1 00:00:00,270 --> 00:00:01,110 In this lesson, 2 00:00:01,110 --> 00:00:03,270 we're going to discuss the importance of physical security 3 00:00:03,270 --> 00:00:04,800 to our network security. 4 00:00:04,800 --> 00:00:05,633 After all, 5 00:00:05,633 --> 00:00:07,680 if an attacker can touch your networking equipment, 6 00:00:07,680 --> 00:00:10,020 such as your switches, your routers, your firewalls 7 00:00:10,020 --> 00:00:11,130 and other devices, 8 00:00:11,130 --> 00:00:12,540 they could change your configurations 9 00:00:12,540 --> 00:00:14,490 or completely bypass the devices 10 00:00:14,490 --> 00:00:16,530 by patching around them with patch cables. 11 00:00:16,530 --> 00:00:18,360 So, as we move through this lesson, 12 00:00:18,360 --> 00:00:21,360 we're going to cover both detection and prevention mechanisms 13 00:00:21,360 --> 00:00:23,040 that you can use to protect your network 14 00:00:23,040 --> 00:00:24,630 and its critical equipment. 15 00:00:24,630 --> 00:00:27,030 First, we're going to start with detection mechanisms. 16 00:00:27,030 --> 00:00:29,310 Things like cameras, motion detectors, 17 00:00:29,310 --> 00:00:31,410 asset tags and tamper detection. 18 00:00:31,410 --> 00:00:33,150 When it comes to detection mechanisms 19 00:00:33,150 --> 00:00:34,440 and detective controls, 20 00:00:34,440 --> 00:00:36,240 we're going to be talking about security controls 21 00:00:36,240 --> 00:00:37,560 that are used during an event 22 00:00:37,560 --> 00:00:38,820 to find out whether or not, 23 00:00:38,820 --> 00:00:40,860 something malicious may have happened. 24 00:00:40,860 --> 00:00:42,870 Detection controls are going to be useful in determining 25 00:00:42,870 --> 00:00:43,980 if something happened, 26 00:00:43,980 --> 00:00:45,750 but only after the fact. 27 00:00:45,750 --> 00:00:48,030 These type of controls won't stop something from happening, 28 00:00:48,030 --> 00:00:50,250 but they can provide a method to log it 29 00:00:50,250 --> 00:00:52,500 or identify if a piece of networking equipment 30 00:00:52,500 --> 00:00:55,320 has remained under your control the entire time. 31 00:00:55,320 --> 00:00:56,610 When it comes to cameras, 32 00:00:56,610 --> 00:00:59,010 these are often mounted inside and outside of rooms 33 00:00:59,010 --> 00:01:00,750 that contain your networking gear. 34 00:01:00,750 --> 00:01:02,670 For example, you should have a camera point 35 00:01:02,670 --> 00:01:05,099 at the entrance door to your main distribution frame, 36 00:01:05,099 --> 00:01:06,720 your intermediate distribution frames, 37 00:01:06,720 --> 00:01:09,450 your data center and your telecommunication closets. 38 00:01:09,450 --> 00:01:10,890 When it comes to placing your cameras, 39 00:01:10,890 --> 00:01:12,240 it's really important to understand 40 00:01:12,240 --> 00:01:14,010 where your high value targets are, 41 00:01:14,010 --> 00:01:16,530 and that way you can understand what you need to protect. 42 00:01:16,530 --> 00:01:18,810 If you're pointing the cameras at the entrance or exits, 43 00:01:18,810 --> 00:01:20,190 you'll be able to see when people enter 44 00:01:20,190 --> 00:01:21,270 or leave a data center 45 00:01:21,270 --> 00:01:23,820 or your various telecommunication closets. 46 00:01:23,820 --> 00:01:24,840 In addition to this, 47 00:01:24,840 --> 00:01:26,730 you may wish to have cameras covering the entrance 48 00:01:26,730 --> 00:01:29,100 and exits to your building and your parking lot 49 00:01:29,100 --> 00:01:30,990 to detect if anyone is out there parked 50 00:01:30,990 --> 00:01:32,190 for a long period of time, 51 00:01:32,190 --> 00:01:34,020 trying to connect to your wireless network 52 00:01:34,020 --> 00:01:36,180 and be able to remotely access you from there. 53 00:01:36,180 --> 00:01:39,540 By utilizing a closed circuit TV system or CCTV, 54 00:01:39,540 --> 00:01:41,340 you can either actively monitor these doors 55 00:01:41,340 --> 00:01:44,070 with a security guard or you record the video feeds 56 00:01:44,070 --> 00:01:46,560 and play them back after a suspected incident. 57 00:01:46,560 --> 00:01:49,290 This way, you can verify if anyone entered or left rooms, 58 00:01:49,290 --> 00:01:51,210 containing your network equipment. 59 00:01:51,210 --> 00:01:53,940 Surveillance cameras are going to come in many different types, 60 00:01:53,940 --> 00:01:56,340 including both wired and wireless versions. 61 00:01:56,340 --> 00:01:59,070 A wired camera allows the device to physically be cabled 62 00:01:59,070 --> 00:02:01,890 from the camera all the way to a central monitoring station, 63 00:02:01,890 --> 00:02:04,710 usually using a coaxial cable for analog solutions 64 00:02:04,710 --> 00:02:07,440 or an unshielded twisted pair for digital solutions. 65 00:02:07,440 --> 00:02:09,660 If you're instead using a wireless camera solution, 66 00:02:09,660 --> 00:02:11,460 you don't have to run physical cables. 67 00:02:11,460 --> 00:02:13,710 Instead, they're going to be easier to install, 68 00:02:13,710 --> 00:02:15,720 but you do have some things you have to worry about, 69 00:02:15,720 --> 00:02:16,553 such as interference 70 00:02:16,553 --> 00:02:20,370 with other wireless systems like 802.11 wireless networks. 71 00:02:20,370 --> 00:02:21,870 Also, if they're wireless 72 00:02:21,870 --> 00:02:24,570 and an attacker could jam or break those signals, 73 00:02:24,570 --> 00:02:26,010 they could prevent them from communicating 74 00:02:26,010 --> 00:02:27,660 with the central monitoring station 75 00:02:27,660 --> 00:02:30,330 and that way you wouldn't be able to see the video feed. 76 00:02:30,330 --> 00:02:32,460 In addition to wired and wireless varieties, 77 00:02:32,460 --> 00:02:34,200 there's also indoor and outdoor versions 78 00:02:34,200 --> 00:02:35,400 of surveillance cameras. 79 00:02:35,400 --> 00:02:36,900 If you're going to be monitoring the parking lot 80 00:02:36,900 --> 00:02:38,070 or an external door, 81 00:02:38,070 --> 00:02:39,780 you need to use an outdoor camera 82 00:02:39,780 --> 00:02:43,170 that can withstand the elements like snow, wind and rain. 83 00:02:43,170 --> 00:02:44,003 If instead, 84 00:02:44,003 --> 00:02:45,480 you're going to be monitoring things contained inside 85 00:02:45,480 --> 00:02:46,313 your building, 86 00:02:46,313 --> 00:02:47,790 then you can choose an indoor camera, 87 00:02:47,790 --> 00:02:49,440 because they're going to be a little bit lighter, 88 00:02:49,440 --> 00:02:51,390 cheaper and easier to install. 89 00:02:51,390 --> 00:02:52,950 Normally when a camera is mounted, 90 00:02:52,950 --> 00:02:54,720 it's going to be put in one location 91 00:02:54,720 --> 00:02:56,430 with a fixed field of view. 92 00:02:56,430 --> 00:02:58,080 On some higher end models though, 93 00:02:58,080 --> 00:03:00,810 you can purchase what's known as a PTZ camera. 94 00:03:00,810 --> 00:03:03,750 Now, a PTZ means pan, tilt and zoom. 95 00:03:03,750 --> 00:03:05,490 If you watch any bank heist movies, 96 00:03:05,490 --> 00:03:08,040 you've probably seen these PTZ cameras used. 97 00:03:08,040 --> 00:03:09,060 With these systems, 98 00:03:09,060 --> 00:03:10,770 a security guard can move the camera 99 00:03:10,770 --> 00:03:13,020 from a central monitoring station by panning, 100 00:03:13,020 --> 00:03:14,400 moving it left or right, 101 00:03:14,400 --> 00:03:16,050 tilting, moving it up or down, 102 00:03:16,050 --> 00:03:18,360 or zooming by getting closer or further 103 00:03:18,360 --> 00:03:19,620 with the field of vision, 104 00:03:19,620 --> 00:03:22,050 all from a joystick at the control panel. 105 00:03:22,050 --> 00:03:23,190 Another option to consider 106 00:03:23,190 --> 00:03:26,070 is whether or not to purchase an infrared camera system. 107 00:03:26,070 --> 00:03:27,480 Now, an infrared camera system 108 00:03:27,480 --> 00:03:30,150 will display images based on the amount of heat in a room. 109 00:03:30,150 --> 00:03:32,070 These are really helpful inside our data centers 110 00:03:32,070 --> 00:03:34,650 and telecommunication closets for two reasons. 111 00:03:34,650 --> 00:03:36,630 First, you can quickly and easily identify 112 00:03:36,630 --> 00:03:38,910 where a person is inside a given room. 113 00:03:38,910 --> 00:03:41,610 If an attacker manages to get themself into the data center, 114 00:03:41,610 --> 00:03:43,050 they're not going to be able to hide from you, 115 00:03:43,050 --> 00:03:44,250 because their body heat will create 116 00:03:44,250 --> 00:03:48,000 a bright orange or red glow on an infrared camera. 117 00:03:48,000 --> 00:03:50,010 Second, even if no one is in the room, 118 00:03:50,010 --> 00:03:51,510 you can use an infrared camera 119 00:03:51,510 --> 00:03:53,490 to identify hotspots in the room, 120 00:03:53,490 --> 00:03:56,310 such as when a fan in a server rack isn't working anymore 121 00:03:56,310 --> 00:03:58,440 and therefore heat starts building up. 122 00:03:58,440 --> 00:04:00,990 Using this type of camera could be a way to detect gear 123 00:04:00,990 --> 00:04:03,870 that may overheat before it actually overheats. 124 00:04:03,870 --> 00:04:06,060 The final type of surveillance camera you can purchase 125 00:04:06,060 --> 00:04:08,040 is known as an ultrasonic camera, 126 00:04:08,040 --> 00:04:10,320 which is going to use sound-based detection. 127 00:04:10,320 --> 00:04:12,450 If you've ever watched the "Mission Impossible" movies, 128 00:04:12,450 --> 00:04:14,070 they had an ultrasonic system 129 00:04:14,070 --> 00:04:15,690 that would sit there and listen. 130 00:04:15,690 --> 00:04:17,579 Even if a pin was dropped on the floor, 131 00:04:17,579 --> 00:04:19,200 it would be detected by the camera 132 00:04:19,200 --> 00:04:21,029 at its super sensitive microphones, 133 00:04:21,029 --> 00:04:24,000 then the guards could come and arrest the attacker. 134 00:04:24,000 --> 00:04:25,590 On the other side of physical security, 135 00:04:25,590 --> 00:04:27,330 we also have controls we put in place 136 00:04:27,330 --> 00:04:29,130 to prevent things from happening. 137 00:04:29,130 --> 00:04:30,750 Some prevention methods that we use 138 00:04:30,750 --> 00:04:32,670 are things like access control hardware, 139 00:04:32,670 --> 00:04:34,620 like badge readers and biometrics. 140 00:04:34,620 --> 00:04:37,080 Access control vestibules, smart lockers, 141 00:04:37,080 --> 00:04:40,140 locking racks, locking cabinets and employee training. 142 00:04:40,140 --> 00:04:41,970 When it comes to access control hardware, 143 00:04:41,970 --> 00:04:44,070 we usually are going to rely on either a badge reader 144 00:04:44,070 --> 00:04:46,230 or a biometric reader to control access 145 00:04:46,230 --> 00:04:49,290 to a secure telecommunications closet or data center. 146 00:04:49,290 --> 00:04:51,690 A badge reader is going to rely on either a magnetic strip, 147 00:04:51,690 --> 00:04:52,890 like a credit card, 148 00:04:52,890 --> 00:04:54,720 a chip card like a smart card, 149 00:04:54,720 --> 00:04:57,660 or an RFID or radio frequency ID card. 150 00:04:57,660 --> 00:04:59,610 In general, it's going to be a great practice 151 00:04:59,610 --> 00:05:00,810 to require all your employees 152 00:05:00,810 --> 00:05:03,600 to wear an identification badge within your buildings. 153 00:05:03,600 --> 00:05:06,540 This badge is then used to unlock an electronic lock 154 00:05:06,540 --> 00:05:08,100 on the different doors of your data center 155 00:05:08,100 --> 00:05:09,600 or other secured spaces 156 00:05:09,600 --> 00:05:11,940 in combination with some kind of a knowledge factor, 157 00:05:11,940 --> 00:05:14,550 like a pin number that's unique to that employee. 158 00:05:14,550 --> 00:05:15,383 By doing this, 159 00:05:15,383 --> 00:05:17,700 we now have a two-factor authentication system. 160 00:05:17,700 --> 00:05:19,260 Something you have, your badge 161 00:05:19,260 --> 00:05:21,330 and something you know, your pin. 162 00:05:21,330 --> 00:05:22,200 Some of these locks 163 00:05:22,200 --> 00:05:24,720 can also choose to use a biometric authentication, 164 00:05:24,720 --> 00:05:26,040 instead of a badge. 165 00:05:26,040 --> 00:05:27,780 For example, I've seen some data centers, 166 00:05:27,780 --> 00:05:29,400 protected by a fingerprint reader, 167 00:05:29,400 --> 00:05:32,130 a retina scan or a voice print and a pin. 168 00:05:32,130 --> 00:05:34,740 Again, by adding the pin to the biometric factor, 169 00:05:34,740 --> 00:05:36,660 we're gaining two factor authentication 170 00:05:36,660 --> 00:05:39,270 and making our data center much more secure. 171 00:05:39,270 --> 00:05:40,770 In high security facilities, 172 00:05:40,770 --> 00:05:42,930 they also use an access control vestibule 173 00:05:42,930 --> 00:05:46,050 in combination with an access control hardware or lock. 174 00:05:46,050 --> 00:05:47,400 An access control vestibule 175 00:05:47,400 --> 00:05:49,920 is an area between two doorways that holds people, 176 00:05:49,920 --> 00:05:52,110 until they're identified and authenticated. 177 00:05:52,110 --> 00:05:53,730 Sometimes these are automated, 178 00:05:53,730 --> 00:05:55,620 like using an electronic badge and pin system 179 00:05:55,620 --> 00:05:56,760 that we just discussed, 180 00:05:56,760 --> 00:05:58,110 but sometimes they're actually manned 181 00:05:58,110 --> 00:05:59,370 by a security personnel 182 00:05:59,370 --> 00:06:01,110 who's going to physically look at your badge 183 00:06:01,110 --> 00:06:03,300 to verify you are who you claim to be. 184 00:06:03,300 --> 00:06:04,980 The most common placement of a man trap 185 00:06:04,980 --> 00:06:07,110 is actually at the entrance to your office building. 186 00:06:07,110 --> 00:06:08,610 So, as you enter the building, 187 00:06:08,610 --> 00:06:11,040 there might be an open lobby that anyone can access, 188 00:06:11,040 --> 00:06:12,660 but then there's this set of turnstiles 189 00:06:12,660 --> 00:06:13,740 where you're going to scan your badge 190 00:06:13,740 --> 00:06:15,150 and enter your pin number. 191 00:06:15,150 --> 00:06:17,220 This will allow you to go past those turnstiles 192 00:06:17,220 --> 00:06:18,780 and get into the building. 193 00:06:18,780 --> 00:06:21,270 This area between the front door and the turnstiles, 194 00:06:21,270 --> 00:06:24,630 that is considered the access control vestibule or man trap. 195 00:06:24,630 --> 00:06:26,130 Once you get past that turnstile, 196 00:06:26,130 --> 00:06:27,570 you're now in the secure area 197 00:06:27,570 --> 00:06:28,920 and you've already been authenticated 198 00:06:28,920 --> 00:06:30,540 and now you can be trusted. 199 00:06:30,540 --> 00:06:31,740 In some organizations, 200 00:06:31,740 --> 00:06:34,260 they instead opt to have less secure at the main floor, 201 00:06:34,260 --> 00:06:36,420 and instead they're going to use access control vestibule, 202 00:06:36,420 --> 00:06:38,700 located at key choke points throughout the building 203 00:06:38,700 --> 00:06:40,680 as you go into certain higher security areas 204 00:06:40,680 --> 00:06:41,820 of the building. 205 00:06:41,820 --> 00:06:44,160 Sometimes you may have both at the entrance of the building 206 00:06:44,160 --> 00:06:46,590 that everyone goes in who works in their facility, 207 00:06:46,590 --> 00:06:48,870 but then you have an additional access control vestibule, 208 00:06:48,870 --> 00:06:51,930 going into a higher security area, such as your data center. 209 00:06:51,930 --> 00:06:54,180 In this case, the first access control vestibule 210 00:06:54,180 --> 00:06:56,460 at the main entrance of the building gives you access 211 00:06:56,460 --> 00:06:58,920 to a generic level of organizational security, 212 00:06:58,920 --> 00:07:01,560 but then you need to go into a top secret area. 213 00:07:01,560 --> 00:07:03,780 You then need to go through a second verification 214 00:07:03,780 --> 00:07:06,030 at another access control vestibule. 215 00:07:06,030 --> 00:07:08,850 Next, let's talk about personal electronic devices. 216 00:07:08,850 --> 00:07:10,530 A lot of organizations prevent the use 217 00:07:10,530 --> 00:07:12,750 of personal electronic devices like cell phones, 218 00:07:12,750 --> 00:07:15,720 smartphones and tablets inside their office spaces. 219 00:07:15,720 --> 00:07:18,150 This is done as a form of data loss prevention. 220 00:07:18,150 --> 00:07:20,370 After all, if I can simply carry my smartphone 221 00:07:20,370 --> 00:07:22,020 with me into a top secret building, 222 00:07:22,020 --> 00:07:24,420 I could take pictures of some highly classified documents 223 00:07:24,420 --> 00:07:25,680 from my computer screen, 224 00:07:25,680 --> 00:07:28,020 and then those documents could walk right out the front door 225 00:07:28,020 --> 00:07:29,580 with me on my cell phone. 226 00:07:29,580 --> 00:07:31,350 This would not be very secure. 227 00:07:31,350 --> 00:07:33,060 So, in these organizations, 228 00:07:33,060 --> 00:07:34,140 they're usually going to be located 229 00:07:34,140 --> 00:07:36,420 in something like a government or military building 230 00:07:36,420 --> 00:07:38,880 and they're going to place a smart locker in the entrance, 231 00:07:38,880 --> 00:07:41,220 right before the access control vestibule. 232 00:07:41,220 --> 00:07:43,260 This way, you can drop off your cell phone 233 00:07:43,260 --> 00:07:45,660 and lock it up securely in the smart locker. 234 00:07:45,660 --> 00:07:48,030 Now, a smart locker is a fully integrated system 235 00:07:48,030 --> 00:07:50,370 that looks a lot like a large vending machine. 236 00:07:50,370 --> 00:07:52,350 Basically, you're going to scan your employee badge 237 00:07:52,350 --> 00:07:54,540 at the smart locker on a digital badge reader. 238 00:07:54,540 --> 00:07:57,090 Then you pick an open locker from the display screen, 239 00:07:57,090 --> 00:07:58,350 and once you select it, 240 00:07:58,350 --> 00:08:00,690 that is going to unlock and open up that locker. 241 00:08:00,690 --> 00:08:03,390 You then put in your laptop, your tablet, your smartphone, 242 00:08:03,390 --> 00:08:06,150 your smartwatch or other valuables inside the locker 243 00:08:06,150 --> 00:08:07,830 and once you shut the door to the locker, 244 00:08:07,830 --> 00:08:09,090 it automatically is going to lock 245 00:08:09,090 --> 00:08:10,950 and you can go about the rest of your day. 246 00:08:10,950 --> 00:08:12,330 Whenever you need to get your things back, 247 00:08:12,330 --> 00:08:13,890 you go back to the display screen, 248 00:08:13,890 --> 00:08:16,110 click Open Locker, and scan your badge. 249 00:08:16,110 --> 00:08:18,240 At that point, the locker will unlock again 250 00:08:18,240 --> 00:08:20,370 and you can retrieve your items from the locker. 251 00:08:20,370 --> 00:08:22,350 Next, let's talk about protecting the things 252 00:08:22,350 --> 00:08:24,240 that are inside of our data center. 253 00:08:24,240 --> 00:08:26,220 Now, once we get inside of our data center 254 00:08:26,220 --> 00:08:27,810 or telecommunication closets, 255 00:08:27,810 --> 00:08:29,280 you're going to see racks or cabinets 256 00:08:29,280 --> 00:08:30,900 that contain the different networking equipment 257 00:08:30,900 --> 00:08:32,640 and servers that we're going to use. 258 00:08:32,640 --> 00:08:34,679 A standard server and networking equipment rack 259 00:08:34,679 --> 00:08:38,400 is about 48 units high, also known as 48U. 260 00:08:38,400 --> 00:08:41,700 This is also about 50 inches deep and about 20 inches wide. 261 00:08:41,700 --> 00:08:43,110 These can house networking equipment, 262 00:08:43,110 --> 00:08:44,460 like switches and routers, 263 00:08:44,460 --> 00:08:45,900 patch panels, servers, 264 00:08:45,900 --> 00:08:48,990 rack mounted undirected power supplies and much more. 265 00:08:48,990 --> 00:08:51,240 To protect these devices from being tampered with, 266 00:08:51,240 --> 00:08:54,690 these racks and cabinets may contain a small key lock. 267 00:08:54,690 --> 00:08:56,430 By these racking cabinets, 268 00:08:56,430 --> 00:08:58,980 you can control physical access to your equipment. 269 00:08:58,980 --> 00:09:01,260 Generally, one person will be the key custodian 270 00:09:01,260 --> 00:09:02,370 for the data center 271 00:09:02,370 --> 00:09:04,200 and that person will also maintain a log 272 00:09:04,200 --> 00:09:06,120 of who has which keys and when 273 00:09:06,120 --> 00:09:07,350 in case that information is needed, 274 00:09:07,350 --> 00:09:08,850 during an incident response. 275 00:09:08,850 --> 00:09:10,050 Finally, we need to talk about 276 00:09:10,050 --> 00:09:11,970 the most beneficial prevention mechanism 277 00:09:11,970 --> 00:09:13,860 that you have that you can invest in 278 00:09:13,860 --> 00:09:15,630 and this is employee training. 279 00:09:15,630 --> 00:09:17,760 According to a study by Forrester Research, 280 00:09:17,760 --> 00:09:19,980 providing employee cybersecurity awareness training, 281 00:09:19,980 --> 00:09:22,620 produced a 69% return on investment 282 00:09:22,620 --> 00:09:24,360 for small to medium sized companies 283 00:09:24,360 --> 00:09:26,790 and a 248% return on investment 284 00:09:26,790 --> 00:09:28,800 for large enterprise organizations. 285 00:09:28,800 --> 00:09:29,940 The data supports it. 286 00:09:29,940 --> 00:09:32,580 Employee training is a great investment. 287 00:09:32,580 --> 00:09:34,080 This is particularly true, 288 00:09:34,080 --> 00:09:37,050 because the biggest weakness in our networks is our users 289 00:09:37,050 --> 00:09:38,160 and the administrators, 290 00:09:38,160 --> 00:09:40,320 because both of these people are going to use 291 00:09:40,320 --> 00:09:41,430 and run our networks 292 00:09:41,430 --> 00:09:43,140 and they're going to cause a lot of problems for us 293 00:09:43,140 --> 00:09:44,880 if they're not trained properly. 294 00:09:44,880 --> 00:09:47,280 If an administrator configures a device, for example, 295 00:09:47,280 --> 00:09:48,600 that creates a vulnerability 296 00:09:48,600 --> 00:09:50,310 that could be exploited by an attacker. 297 00:09:50,310 --> 00:09:52,680 If an end user clicks on a link in a phishing email, 298 00:09:52,680 --> 00:09:55,260 they can cause the organization to get infected with malware 299 00:09:55,260 --> 00:09:56,250 and spend a lot of time 300 00:09:56,250 --> 00:09:57,750 and effort cleaning up this mess, 301 00:09:57,750 --> 00:09:59,430 during an incident response. 302 00:09:59,430 --> 00:10:01,140 When you're conducting your employee training, 303 00:10:01,140 --> 00:10:03,960 it's important to stress the proper policies and procedures 304 00:10:03,960 --> 00:10:05,310 that the employees need to follow 305 00:10:05,310 --> 00:10:07,290 in regards to both their physical security, 306 00:10:07,290 --> 00:10:09,900 such as challenging personnel to show their employee badges 307 00:10:09,900 --> 00:10:11,100 or questioning why certain people 308 00:10:11,100 --> 00:10:12,720 are trying to access certain areas 309 00:10:12,720 --> 00:10:15,300 and technical security such as malware prevention 310 00:10:15,300 --> 00:10:16,713 and anti-phishing training.