1 00:00:00,260 --> 00:00:07,040 There's an English phrase that says a chain is no stronger than its weakest link, which means that 2 00:00:07,040 --> 00:00:10,430 a group is only as strong as its weakest link. 3 00:00:10,460 --> 00:00:16,540 In networking terms, this holds the core, as discussed and explored in previous lectures. 4 00:00:16,550 --> 00:00:24,170 You, as a new network security expert need to identify and account for a single point of failure and 5 00:00:24,170 --> 00:00:30,470 implement a highly dependable process that will be put in place to mitigate such instances. 6 00:00:30,920 --> 00:00:36,140 We should also ensure that the appropriate controls are implemented around such suspectable resources 7 00:00:36,140 --> 00:00:39,800 of the network as per their risk profile. 8 00:00:40,760 --> 00:00:43,820 Continuous monitoring and improvement. 9 00:00:43,850 --> 00:00:49,820 Proactive network scanning should be implemented to hunt for unauthorized devices in the network and 10 00:00:49,820 --> 00:00:52,850 to monitor for suspicious activity in the network. 11 00:00:53,060 --> 00:00:58,820 This would ultimately lead to the requirement of a well defined incident response mechanism. 12 00:00:59,390 --> 00:01:07,050 Being a critical operational function in OC also needs to aim for continuous improvement concerning 13 00:01:07,050 --> 00:01:14,850 processes, approaches and turnaround time to showcase business outcomes and value creation. 14 00:01:14,880 --> 00:01:22,890 The major focus here is to verify whether all the deployments are accurate and operate as expected. 15 00:01:23,190 --> 00:01:31,720 The idea is to evaluate the actual versus expected levels of service delivery and performance. 16 00:01:31,740 --> 00:01:38,670 Now that we are familiar with the various network security concepts and their key components, next 17 00:01:38,670 --> 00:01:44,640 we will take a look at the systematic approach that organizations should follow for a comprehensive 18 00:01:44,640 --> 00:01:46,380 network security architecture. 19 00:01:46,620 --> 00:01:49,590 Due diligence and cyber resilience. 20 00:01:49,680 --> 00:01:56,760 An organization must have a cyber security program that aims to annually review the cyber resilience 21 00:01:56,760 --> 00:01:58,710 of the organization's network. 22 00:01:58,740 --> 00:02:01,530 This is important for various aspects. 23 00:02:01,890 --> 00:02:10,440 First, this ensures that the operations team is ensuring due care and due diligence across the network. 24 00:02:12,280 --> 00:02:18,460 This gives the leadership and operations team visibility into how the network has evolved over this 25 00:02:18,460 --> 00:02:21,580 period and what new changes have been made. 26 00:02:21,580 --> 00:02:29,890 So how they impact the network topology and how these changes the threat landscape from the organisations 27 00:02:29,890 --> 00:02:36,700 in terms of new threats and vulnerabilities, respectability that may stem from these changes. 28 00:02:36,730 --> 00:02:43,690 This also helps in mapping the relevancy of the security controls and level of compliance.