title
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

description
🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN 🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl This Edureka video gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this video includes: 1. What is Computer security? 2. Goals of Computer security 3. What to secure?- Types of computer security 4. Potential losses due to cyber attacks 5. How to secure? 🔵CyberSecurity Certification Training : https://www.edureka.co/cybersecurity-certification-training Subscribe to our channel to get video updates. Hit the subscribe button above. ------------------------------------- About Edureka Cyber Security Training Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access. Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses. ------------------------------------------------ Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings. --------------------------------------------------- Objectives of Edureka Cyber Security Course This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on This course focuses mainly on the basics concepts of Cyber Security In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses This course will be your first step towards learning Cyber Security -------------------------------------- Who Should go for this Training? Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:- Networking Professionals Linux Administrators ----------------------------------------------- For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free). Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka

detail
{'title': 'Computer Security | Types of Computer Security | Cybersecurity Course | Edureka', 'heatmap': [{'end': 217.568, 'start': 173.236, 'weight': 0.85}], 'summary': 'This cybersecurity course covers the importance of computer security, data security principles, os protection, web browser security, antivirus basics, intrusion detection systems, and virtual private networks, providing insights on potential risks, security measures, and the role of individuals in ensuring confidentiality, integrity, and availability of computer systems.', 'chapters': [{'end': 173.156, 'segs': [{'end': 116.516, 'src': 'embed', 'start': 63.573, 'weight': 0, 'content': [{'end': 72.979, 'text': 'So most of the security breaches come from uninformed and untrained persons which give information to a third party or publish data on the internet without knowing the consequences.', 'start': 63.573, 'duration': 9.406}, {'end': 79.403, 'text': 'see the following scenario, which you can see on the screen, which tells us what employees might end up doing without computer security awareness.', 'start': 72.979, 'duration': 6.424}, {'end': 87.609, 'text': 'So the benefits of computer security awareness are obvious, as it directly minimizes the potential of you being hacked of your identity,', 'start': 80.024, 'duration': 7.585}, {'end': 89.79, 'text': 'your computer or your organization as a whole.', 'start': 87.609, 'duration': 2.181}, {'end': 91.771, 'text': "So now let's tackle.", 'start': 90.751, 'duration': 1.02}, {'end': 96.205, 'text': 'What is computer security? Well computer security is not just an IT problem.', 'start': 91.851, 'duration': 4.354}, {'end': 98.047, 'text': "It is everyone's responsibility,", 'start': 96.446, 'duration': 1.601}, {'end': 104.955, 'text': 'and this means that everyone who uses a computer or mobile device needs to understand how to keep the computer devices and data secure.', 'start': 98.047, 'duration': 6.908}, {'end': 107.298, 'text': "So here's what computer security is all about.", 'start': 105.316, 'duration': 1.982}, {'end': 116.516, 'text': 'So computer security or IT security is the protection of computer systems from the theft or damage to their hardware, software or electronic data,', 'start': 107.91, 'duration': 8.606}], 'summary': 'Computer security awareness minimizes hacking and protects systems from theft or damage.', 'duration': 52.943, 'max_score': 63.573, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo463573.jpg'}], 'start': 7.443, 'title': 'Computer security importance', 'summary': 'Discusses the importance of computer security, emphasizing potential risks and the goals of computer security, and highlights the responsibility of individuals in ensuring confidentiality, integrity, and availability of computer systems.', 'chapters': [{'end': 173.156, 'start': 7.443, 'title': 'Computer security tutorial', 'summary': 'Discusses the importance of computer security, emphasizing the potential risks and the goals of computer security while highlighting the responsibility of every individual in ensuring the confidentiality, integrity, and availability of computer systems.', 'duration': 165.713, 'highlights': ["Computer security is everyone's responsibility, requiring an understanding of how to keep computer devices and data secure, to protect from theft or damage, and to ensure confidentiality, integrity, and availability.", "The potential losses due to security attacks and the benefits of computer security awareness directly minimize the potential of being hacked of one's identity, computer, or organization.", 'The biggest hole in security is human beings, as uninformed and untrained persons often give information to a third party or publish data on the internet without understanding the consequences.']}], 'duration': 165.713, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo47443.jpg', 'highlights': ["The potential losses due to security attacks and the benefits of computer security awareness directly minimize the potential of being hacked of one's identity, computer, or organization.", "Computer security is everyone's responsibility, requiring an understanding of how to keep computer devices and data secure, to protect from theft or damage, and to ensure confidentiality, integrity, and availability.", 'The biggest hole in security is human beings, as uninformed and untrained persons often give information to a third party or publish data on the internet without understanding the consequences.']}, {'end': 399.365, 'segs': [{'end': 217.568, 'src': 'heatmap', 'start': 173.236, 'weight': 0, 'content': [{'end': 174.537, 'text': 'You must adhere to these rules.', 'start': 173.236, 'duration': 1.301}, {'end': 181.361, 'text': 'So the five rules are confidentiality data integrity availability control and audit.', 'start': 175.117, 'duration': 6.244}, {'end': 184.003, 'text': "So let's take a moment to discuss these one by one.", 'start': 181.901, 'duration': 2.102}, {'end': 185.904, 'text': 'So first is confidentiality.', 'start': 184.363, 'duration': 1.541}, {'end': 192.32, 'text': 'So for confidentiality, you will have to ensure that information is available only to the intended audience.', 'start': 186.514, 'duration': 5.806}, {'end': 196.925, 'text': 'that confidentiality includes privacy of information that may be personal or sensitive.', 'start': 192.32, 'duration': 4.605}, {'end': 198.266, 'text': 'then comes data integrity.', 'start': 196.925, 'duration': 1.341}, {'end': 199.948, 'text': 'So protecting the data.', 'start': 198.786, 'duration': 1.162}, {'end': 201.929, 'text': 'integrity is also a concern.', 'start': 199.948, 'duration': 1.981}, {'end': 207.375, 'text': 'the company needs certainty that information does not become inaccurate because of unintended changes.', 'start': 201.929, 'duration': 5.446}, {'end': 208.296, 'text': 'then is availability.', 'start': 207.375, 'duration': 0.921}, {'end': 217.568, 'text': "So you'll have to work with the IT manager to protect the data's availability or the ability for allowed person to access the computer and its information whenever necessary.", 'start': 208.869, 'duration': 8.699}], 'summary': 'Discussing five rules: confidentiality, data integrity, availability, control, and audit.', 'duration': 44.332, 'max_score': 173.236, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4173236.jpg'}, {'end': 294.827, 'src': 'embed', 'start': 270.718, 'weight': 3, 'content': [{'end': 276.959, 'text': 'So one of the most important aspects of computer security is physical security or controlling who actually access your hardware.', 'start': 270.718, 'duration': 6.241}, {'end': 278.896, 'text': 'Next is the operating system.', 'start': 277.555, 'duration': 1.341}, {'end': 280.337, 'text': 'So operating systems.', 'start': 279.176, 'duration': 1.161}, {'end': 285.38, 'text': 'also our permission control schemes making sure users are authorized to perform certain actions.', 'start': 280.337, 'duration': 5.043}, {'end': 290.524, 'text': 'under permission control scheme, users are allowed to modify files if they have been given prior approval.', 'start': 285.38, 'duration': 5.144}, {'end': 294.827, 'text': 'now permissions can be allocated to the whole system or groups and individual users.', 'start': 290.524, 'duration': 4.303}], 'summary': 'Computer security involves physical security, operating systems, and permission control schemes for authorized user actions and file modifications.', 'duration': 24.109, 'max_score': 270.718, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4270718.jpg'}, {'end': 352.761, 'src': 'embed', 'start': 326.241, 'weight': 5, 'content': [{'end': 331.484, 'text': 'the potential losses in the cyberspace are many, even if you are using a single computer in your room.', 'start': 326.241, 'duration': 5.243}, {'end': 336.475, 'text': "Here I'll be listing some examples that have direct impact on you and on others.", 'start': 332.173, 'duration': 4.302}, {'end': 338.556, 'text': 'So the first is losing your data.', 'start': 337.096, 'duration': 1.46}, {'end': 341.518, 'text': 'So if your computer has been hacked or infected,', 'start': 338.937, 'duration': 2.581}, {'end': 347.101, 'text': 'this is a big chance that your store data might be taken by the attacker or completely deleted as a whole.', 'start': 341.518, 'duration': 5.583}, {'end': 352.761, 'text': 'Now the bad usage of your computer resources is also a very big thing that could happen now.', 'start': 347.777, 'duration': 4.984}], 'summary': 'Cybersecurity risks include data loss, resource misuse, and potential impact on individuals.', 'duration': 26.52, 'max_score': 326.241, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4326241.jpg'}], 'start': 173.236, 'title': 'Data and computer security principles', 'summary': 'Covers the five essential data security rules including confidentiality, data integrity, availability, control, and audit, and emphasizes the importance of information privacy, accuracy, and accessibility. it also discusses the importance of computer security, including physical security, permission control schemes, potential losses due to security attacks, and the need for protection against identity theft.', 'chapters': [{'end': 217.568, 'start': 173.236, 'title': 'Data security rules and principles', 'summary': 'Discusses the five essential data security rules: confidentiality, data integrity, availability, control, and audit, emphasizing the importance of ensuring information privacy, accuracy, and accessibility.', 'duration': 44.332, 'highlights': ['Confidentiality involves ensuring information is available only to the intended audience and includes privacy of personal or sensitive information.', 'Data integrity requires protecting data to prevent unintended changes and inaccuracies.', 'Availability involves working with the IT manager to ensure data access whenever necessary.']}, {'end': 399.365, 'start': 218.132, 'title': 'Computer security overview', 'summary': 'Discusses the importance of computer security, covering physical security, permission control schemes, potential losses due to security attacks, and the need for protection against identity theft.', 'duration': 181.233, 'highlights': ['Physical security is crucial in controlling access to hardware, ensuring protection from potential internal threats. It emphasizes the importance of controlling physical access to computer hardware to prevent internal security breaches.', 'Permission control schemes play a vital role in ensuring authorized user actions and file modifications. Discusses the significance of permission control schemes in authorizing user actions and file modifications to enhance security.', 'The potential losses due to security attacks include data theft, resource misuse, reputation loss, and identity theft. Addresses the potential losses in cyberspace, such as data theft, resource misuse, reputation loss, and identity theft, highlighting the impact of security attacks.']}], 'duration': 226.129, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4173236.jpg', 'highlights': ['Confidentiality involves ensuring information is available only to the intended audience and includes privacy of personal or sensitive information.', 'Data integrity requires protecting data to prevent unintended changes and inaccuracies.', 'Availability involves working with the IT manager to ensure data access whenever necessary.', 'Physical security is crucial in controlling access to hardware, ensuring protection from potential internal threats.', 'Permission control schemes play a vital role in ensuring authorized user actions and file modifications.', 'The potential losses due to security attacks include data theft, resource misuse, reputation loss, and identity theft.']}, {'end': 764.384, 'segs': [{'end': 516.89, 'src': 'embed', 'start': 479.17, 'weight': 3, 'content': [{'end': 483.674, 'text': "So after you're in advanced options, you go and turn on automatically download updates.", 'start': 479.17, 'duration': 4.504}, {'end': 487.678, 'text': 'So, after checking for available updates for your Windows operating system,', 'start': 484.055, 'duration': 3.623}, {'end': 496.085, 'text': 'keep the automatic update turned on in order to download and install the important updates that can help protect your PC against new viruses or next-generation malwares.', 'start': 487.678, 'duration': 8.407}, {'end': 498.286, 'text': 'Next is update your software.', 'start': 496.906, 'duration': 1.38}, {'end': 502.747, 'text': "So you don't have to update only the windows operating system, but your software as well.", 'start': 498.666, 'duration': 4.081}, {'end': 508.289, 'text': 'Therefore, make sure all the latest updates and security patches for your main program and apps are installed.', 'start': 503.127, 'duration': 5.162}, {'end': 516.89, 'text': 'needless to say, that most popular pieces of software, such as Java, Adobe Flash, Adobe Shockwave and acrobat reader, especially the outdated ones,', 'start': 508.289, 'duration': 8.601}], 'summary': 'Enable automatic updates for windows and software to protect against viruses and malwares, including popular programs like java, adobe flash, adobe shockwave, and acrobat reader.', 'duration': 37.72, 'max_score': 479.17, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4479170.jpg'}, {'end': 619.906, 'src': 'embed', 'start': 572.51, 'weight': 1, 'content': [{'end': 578.213, 'text': 'so you can name that restore point a clean installation and continue installing drivers and application above that.', 'start': 572.51, 'duration': 5.703}, {'end': 583.535, 'text': 'So if one of the driver causes issues on the system, you can always go back to the clean installation restore point.', 'start': 578.733, 'duration': 4.802}, {'end': 587.577, 'text': 'So the fourth step you can take is install the traditional antivirus product.', 'start': 584.155, 'duration': 3.422}, {'end': 594.192, 'text': 'When you consider installing an antivirus program on your PC, make sure you use one from a legitimate company,', 'start': 588.149, 'duration': 6.043}, {'end': 596.314, 'text': 'because there can be fake software programs out there.', 'start': 594.192, 'duration': 2.122}, {'end': 603.698, 'text': 'Now, it is important to have a reliable security solution on your system, which you could include real-time scanning automatic update and a firewall.', 'start': 596.614, 'duration': 7.084}, {'end': 609.001, 'text': 'So the fifth step you can take is install a proactive security solution for multi-layered protection.', 'start': 604.118, 'duration': 4.883}, {'end': 611.702, 'text': 'next-gen malware usually has the ability to evade,', 'start': 609.001, 'duration': 2.701}, {'end': 616.805, 'text': 'detection and bypass antivirus software that users have installed on their PC to keep their data safe.', 'start': 611.702, 'duration': 5.103}, {'end': 619.906, 'text': 'but with the help of proactive cybersecurity Solutions,', 'start': 617.344, 'duration': 2.562}], 'summary': 'Install clean restore point, traditional antivirus, and proactive security for multi-layered protection.', 'duration': 47.396, 'max_score': 572.51, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4572510.jpg'}, {'end': 664.979, 'src': 'embed', 'start': 639.04, 'weight': 0, 'content': [{'end': 643.423, 'text': 'Now. the steps above are meant to keep you safe from malicious software and online threats,', 'start': 639.04, 'duration': 4.383}, {'end': 647.947, 'text': 'but you may still encounter hardware issues that could endanger your private information.', 'start': 643.423, 'duration': 4.524}, {'end': 649.648, 'text': 'now, to make sure your data stays safe,', 'start': 647.947, 'duration': 1.701}, {'end': 656.473, 'text': 'You should be using a two-fold strategy, which should include combining an external hard drive usage with an online backup service.', 'start': 649.688, 'duration': 6.785}, {'end': 660.616, 'text': 'now, at the same time, you could simply use your Windows backup system to set it up.', 'start': 656.473, 'duration': 4.143}, {'end': 664.979, 'text': 'you access your Windows control panel and then click backup and restore like this.', 'start': 660.616, 'duration': 4.363}], 'summary': 'Protect your data by using external hard drive and online backup service, and utilize windows backup system.', 'duration': 25.939, 'max_score': 639.04, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4639040.jpg'}, {'end': 724.735, 'src': 'embed', 'start': 696.886, 'weight': 7, 'content': [{'end': 702.568, 'text': 'It is recommended to have a standard account to prevent users from making changes that affect everyone who uses the computer,', 'start': 696.886, 'duration': 5.682}, {'end': 705.389, 'text': 'such as deleting important Windows files necessary for the system.', 'start': 702.568, 'duration': 2.821}, {'end': 712.411, 'text': 'Now, with the standard user account, you have limited rights and cannot do things like changing system settings or installing new software, apps,', 'start': 705.969, 'duration': 6.442}, {'end': 718.853, 'text': 'hardware or changing the username and password, but you should always remember that to install an application or make security changes.', 'start': 712.411, 'duration': 6.442}, {'end': 724.735, 'text': 'You must have an administrator account that the eight step is to keep your user account controlled and enabled.', 'start': 719.313, 'duration': 5.422}], 'summary': 'Standard user account prevents system damage, requires admin for installations and security changes.', 'duration': 27.849, 'max_score': 696.886, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4696886.jpg'}, {'end': 771.269, 'src': 'embed', 'start': 748.529, 'weight': 4, 'content': [{'end': 755.792, 'text': 'when important changes appear, such as installing a software or removing an application, the UAC pops up asking for administrator level permissions.', 'start': 748.529, 'duration': 7.263}, {'end': 759.239, 'text': 'In case your user account is infected with malware.', 'start': 756.377, 'duration': 2.862}, {'end': 764.384, 'text': 'UAC helps you by keeping suspicious programs and activities from making changes to the system.', 'start': 759.239, 'duration': 5.145}, {'end': 771.269, 'text': 'the vulnerabilities in your web browser are like open invitations to cyber criminals who find creative ways to harvest your most important data.', 'start': 764.384, 'duration': 6.885}], 'summary': 'Uac prevents unauthorized system changes, protecting against malware and cyber threats.', 'duration': 22.74, 'max_score': 748.529, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4748529.jpg'}], 'start': 400.185, 'title': 'Computer security and os protection', 'summary': 'Covers a computer security checklist with measures such as password protection and regular backups. it also discusses securing a windows os with steps like updating software and enabling user account control.', 'chapters': [{'end': 441.001, 'start': 400.185, 'title': 'Computer security checklist', 'summary': 'Discusses a computer security checklist including password protection, os updates, reputable software downloads, antivirus installation, termination of unusual services, firewall status, regular backups, and private data clearing.', 'duration': 40.816, 'highlights': ["You should always download software's from reputable sources.", 'You should terminate unusual services that are running and consuming your resources.', 'You should check if the user is password protected.', 'You should check if the OS is updated.', 'You should check if the firewall is up and running or not.', 'You should check for your backups regularly.', 'You should clear your private data from web browsers or just do your private browsing on incognito.', 'You should check if the antivirus or anti-malware is installed on your computer.']}, {'end': 764.384, 'start': 441.061, 'title': 'Securing your operating system', 'summary': 'Discusses steps to secure a windows operating system, including keeping it updated, updating software, creating a restore point, installing reliable antivirus and proactive security solutions, backing up data, using standard user accounts, and enabling user account control.', 'duration': 323.323, 'highlights': ['Always keep Windows OS updated by enabling automatic security updates to protect against new viruses and malware. Regularly updating the Windows OS with security patches and automatic updates is crucial for protecting the system against new viruses and malware.', 'Update software including popular programs like Java, Adobe Flash, Adobe Shockwave, and Acrobat Reader to avoid exploitation by malicious actors. Updating popular software programs like Java and Adobe products is essential to prevent exploitation by malicious actors, safeguarding sensitive data.', 'Create a restore point in Windows after installing security updates to revert to a clean installation in case of issues with drivers or applications. Creating a restore point after security updates allows reverting to a stable state in case of driver or application issues, ensuring system reliability.', 'Install a legitimate traditional antivirus with real-time scanning, automatic updates, and firewall for reliable security. Installing a legitimate antivirus with real-time scanning and a firewall provides reliable security against potential threats and unauthorized access.', 'Use proactive cybersecurity solutions for multi-layered protection against next-gen malware such as Zeus and CryptoLocker. Implementing proactive cybersecurity solutions offers robust protection against advanced malware like Zeus and CryptoLocker, safeguarding financial and sensitive data.', 'Implement a two-fold strategy for data backup, combining external hard drive usage with an online backup service or Windows backup system. Utilizing a two-fold backup strategy with external hard drives and online backup services ensures data safety and recovery in case of hardware issues or data loss.', 'Use a standard user account to prevent unauthorized changes that affect the entire computer and secure the system. Employing a standard user account prevents unauthorized changes on the computer, enhancing system security and preventing potential damage.', 'Enable and control User Account Control (UAC) to prevent unauthorized changes and protect the system from malware. Enabling and controlling User Account Control (UAC) is essential for preventing unauthorized changes and protecting the system from malware, ensuring system integrity.']}], 'duration': 364.199, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4400185.jpg', 'highlights': ['Implement a two-fold strategy for data backup, combining external hard drive usage with an online backup service or Windows backup system.', 'Use proactive cybersecurity solutions for multi-layered protection against next-gen malware such as Zeus and CryptoLocker.', 'Install a legitimate traditional antivirus with real-time scanning, automatic updates, and firewall for reliable security.', 'Always keep Windows OS updated by enabling automatic security updates to protect against new viruses and malware.', 'Enable and control User Account Control (UAC) to prevent unauthorized changes and protect the system from malware.', 'Create a restore point in Windows after installing security updates to revert to a clean installation in case of issues with drivers or applications.', 'Update software including popular programs like Java, Adobe Flash, Adobe Shockwave, and Acrobat Reader to avoid exploitation by malicious actors.', 'Employing a standard user account prevents unauthorized changes on the computer, enhancing system security and preventing potential damage.']}, {'end': 1009.837, 'segs': [{'end': 818.71, 'src': 'embed', 'start': 781.201, 'weight': 0, 'content': [{'end': 787.523, 'text': 'So the vulnerabilities in your web browser are like open-door invitations to cyber criminals who find creative ways to harvest your most important data.', 'start': 781.201, 'duration': 6.322}, {'end': 793.485, 'text': 'For example, if you are using Adobe Flash, be aware of its security flaws and how it can expose you to attacks.', 'start': 787.823, 'duration': 5.662}, {'end': 796.406, 'text': 'to stay safe while accessing various web pages, follow these steps.', 'start': 793.485, 'duration': 2.921}, {'end': 798.826, 'text': 'So choose the latest version of your browser.', 'start': 797.026, 'duration': 1.8}, {'end': 803.688, 'text': 'Then you should always keep it updated and choose a private browsing session when you access a website.', 'start': 799.247, 'duration': 4.441}, {'end': 809.87, 'text': 'You are not sure about choosing this mode will prevent authentication credentials or cookies from being stored and stolen by attackers.', 'start': 803.708, 'duration': 6.162}, {'end': 818.71, 'text': 'and you could also block browser pop-ups, because, since data stealing malware spreads through malicious code embedded in pop-ups on Windows,', 'start': 810.857, 'duration': 7.853}], 'summary': 'Web browser vulnerabilities invite cyber criminals. stay safe by using latest browser, keeping it updated, and choosing private browsing.', 'duration': 37.509, 'max_score': 781.201, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4781201.jpg'}, {'end': 868.459, 'src': 'embed', 'start': 840.372, 'weight': 2, 'content': [{'end': 844.614, 'text': 'a solution for this is to encrypt your hard drive and protect all your sensitive files,', 'start': 840.372, 'duration': 4.242}, {'end': 849.075, 'text': 'and it is recommended to use this level of security if you have laptop, which can be very easily stolen.', 'start': 844.614, 'duration': 4.461}, {'end': 851.496, 'text': 'The same thing applies to a computer.', 'start': 849.575, 'duration': 1.921}, {'end': 857.877, 'text': 'a free encryption tool that you can use is BitLocker, which is available on the latest Windows operating system, and you can enable it any moment.', 'start': 851.496, 'duration': 6.381}, {'end': 864.338, 'text': "If you don't have it on your operating system, you can just visit the site which is Microsoft site and you can just download BitLocker.", 'start': 858.277, 'duration': 6.061}, {'end': 868.459, 'text': 'You can check the details the system requirements and the installation instructions.', 'start': 864.698, 'duration': 3.761}], 'summary': 'Encrypt your hard drive using bitlocker for laptop security and data protection.', 'duration': 28.087, 'max_score': 840.372, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4840372.jpg'}, {'end': 912.826, 'src': 'embed', 'start': 885.742, 'weight': 3, 'content': [{'end': 892.644, 'text': 'antivirus software, also known as anti-malware, is a computer program used to prevent or detect and remove malware from your computer.', 'start': 885.742, 'duration': 6.902}, {'end': 895.771, 'text': 'So following are the basic functions of antiviruses.', 'start': 893.149, 'duration': 2.622}, {'end': 901.036, 'text': 'now, all antivirus engines have three components to function accordingly, and it is important to have a look at these functions,', 'start': 895.771, 'duration': 5.265}, {'end': 905.199, 'text': 'because it will help us for better manual and cleaning of viruses in case we need them.', 'start': 901.036, 'duration': 4.163}, {'end': 906.981, 'text': 'So first is scanning.', 'start': 905.7, 'duration': 1.281}, {'end': 912.826, 'text': 'now, when a new virus is detected in the cyberspace, antivirus producers start writing programs that scans for similar signature strings.', 'start': 906.981, 'duration': 5.845}], 'summary': 'Antivirus software detects and removes malware. it has three key components: scanning, signature detection, and cleaning.', 'duration': 27.084, 'max_score': 885.742, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4885742.jpg'}, {'end': 966.424, 'src': 'embed', 'start': 939.292, 'weight': 4, 'content': [{'end': 947.435, 'text': "So it's called virus total.com, and you can upload a file out here or choose a URL that you want to scan before visiting the website,", 'start': 939.292, 'duration': 8.143}, {'end': 951.257, 'text': 'or you could just search for any URLs, IP addresses or domains,', 'start': 947.435, 'duration': 3.822}, {'end': 955.739, 'text': 'or file hashes that you want to search for and check if they have a virus attached to them or not.', 'start': 951.257, 'duration': 4.482}, {'end': 959.141, 'text': 'Okay, So the next thing is firewalls.', 'start': 956.96, 'duration': 2.181}, {'end': 966.424, 'text': 'now, firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.', 'start': 959.141, 'duration': 7.283}], 'summary': 'Virustotal.com allows file and url scanning; firewalls monitor and control network traffic.', 'duration': 27.132, 'max_score': 939.292, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4939292.jpg'}, {'end': 1009.837, 'src': 'embed', 'start': 978.59, 'weight': 5, 'content': [{'end': 980.392, 'text': 'They can also work as packet filters,', 'start': 978.59, 'duration': 1.802}, {'end': 987.1, 'text': 'which means that the firewall takes a decision to forward or not forward a packet based on the source and destination dresses and ports.', 'start': 980.392, 'duration': 6.708}, {'end': 993.628, 'text': 'So some of the recommended brands are Cisco ASA series checkpoint Fortinet Juniper Sonic ball and PFSense.', 'start': 987.621, 'duration': 6.007}, {'end': 1001.908, 'text': 'Now Windows already comes pre-installed with a firewall and you can check its status just by searching for firewall and by pressing the Windows button.', 'start': 994.48, 'duration': 7.428}, {'end': 1005.853, 'text': 'so you can check the firewall status by going to the control panel like this,', 'start': 1001.908, 'duration': 3.945}, {'end': 1009.837, 'text': 'and you can also check the advanced settings and configure your firewall accordingly.', 'start': 1005.853, 'duration': 3.984}], 'summary': 'Firewalls act as packet filters, recommended brands include cisco asa, checkpoint, fortinet, juniper, sonicwall, and pfsense. windows has a pre-installed firewall, accessible through control panel and advanced settings.', 'duration': 31.247, 'max_score': 978.59, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4978590.jpg'}], 'start': 764.384, 'title': 'Web browser security and antivirus basics', 'summary': 'Emphasizes web browser security, os protection, and antivirus basics, highlighting vulnerabilities, measures to stay safe, and the role of firewalls. it discusses updating the browser, private browsing, blocking pop-ups, and encrypting the hard drive, as well as the functions of antivirus software and firewalls, and recommendations for firewall brands.', 'chapters': [{'end': 871.1, 'start': 764.384, 'title': 'Web browser security and os protection', 'summary': 'Emphasizes the importance of web browser security and os protection, highlighting vulnerabilities in web browsers, such as adobe flash, and providing measures to stay safe while browsing the web, including updating the browser, using private browsing sessions, blocking pop-ups, and encrypting the hard drive to protect sensitive files.', 'duration': 106.716, 'highlights': ["Vulnerabilities in web browsers are open invitations to cyber criminals who harvest important data; Adobe Flash has security flaws exposing users to attacks. The vulnerabilities in web browsers, like Adobe Flash's security flaws, can expose users to attacks, emphasizing the importance of staying safe while browsing the web.", 'Measures to stay safe while browsing include choosing the latest version of the browser, keeping it updated, using private browsing sessions, and blocking pop-ups. Measures to stay safe while browsing include choosing the latest version of the browser, keeping it updated, using private browsing sessions, and blocking pop-ups to prevent data theft and malware spread.', 'Encrypting the hard drive can protect sensitive files from unauthorized access; BitLocker is a recommended encryption tool for Windows OS. Encrypting the hard drive with tools like BitLocker can protect sensitive files from unauthorized access, especially important for laptops that are prone to theft.']}, {'end': 1009.837, 'start': 871.698, 'title': 'Antivirus and firewall basics', 'summary': 'Discusses the importance of antivirus software, its basic functions including scanning, integrity checking, and interception, and the role of firewalls in monitoring and controlling network traffic. it also recommends various firewall brands and explains how to check and configure the windows firewall.', 'duration': 138.139, 'highlights': ['Antivirus software functions include scanning, integrity checking, and interception for detecting and removing malware, with antivirus engines having three components to function accordingly. Antivirus software functions include scanning, integrity checking, and interception for detecting and removing malware. Antivirus engines have three components to function accordingly.', 'VirusTotal.com is recommended as an online antivirus engine for scanning files, URLs, IP addresses, domains, or file hashes for potential viruses. VirusTotal.com is recommended as an online antivirus engine for scanning files, URLs, IP addresses, domains, or file hashes for potential viruses.', 'Firewalls serve as network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules, with recommended brands including Cisco ASA, Checkpoint, Fortinet, Juniper, SonicWall, and PFSense. Firewalls serve as network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules. Recommended brands include Cisco ASA, Checkpoint, Fortinet, Juniper, SonicWall, and PFSense.']}], 'duration': 245.453, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo4764384.jpg', 'highlights': ['Vulnerabilities in web browsers are open invitations to cyber criminals who harvest important data; Adobe Flash has security flaws exposing users to attacks.', 'Measures to stay safe while browsing include choosing the latest version of the browser, keeping it updated, using private browsing sessions, and blocking pop-ups.', 'Encrypting the hard drive can protect sensitive files from unauthorized access; BitLocker is a recommended encryption tool for Windows OS.', 'Antivirus software functions include scanning, integrity checking, and interception for detecting and removing malware, with antivirus engines having three components to function accordingly.', 'VirusTotal.com is recommended as an online antivirus engine for scanning files, URLs, IP addresses, domains, or file hashes for potential viruses.', 'Firewalls serve as network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules, with recommended brands including Cisco ASA, Checkpoint, Fortinet, Juniper, SonicWall, and PFSense.']}, {'end': 1336.148, 'segs': [{'end': 1057.164, 'src': 'embed', 'start': 1010.878, 'weight': 0, 'content': [{'end': 1014.382, 'text': 'Now next securing your network should be done through an intrusion detection system.', 'start': 1010.878, 'duration': 3.504}, {'end': 1023.672, 'text': 'So an intrusion detection system is a device or software application that monitors a network system for malicious activity or policy violations.', 'start': 1015.146, 'duration': 8.526}, {'end': 1033.559, 'text': 'intrusion detection systems are also as important as the firewall because they help us to detect the type of attack that is being done to our system and then to make a solution to block them.', 'start': 1023.672, 'duration': 9.887}, {'end': 1038.602, 'text': 'the monitoring part, like tracing logs, looking for doubtful signatures and keeping history of the events triggered.', 'start': 1033.559, 'duration': 5.043}, {'end': 1044.086, 'text': 'They also have the network administrator to check the connection integrity and authenticity that occurs.', 'start': 1039.223, 'duration': 4.863}, {'end': 1049.01, 'text': 'So another way of securing a network is installing an intrusion detection system.', 'start': 1045.022, 'duration': 3.988}, {'end': 1057.164, 'text': 'Now an intrusion detection system is a device or software application that monitors and networks or system for malicious activity or policy violation.', 'start': 1049.711, 'duration': 7.453}], 'summary': 'Using an intrusion detection system is crucial for monitoring and detecting malicious activity, helping to secure the network and prevent attacks.', 'duration': 46.286, 'max_score': 1010.878, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo41010878.jpg'}, {'end': 1134.159, 'src': 'embed', 'start': 1095.077, 'weight': 4, 'content': [{'end': 1103.02, 'text': 'It has real-time signature based networks which notifies the system administrator, or attacks like port scanners, DDoS attacks, CGI attacks,', 'start': 1095.077, 'duration': 7.943}, {'end': 1104.52, 'text': 'backdoors and OS fingerprints.', 'start': 1103.02, 'duration': 1.5}, {'end': 1107.882, 'text': 'So let me give you a small demo on how to actually run snort.', 'start': 1105.061, 'duration': 2.821}, {'end': 1112.263, 'text': "So I've already downloaded the snort files so you can download the same from here.", 'start': 1108.322, 'duration': 3.941}, {'end': 1115.548, 'text': "Then once you've downloaded go to the place where you downloaded it.", 'start': 1112.877, 'duration': 2.671}, {'end': 1117.376, 'text': 'So out here.', 'start': 1116.351, 'duration': 1.025}, {'end': 1126.696, 'text': "So after you've downloaded snort and installed it on your computer, it's time you go ahead and register yourself as a user on snorts website.", 'start': 1119.713, 'duration': 6.983}, {'end': 1134.159, 'text': "Now after you've done that to you have to go and download a rules file and you can do that by just going on download and going to the rules tab.", 'start': 1127.136, 'duration': 7.023}], 'summary': 'Snort offers real-time network monitoring for detecting attacks like port scanners, ddos attacks, cgi attacks, backdoors, and os fingerprints. it also requires user registration and downloading of rules file for usage.', 'duration': 39.082, 'max_score': 1095.077, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo41095077.jpg'}, {'end': 1293.186, 'src': 'embed', 'start': 1263.645, 'weight': 6, 'content': [{'end': 1266.447, 'text': 'Okay now moving on to virtual private networks.', 'start': 1263.645, 'duration': 2.802}, {'end': 1273.693, 'text': 'Okay, so a virtual private network extends a secure and encrypted connection to share data remotely through public networks.', 'start': 1267.568, 'duration': 6.125}, {'end': 1278.13, 'text': 'This type of network is widely used in the small business or Enterprise networks.', 'start': 1274.306, 'duration': 3.824}, {'end': 1283.335, 'text': 'It helps to send and receive data across the internet, but in a secure and encrypted way.', 'start': 1278.711, 'duration': 4.624}, {'end': 1288.16, 'text': 'generally, this network is created between two secure network device, like two firewalls.', 'start': 1283.335, 'duration': 4.825}, {'end': 1293.186, 'text': 'an example is a connection between two ASA 5505 firewall, as shown in the following image', 'start': 1288.16, 'duration': 5.026}], 'summary': 'Virtual private networks provide secure and encrypted connections for sharing data across public networks, commonly used in small business or enterprise networks.', 'duration': 29.541, 'max_score': 1263.645, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo41263645.jpg'}], 'start': 1010.878, 'title': 'Intrusion detection systems and virtual private networks', 'summary': 'Emphasizes the role of intrusion detection systems in network security, highlighting their importance in detecting and mitigating malicious activities, policy violations, and monitoring connection integrity. it also covers the installation and usage of snort, an intrusion detection tool, and explains the significance of virtual private networks in securing data transmission across public networks.', 'chapters': [{'end': 1074.856, 'start': 1010.878, 'title': 'Securing network with intrusion detection', 'summary': 'Emphasizes the importance of intrusion detection systems in securing a network, highlighting their role in detecting and mitigating malicious activities and policy violations, as well as monitoring for connection integrity and authenticity.', 'duration': 63.978, 'highlights': ['Intrusion detection systems help detect the type of attack being done to the system and provide solutions to block them, making them as important as firewalls. (Relevance score: 5)', 'Monitoring part of intrusion detection systems includes tracing logs, looking for doubtful signatures, and keeping a history of triggered events. (Relevance score: 4)', 'Intrusion detection systems aid in checking the connection integrity and authenticity that occurs, further emphasizing their importance in network security. (Relevance score: 3)', 'Intrusion detection systems are devices or software applications that monitor network systems for malicious activity or policy violations, thus playing a crucial role in network security. (Relevance score: 2)']}, {'end': 1336.148, 'start': 1075.437, 'title': 'Intrusion detection and virtual private networks', 'summary': 'Discusses the installation and usage of snort, an intrusion detection tool, covering its features, installation steps, and its role in network security. it also explains the concept of virtual private networks and their importance in securing data transmission across public networks.', 'duration': 260.711, 'highlights': ['Installation and Configuration of Snort The detailed process of installing and configuring snort, including registering as a user, downloading rules, and installing winpcap, is elaborated with step-by-step instructions.', 'Intrusion Detection with Snort The chapter provides a demonstration of running snort to detect and gather information about packets passing through the network, aiding network administrators in identifying malicious content or potential attacks.', "Virtual Private Networks The concept of virtual private networks (VPNs) is explained, emphasizing their role in securely sharing data across public networks, and a simple method of installing a free VPN extension, 'hola,' is suggested for secure web browsing."]}], 'duration': 325.27, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/d30n-YxOHo4/pics/d30n-YxOHo41010878.jpg', 'highlights': ['Intrusion detection systems help detect the type of attack and provide solutions to block them, making them as important as firewalls.', 'Monitoring part of intrusion detection systems includes tracing logs, looking for doubtful signatures, and keeping a history of triggered events.', 'Intrusion detection systems aid in checking the connection integrity and authenticity, emphasizing their importance in network security.', 'Intrusion detection systems are devices or software applications that monitor network systems for malicious activity or policy violations, playing a crucial role in network security.', 'The detailed process of installing and configuring snort, including registering as a user, downloading rules, and installing winpcap, is elaborated with step-by-step instructions.', 'The chapter provides a demonstration of running snort to detect and gather information about packets passing through the network, aiding network administrators in identifying malicious content or potential attacks.', 'The concept of virtual private networks (VPNs) is explained, emphasizing their role in securely sharing data across public networks.']}], 'highlights': ["The potential losses due to security attacks and the benefits of computer security awareness directly minimize the potential of being hacked of one's identity, computer, or organization.", "Computer security is everyone's responsibility, requiring an understanding of how to keep computer devices and data secure, to protect from theft or damage, and to ensure confidentiality, integrity, and availability.", 'The biggest hole in security is human beings, as uninformed and untrained persons often give information to a third party or publish data on the internet without understanding the consequences.', 'Confidentiality involves ensuring information is available only to the intended audience and includes privacy of personal or sensitive information.', 'Data integrity requires protecting data to prevent unintended changes and inaccuracies.', 'Availability involves working with the IT manager to ensure data access whenever necessary.', 'Physical security is crucial in controlling access to hardware, ensuring protection from potential internal threats.', 'Permission control schemes play a vital role in ensuring authorized user actions and file modifications.', 'The potential losses due to security attacks include data theft, resource misuse, reputation loss, and identity theft.', 'Implement a two-fold strategy for data backup, combining external hard drive usage with an online backup service or Windows backup system.', 'Use proactive cybersecurity solutions for multi-layered protection against next-gen malware such as Zeus and CryptoLocker.', 'Install a legitimate traditional antivirus with real-time scanning, automatic updates, and firewall for reliable security.', 'Always keep Windows OS updated by enabling automatic security updates to protect against new viruses and malware.', 'Enable and control User Account Control (UAC) to prevent unauthorized changes and protect the system from malware.', 'Create a restore point in Windows after installing security updates to revert to a clean installation in case of issues with drivers or applications.', 'Update software including popular programs like Java, Adobe Flash, Adobe Shockwave, and Acrobat Reader to avoid exploitation by malicious actors.', 'Employing a standard user account prevents unauthorized changes on the computer, enhancing system security and preventing potential damage.', 'Vulnerabilities in web browsers are open invitations to cyber criminals who harvest important data; Adobe Flash has security flaws exposing users to attacks.', 'Measures to stay safe while browsing include choosing the latest version of the browser, keeping it updated, using private browsing sessions, and blocking pop-ups.', 'Encrypting the hard drive can protect sensitive files from unauthorized access; BitLocker is a recommended encryption tool for Windows OS.', 'Antivirus software functions include scanning, integrity checking, and interception for detecting and removing malware, with antivirus engines having three components to function accordingly.', 'VirusTotal.com is recommended as an online antivirus engine for scanning files, URLs, IP addresses, domains, or file hashes for potential viruses.', 'Firewalls serve as network security systems to monitor and control incoming and outgoing network traffic based on predetermined security rules, with recommended brands including Cisco ASA, Checkpoint, Fortinet, Juniper, SonicWall, and PFSense.', 'Intrusion detection systems help detect the type of attack and provide solutions to block them, making them as important as firewalls.', 'Monitoring part of intrusion detection systems includes tracing logs, looking for doubtful signatures, and keeping a history of triggered events.', 'Intrusion detection systems aid in checking the connection integrity and authenticity, emphasizing their importance in network security.', 'Intrusion detection systems are devices or software applications that monitor network systems for malicious activity or policy violations, playing a crucial role in network security.', 'The detailed process of installing and configuring snort, including registering as a user, downloading rules, and installing winpcap, is elaborated with step-by-step instructions.', 'The chapter provides a demonstration of running snort to detect and gather information about packets passing through the network, aiding network administrators in identifying malicious content or potential attacks.', 'The concept of virtual private networks (VPNs) is explained, emphasizing their role in securely sharing data across public networks.']}