1 00:00:00,090 --> 00:00:01,140 All right, welcome back, everyone. 2 00:00:02,520 --> 00:00:08,640 We have just learned about Margaret, but remember, this is on the digital world, Margaret, just 3 00:00:08,640 --> 00:00:09,660 one type of turn. 4 00:00:09,870 --> 00:00:13,950 OK, and what is true, of course, will be going in much more detail. 5 00:00:13,950 --> 00:00:15,360 But just get the idea. 6 00:00:15,840 --> 00:00:20,280 It's nothing but a potential of of loss. 7 00:00:20,280 --> 00:00:20,660 Right. 8 00:00:20,890 --> 00:00:23,910 Any possible loss could be treated as a threat. 9 00:00:24,240 --> 00:00:24,730 OK. 10 00:00:25,220 --> 00:00:32,460 And when it comes to the digital world, it's all about, you know, your digital you know, if you 11 00:00:32,460 --> 00:00:36,440 have any assets, you will always be having threats to your assets. 12 00:00:36,450 --> 00:00:43,140 If you have any sort of assets, that's where you you know, you keep applying all the security to protect 13 00:00:43,140 --> 00:00:44,100 from the threats. 14 00:00:44,370 --> 00:00:49,440 In the real world, threats could be anything that could be strong, Cyclone. 15 00:00:49,680 --> 00:00:54,840 It could be, you know, any any sort of natural calamities as well in the digital world. 16 00:00:55,380 --> 00:00:57,990 Threats are usually can be any sort of stuff. 17 00:00:57,990 --> 00:01:00,480 Threats can be hackers. 18 00:01:00,840 --> 00:01:08,760 Threats could be, you know, possibly damage because of heat up and ups issue and all of those stuff 19 00:01:08,760 --> 00:01:12,090 which could lead to your loss of your digital assets. 20 00:01:12,110 --> 00:01:13,340 So let me give you an idea. 21 00:01:14,550 --> 00:01:19,890 So although I'm referring it to understand, but it also applicable for everything. 22 00:01:19,900 --> 00:01:20,210 Right. 23 00:01:20,220 --> 00:01:24,660 But as we have focus above understand as part of our initial section. 24 00:01:24,660 --> 00:01:26,190 So we'll be covering that. 25 00:01:27,600 --> 00:01:31,640 The first threat for Andersen is about unrecognized software. 26 00:01:32,010 --> 00:01:32,430 Right. 27 00:01:32,890 --> 00:01:39,210 You might have might have seen that you installed some software that you don't see the you know, you 28 00:01:39,210 --> 00:01:46,680 the moment you click, click, install on it, the windows pop up, comes in and it says, OK, the 29 00:01:46,800 --> 00:01:51,120 publisher information, the software publishing, it seems to be unknown, but you really want to go 30 00:01:51,120 --> 00:01:52,560 ahead and you get to option. 31 00:01:52,570 --> 00:01:53,250 Yes or no. 32 00:01:53,400 --> 00:01:55,590 If once you do yes, then only you will go. 33 00:01:55,660 --> 00:01:57,660 And, you know, installation really works. 34 00:01:58,230 --> 00:02:04,710 That's where usually in those situations when the publisher of the software is not known or the cert 35 00:02:05,010 --> 00:02:11,880 is not known, it could possibly impact the system and the system never know. 36 00:02:11,880 --> 00:02:19,590 I mean, if what's the source of the software and, you know, how what's the trust of the software 37 00:02:19,590 --> 00:02:19,980 as well? 38 00:02:19,980 --> 00:02:26,020 And it might be impacted by anyone ability or might be intentionally impacting your system as well. 39 00:02:26,400 --> 00:02:29,740 So this is also one of the really critical trip. 40 00:02:29,850 --> 00:02:35,520 And when you start walking into the enterprise network as maybe a cyber security analyst, they have 41 00:02:35,520 --> 00:02:37,950 a culture of white listing and blacklisting stuff. 42 00:02:38,340 --> 00:02:39,570 Usually they prefer white. 43 00:02:39,810 --> 00:02:46,170 And that's where the white list every application which is having, which is, you know, well-known 44 00:02:46,170 --> 00:02:51,870 in the organization, which is, you know, known to everyone and which is trusted by the application, 45 00:02:51,870 --> 00:02:53,670 trusted by the security. 46 00:02:53,970 --> 00:02:56,580 And then only it becomes a recognized software. 47 00:02:56,910 --> 00:03:02,160 The software, which are not part of the white list, they become the unrecognized software and they 48 00:03:02,160 --> 00:03:04,130 never get installed on your machine. 49 00:03:04,140 --> 00:03:04,430 Right. 50 00:03:05,310 --> 00:03:07,270 And and that's become the model. 51 00:03:07,270 --> 00:03:13,250 But this is what we have just learned about malware is the one which where where the real or even wider 52 00:03:13,260 --> 00:03:20,610 systems ransomware already comes in, exploit backdoor and all the stuff where the where there are humans 53 00:03:20,610 --> 00:03:27,840 or hackers are involved and the payloads are sent for intentionally compromising the target system. 54 00:03:28,530 --> 00:03:31,570 Next scandal, potentially unwanted application. 55 00:03:31,770 --> 00:03:38,760 This is again, you know, and, you know, unlike the software, this is the unwanted software which 56 00:03:38,760 --> 00:03:45,060 is falling into view, which could be bundle application application, which has multiple other applications 57 00:03:45,060 --> 00:03:45,410 into it. 58 00:03:45,450 --> 00:03:49,780 We are not sure how they would really react to advertising information. 59 00:03:50,100 --> 00:03:55,380 There will there are many applications who are trusted, but they still might be gathering information 60 00:03:55,710 --> 00:03:58,230 which are not adhered to the compliance. 61 00:03:58,470 --> 00:04:04,740 So in those situations, the price block, those applications will never get installed on your machine 62 00:04:04,950 --> 00:04:05,430 again. 63 00:04:05,430 --> 00:04:11,670 The white listing that you don't want listing strategies, you know, they make use of it heavily in 64 00:04:11,670 --> 00:04:12,800 this situation as well. 65 00:04:13,230 --> 00:04:18,630 I hope you got the idea about threats when it comes to the windows will get you in the next session 66 00:04:18,930 --> 00:04:22,490 where we understand about backdoor a more or less. 67 00:04:22,890 --> 00:04:23,290 All right. 68 00:04:23,310 --> 00:04:23,850 We'll get you.