2e2e2">Or are secure</font>

304
00:14:38,079 --> 00:14:38,591
<font color="#fcfcfc">Security policy</font>

305
00:14:38,847 --> 00:14:39,359
<font color="#eeeeee">So</font>

306
00:14:40,127 --> 00:14:40,895
<font color="#f7f7f7">I have</font>

307
00:14:41,151 --> 00:14:42,943
<font color="#bfbfbf">Maybe Phi right private healthcare</font>

308
00:14:44,479 --> 00:14:46,271
<font color="#e1e1e1">I don't want to let packet out</font>

309
00:14:50,367 --> 00:14:50,879
<font color="#fcfcfc">For that</font>

310
00:14:51,135 --> 00:14:52,671
<font color="#fcfcfc">We would have to face the man</font>

311
00:14:53,439 --> 00:14:55,231
<font color="#fcfcfc">For doing that and sanction</font>

312
00:14:55,999 --> 00:14:56,767
<font color="#ededed">Maybe fines</font>

313
00:14:57,279 --> 00:14:58,815
<font color="#b9b9b9">Who knows even worse</font>

314
00:14:59,071 --> 00:15:01,375
<font color="#a7a7a7">Depends on what type of business you're in or what</font>

315
00:15:02,911 --> 00:15:04,703
<font color="#e9e9e9">So that is also the goal of us</font>

316
00:15:04,959 --> 00:15:05,471
<font color="#fcfcfc">Security policy</font>

317
00:15:05,727 --> 00:15:07,775
<font color="#f4f4f4">Keep us out of hot water legally</font>

318
00:15:08,799 --> 00:15:10,335
<font color="#bcbcbc">So we don't get tan today</font>

319
00:15:10,591 --> 00:15:14,943
<font color="#aeaeae">Thompson would be a good day at the beach</font>

320
00:15:15,199 --> 00:15:20,831
<font color="#cacaca">Getting slapped with a couple of bracelets that would be the
worst-case scenario</font>

321
00:15:21,343 --> 00:15:25,183
<font color="#e6e6e6">What else do we need to do all Define access rights
for</font>

322
00:15:25,439 --> 00:15:26,463
<font color="#d7d7d7">Our users at Large</font>

323
00:15:27,231 --> 00:15:29,791
<font color="#cecece">That's what I would be another great goal of your
secure</font>

324
00:15:31,583 --> 00:15:33,887
<font color="#fafafa">So if our security policy</font>

325
00:15:34,143 --> 00:15:35,423
<font color="#fcfcfc">Does not say</font>

326
00:15:35,679 --> 00:15:37,727
<font color="#fcfcfc">That I can't look at HR records</font>

327
00:15:38,495 --> 00:15:40,543
<font color="#bcbcbc">And who's to say it was wrong for me to do it</font>

328
00:15:41,311 --> 00:15:44,127
<font color="#fafafa">So we need to make sure that we go in and Define what</font>

329
00:15:44,383 --> 00:15:47,711
<font color="#dadada">Resources are available and who they are and are not
available to</font>

330
00:15:48,479 --> 00:15:50,015
<font color="#a2a2a2">Thanks so very important part</font>

331
00:15:50,527 --> 00:15:51,551
<font color="#eaeaea">A building out that's</font>

332
00:15:53,855 --> 00:15:56,159
<font color="#fcfcfc">Let's talk about some examples of normal security</font>

333
00:15:56,415 --> 00:15:57,951
<font color="#f9f9f9">She said she would probably encounter</font>

334
00:15:58,463 --> 00:15:58,975
<font color="#bababa">Enter average</font>

335
00:16:00,767 --> 00:16:01,535
<font color="#dedede">One we've already mentioned</font>

336
00:16:01,791 --> 00:16:02,303
<font color="#cdcdcd">Pastor Paul</font>

337
00:16:02,559 --> 00:16:04,351
<font color="#f7f7f7">That is a security policy</font>
338
00:16:05,119 --> 00:16:06,143
<font color="#fcfcfc">It tells you</font>

339
00:16:07,423 --> 00:16:09,215
<font color="#fcfcfc">Your password is meant to be</font>

340
00:16:09,727 --> 00:16:12,799
<font color="#e4e4e4">You somehow is meant to be created</font>

341
00:16:14,335 --> 00:16:14,847
<font color="#919191">Right</font>

342
00:16:15,103 --> 00:16:16,383
<font color="#d5d5d5">How long can I keep the space</font>

343
00:16:17,151 --> 00:16:18,943
<font color="#dedede">How long is my password have to be</font>

344
00:16:19,199 --> 00:16:22,271
<font color="#fbfbfb">How long before I can reuse an old password what's the
password history</font>

345
00:16:23,039 --> 00:16:27,135
<font color="#dddddd">All those wonderful things that wrap up and then your average
everyday password policy</font>

346
00:16:27,391 --> 00:16:28,671
<font color="#f3f3f3">Is a security control</font>

347
00:16:29,695 --> 00:16:30,463
<font color="#fcfcfc">To help</font>

348
00:16:31,743 --> 00:16:32,511
<font color="#c3c3c3">Out of trouble because</font>

349
00:16:32,767 --> 00:16:33,535
<font color="#ebebeb">If I make my path</font>

350
00:16:33,791 --> 00:16:34,559
<font color="#bababa">Easy to</font>

351
00:16:34,815 --> 00:16:35,327
<font color="#fcfcfc">Yes</font>
352
00:16:35,839 --> 00:16:37,119
<font color="#e7e7e7">Or Brute Force</font>

353
00:16:37,631 --> 00:16:38,143
<font color="#fcfcfc">Then</font>

354
00:16:38,655 --> 00:16:41,983
<font color="#ebebeb">I'm not really doing myself any favor I think it is
like</font>

355
00:16:42,751 --> 00:16:43,775
<font color="#dbdbdb">For wireless right</font>

356
00:16:44,287 --> 00:16:45,567
<font color="#fcfcfc">Really doesn't do a whole lot</font>

357
00:16:46,591 --> 00:16:47,871
<font color="#d9d9d9">Two protection of a wireless network</font>

358
00:16:48,639 --> 00:16:50,175
<font color="#f6f6f6">So that might be part of my</font>

359
00:16:50,431 --> 00:16:50,943
<font color="#fcfcfc">Security policy</font>

360
00:16:51,199 --> 00:16:52,223
<font color="#f1f1f1">Do not use wet</font>

361
00:16:52,479 --> 00:16:54,527
<font color="#bebebe">So here wireless security policy</font>

362
00:16:54,783 --> 00:16:57,087
<font color="#979797">Weapons not allowed you must use w p a w</font>

363
00:16:57,855 --> 00:17:01,439
<font color="#f0f0f0">Now we live in a world where wpa3 is out so maybe we need to
go and revised</font>

364
00:17:01,951 --> 00:17:02,975
<font color="#dedede">Our security policy on</font>

365
00:17:04,255 --> 00:17:05,791
<font color="#e8e8e8">So that could be a policy as well</font>

366
00:17:06,047 --> 00:17:08,095
<font color="#fcfcfc">Acceptable use policy again what</font>

367
00:17:08,351 --> 00:17:09,887
<font color="#f5f5f5">Can people access and what</font>

368
00:17:10,143 --> 00:17:10,655
<font color="#adadad">Can't they access</font>

369
00:17:10,911 --> 00:17:13,215
<font color="#fcfcfc">And who has the access if they can access it</font>

370
00:17:13,983 --> 00:17:17,311
<font color="#e5e5e5">So things like the internet coming to mind when you hear
acceptable</font>

371
00:17:18,591 --> 00:17:19,359
<font color="#fcfcfc">That is a</font>

372
00:17:19,615 --> 00:17:22,687
<font color="#dedede">Probably the first thing that has people's brains me</font>

373
00:17:22,943 --> 00:17:23,711
<font color="#f3f3f3">When you say those were</font>

374
00:17:23,967 --> 00:17:26,015
<font color="#fcfcfc">Wild Wild West that's right because</font>

375
00:17:26,271 --> 00:17:30,879
<font color="#fcfcfc">Internet is a wonderful resource and necessary for many of
our jobs if not all of them</font>

376
00:17:32,927 --> 00:17:33,439
<font color="#e3e3e3">Can</font>

377
00:17:33,951 --> 00:17:36,767
<font color="#bebebe">They have some darken CD places that you don't want your
user</font>

378
00:17:37,791 --> 00:17:39,071
<font color="#adadad">Maybe cuz you pick up malware</font>

379
00:17:39,327 --> 00:17:40,607
<font color="#c1c1c1">Right it's not a great place</font>

380
00:17:42,399 --> 00:17:44,447
<font color="#dadada">To be perusing cuz you don't want our and your systems</font>

381
00:17:44,959 --> 00:17:46,239
<font color="#fcfcfc">And it's just</font>

382
00:17:47,007 --> 00:17:47,775
<font color="#fcfcfc">In general</font>

383
00:17:48,031 --> 00:17:49,055
<font color="#868686">A taboo</font>

384
00:17:49,311 --> 00:17:51,615
<font color="#c5c5c5">Things that used to gambling monographie these things</font>

385
00:17:52,127 --> 00:17:54,687
<font color="#c0c0c0">While maybe that's fine behind closed doors</font>

386
00:17:58,783 --> 00:18:00,831
<font color="#f4f4f4">That is not the time and place for these things</font>

387
00:18:01,087 --> 00:18:04,159
<font color="#f3f3f3">So I need to tell you the acceptable use or your
computer</font>

388
00:18:04,671 --> 00:18:06,975
<font color="#bbbbbb">Just not yours it is ours is a company resource</font>

389
00:18:07,231 --> 00:18:08,255
<font color="#c9c9c9">We get the dick tape</font>

390
00:18:08,511 --> 00:18:10,559
<font color="#f6f6f6">What you can and cannot do with it we're saying</font>

391
00:18:10,815 --> 00:18:12,351
<font color="#fcfcfc">Do not engage in these activities</font>

392
00:18:12,863 --> 00:18:17,727
<font color="#d9d9d9">That is not acceptable you so you're going to be framing
things that you can do anything you can't do</font>

393
00:18:18,239 --> 00:18:18,751
<font color="#fcfcfc">Inside of that</font>

394
00:18:20,543 --> 00:18:24,639
<font color="#c8c8c8">All right what else we intimidate a retention</font>

395
00:18:25,407 --> 00:18:30,271
<font color="#c4c4c4">And and this does go back to legalities in a lot of ways
depending on the industry that you're into</font>

396
00:18:30,527 --> 00:18:32,831
<font color="#fcfcfc">You could be subpoenaed for data</font>

397
00:18:33,087 --> 00:18:34,111
<font color="#ececec">If you don't have a date or attend</font>

398
00:18:34,367 --> 00:18:34,879
<font color="#d2d2d2">Policy</font>

399
00:18:35,903 --> 00:18:36,671
<font color="#fcfcfc">They will expect you</font>

400
00:18:39,231 --> 00:18:39,743
<font color="#fcfcfc">So if</font>

401
00:18:39,999 --> 00:18:41,023
<font color="#fcfcfc">If you don't have it why don't you</font>

402
00:18:42,815 --> 00:18:43,327
<font color="#fafafa">We deleted it</font>

403
00:18:44,095 --> 00:18:45,887
<font color="#8d8d8d">Policy said that you should leave now</font>

404
00:18:46,399 --> 00:18:47,679
<font color="#fcfcfc">Well then you should have</font>

405
00:18:48,703 --> 00:18:52,287
<font color="#e3e3e3">You don't want to get in those water so you need to set a
date a retention policy</font>

406
00:18:52,543 --> 00:18:54,847
<font color="#c0c0c0">We keep archived data for three years</font>

407
00:18:55,359 --> 00:18:57,663
<font color="#b2b2b2">We keep financial data for 7 years</font>

408
00:18:58,175 --> 00:18:58,687
<font color="#fcfcfc">And</font>
409
00:18:59,455 --> 00:19:00,991
<font color="#e6e6e6">After that we will destroy</font>

410
00:19:01,759 --> 00:19:04,831
<font color="#d9d9d9">And we used these types of means for destruction of</font>

411
00:19:05,343 --> 00:19:06,111
<font color="#fcfcfc">Older than</font>

412
00:19:06,367 --> 00:19:06,879
<font color="#dddddd">Archived</font>

413
00:19:07,647 --> 00:19:10,719
<font color="#bdbdbd">I need to set all those things out that's what a Security
pay</font>

414
00:19:11,743 --> 00:19:14,047
<font color="#fcfcfc">You're going to be very fine detail</font>

415
00:19:14,303 --> 00:19:15,071
<font color="#fcfcfc">Control</font>

416
00:19:15,327 --> 00:19:17,631
<font color="#dddddd">About what you're putting in was far as a verb is
ghost</font>

417
00:19:18,911 --> 00:19:21,215
<font color="#dadada">Easily lie and say what a policy says</font>

418
00:19:21,471 --> 00:19:21,983
<font color="#fcfcfc">This</font>

419
00:19:22,495 --> 00:19:23,263
<font color="#fcfcfc">And that's what we</font>

420
00:19:24,031 --> 00:19:25,055
<font color="#dedede">That's so that's what we need</font>

421
00:19:25,823 --> 00:19:30,687
<font color="#cccccc">Access Control policies well yeah it's another great one that
comes up Access Control policies</font>

422
00:19:30,943 --> 00:19:34,015
<font color="#f2f2f2">Again what resources can someone access</font>
423
00:19:34,271 --> 00:19:35,551
<font color="#d8d8d8">Unnecessarily Maybe</font>

424
00:19:36,575 --> 00:19:37,855
<font color="#eaeaea">The files and folders in</font>

425
00:19:38,111 --> 00:19:39,647
<font color="#e0e0e0">I think that the actual data</font>

426
00:19:39,903 --> 00:19:42,719
<font color="#b9b9b9">But the thing that holds the date are you allowed to access
the server</font>

427
00:19:42,975 --> 00:19:45,023
<font color="#d9d9d9">Can't log into this server or can I not</font>

428
00:19:45,535 --> 00:19:47,071
<font color="#f8f8f8">Am I allowed to access the switch</font>

429
00:19:47,327 --> 00:19:48,351
<font color="#dedede">To the router and a firewall</font>

430
00:19:48,863 --> 00:19:50,143
<font color="#fcfcfc">Is that okay is that acceptable</font>

431
00:19:50,911 --> 00:19:51,679
<font color="#d6d6d6">I don't know well</font>

432
00:19:51,935 --> 00:19:53,983
<font color="#fbfbfb">This is where we want to put in an access policy</font>

433
00:19:55,519 --> 00:19:57,311
<font color="#f0f0f0">You can also be thinking of things like firewall rule</font>

434
00:19:58,591 --> 00:19:59,359
<font color="#656565">.</font>

435
00:19:59,615 --> 00:20:00,639
<font color="#fcfcfc">People from</font>

436
00:20:00,895 --> 00:20:03,711
<font color="#a0a0a0">Doing from one area of the network into another
because</font>
437
00:20:03,967 --> 00:20:05,759
<font color="#e8e8e8">The rules will dictate who cannock</font>

438
00:20:08,063 --> 00:20:09,343
<font color="#fcfcfc">But if you don't have them</font>

439
00:20:09,855 --> 00:20:12,671
<font color="#dadada">And again it goes back to the blues to say I can't do
that</font>

440
00:20:13,183 --> 00:20:14,207
<font color="#c9c9c9">There's nothing that says I couldn't</font>

441
00:20:14,463 --> 00:20:15,743
<font color="#cecece">So not breaking any rules</font>

442
00:20:16,255 --> 00:20:17,279
<font color="#c9c9c9">End-user get</font>

443
00:20:17,791 --> 00:20:18,815
<font color="#dfdfdf">They get a little Dino</font>

444
00:20:19,327 --> 00:20:19,839
<font color="#6d6d6d">Serious</font>

445
00:20:20,095 --> 00:20:21,887
<font color="#f4f4f4">From time to time</font>

446
00:20:22,143 --> 00:20:23,935
<font color="#d6d6d6">I didn't know you could do this they learn something
from</font>

447
00:20:24,191 --> 00:20:26,751
<font color="#d6d6d6">Somebody they know who's intact and they got more try
that</font>

448
00:20:27,263 --> 00:20:28,287
<font color="#d7d7d7">Nothing says they can't</font>

449
00:20:29,055 --> 00:20:29,567
<font color="#fcfcfc">So they will</font>

450
00:20:29,823 --> 00:20:31,103
<font color="#909090">And if they're accessing resources</font>
451
00:20:31,359 --> 00:20:33,151
<font color="#dddddd">Really shouldn't be kicking their feet around</font>

452
00:20:33,663 --> 00:20:35,967
<font color="#d4d4d4">Things could happen data could get destroyed</font>

453
00:20:36,223 --> 00:20:36,991
<font color="#cecece">Modified</font>

454
00:20:37,247 --> 00:20:38,015
<font color="#d0d0d0">Who knows</font>

455
00:20:38,527 --> 00:20:41,087
<font color="#efefef">And we just it's just easier to go ahead put the kibosh on
that</font>

456
00:20:44,671 --> 00:20:46,463
<font color="#e8e8e8">You're in this area therefore you don't need Acts</font>

457
00:20:47,231 --> 00:20:48,255
<font color="#d2d2d2">August back to the</font>

458
00:20:48,511 --> 00:20:50,559
<font color="#fcfcfc">Principle of least privilege</font>

459
00:20:51,327 --> 00:20:53,119
<font color="#f6f6f6">You only get access to the things that you need</font>

460
00:20:53,887 --> 00:20:54,399
<font color="#fcfcfc">Okay</font>

461
00:20:54,655 --> 00:20:57,983
<font color="#d2d2d2">Now that I'm looking at our clock and I know we're still
getting into security policy</font>

462
00:20:58,239 --> 00:21:02,079
<font color="#cccccc">What is a really good stopping spot for us and we'll pick
back up</font>

463
00:21:02,335 --> 00:21:04,127
<font color="#fcfcfc">With looking at security policy</font>

464
00:21:05,151 --> 00:21:11,295
<font color="#c3c3c3">Intravesical hacking security controls part 1 make sure you
see part 2 and make sure you see everything and chb</font>
465
00:21:12,063 --> 00:21:14,367
<font color="#bdbdbd">Daniel's doing a great job putting this together for
you</font>

466
00:21:14,623 --> 00:21:15,903
<font color="#a8a8a8">Getting you the information you need</font>

467
00:21:16,416 --> 00:21:18,464
<font color="#d4d4d4">For that test that exam that's</font>

468
00:21:18,720 --> 00:21:24,864
<font color="#d2d2d2">The looming around the corner and by the way you'll be inside
the course Library there's thousands and thousands of hours of complementary
information dr2</font>

469
00:21:25,120 --> 00:21:26,144
<font color="#dfdfdf">Designed to do one thing</font>

470
00:21:26,400 --> 00:21:28,448
<font color="#e0e0e0">I'll be more successful check that out as well</font>

471
00:21:28,704 --> 00:21:33,568
<font color="#b6b6b6">I thought about you know what itpro TV TV is binge-
worthy</font>

472
00:21:33,824 --> 00:21:35,360
<font color="#dadada">We will see you again soon</font>

473
00:21:42,528 --> 00:21:43,296
<font color="#fcfcfc">Thank you for watching</font>

You might also like