1 00:00:00,150 --> 00:00:04,330 In this video, we're going to go over the four elements of security. 2 00:00:04,350 --> 00:00:11,460 So these are essentially the four things that you need to understand as far as what security is really 3 00:00:11,460 --> 00:00:16,110 centered around and at a foundational level, what really security is about. 4 00:00:16,110 --> 00:00:22,860 Because in order for you to be successful cybersecurity professional and ethical hacker, you need to 5 00:00:22,860 --> 00:00:26,840 understand these four components here and these four elements. 6 00:00:26,850 --> 00:00:29,840 And so we're going to go ahead and walk through these one by one. 7 00:00:29,850 --> 00:00:31,420 So let's go right ahead and jump in here. 8 00:00:31,440 --> 00:00:37,710 So the first thing that you need to understand is that all attacks are an attempt to breach a computer 9 00:00:37,950 --> 00:00:43,230 system security, and that security consists of these four basic elements. 10 00:00:43,260 --> 00:00:44,580 Now, here's the thing. 11 00:00:44,850 --> 00:00:52,470 A hacker's goal is always to exploit any type of vulnerabilities in a system or network to find a specific 12 00:00:52,470 --> 00:00:55,780 weakness in a one of these four elements of security. 13 00:00:55,800 --> 00:01:02,040 That's why it's important to understand what these four are and the different types of attacks that 14 00:01:02,040 --> 00:01:04,530 are generally within these four elements. 15 00:01:04,530 --> 00:01:07,060 So let's go right ahead and go into the first one here. 16 00:01:07,620 --> 00:01:09,850 So the first one is confidentiality. 17 00:01:10,380 --> 00:01:12,060 The second one's authenticity. 18 00:01:12,060 --> 00:01:15,750 And we're going to walk into these and some detail here and some examples. 19 00:01:15,990 --> 00:01:19,320 And then we have integrity and then we have availability. 20 00:01:19,330 --> 00:01:23,250 So, for example, a denial of service, right deoxy attack. 21 00:01:23,250 --> 00:01:28,650 A hacker is attacking the availability elements of a system and network. 22 00:01:28,920 --> 00:01:30,660 For one, they can take many forms. 23 00:01:30,660 --> 00:01:35,880 But the main purpose here is to use up the system resources or the bandwidth. 24 00:01:35,910 --> 00:01:42,750 So what typically do is they'll flood a bunch of incoming messages, a bunch of overloaded data information 25 00:01:42,990 --> 00:01:44,380 to target the system. 26 00:01:44,640 --> 00:01:50,460 And so what essentially will do is force itself to shut down, therefore denying any type of service 27 00:01:50,460 --> 00:01:53,540 to the actual legitimate users of the system. 28 00:01:53,550 --> 00:01:59,510 So they're going to overloaded so that owners of the information are not able to access it. 29 00:01:59,580 --> 00:02:01,170 That's the availability factor. 30 00:02:01,380 --> 00:02:08,550 And then stealing passwords or any other type of data is a confidentiality attack because it allows 31 00:02:08,550 --> 00:02:14,430 someone other than the actual recipient to gain access right there, hacking some type of network. 32 00:02:14,430 --> 00:02:19,050 And they're looking to get information, passwords, records, whatever that may be. 33 00:02:19,080 --> 00:02:22,890 That's on the confidentiality aspect. 34 00:02:22,890 --> 00:02:23,160 Right. 35 00:02:23,160 --> 00:02:28,950 An element so very important to understand the different types of attacks within these four elements. 36 00:02:29,130 --> 00:02:35,190 The next one here we have flipping, for example, these types of attacks are considered integrity attacks 37 00:02:35,190 --> 00:02:40,710 because the data may have been tampered with in transit or within the original system. 38 00:02:40,710 --> 00:02:46,890 So let's say somebody is using some sort of digital signature software and they send some important 39 00:02:46,890 --> 00:02:47,970 document right. 40 00:02:47,970 --> 00:02:52,260 To another recipient, you know, digital signature to be made there. 41 00:02:52,260 --> 00:02:59,640 An attacker can come in and they can actually modify the actual document and they can change up the 42 00:02:59,640 --> 00:03:00,120 numbers. 43 00:03:00,130 --> 00:03:04,410 And so let's say that it's an invoice or some sort of promissory note. 44 00:03:04,560 --> 00:03:09,780 They can go in there and change, you know, hey, ten dollars is what you owe us to. 45 00:03:09,900 --> 00:03:12,640 Ten thousand dollars is what you actually owe us. 46 00:03:12,840 --> 00:03:15,330 That's how the information can be manipulated. 47 00:03:15,360 --> 00:03:19,340 It's an integrity type of element that is the factor there. 48 00:03:19,950 --> 00:03:26,040 And then finally, here we have the Mac address spoofing, which is an authentication attack because 49 00:03:26,040 --> 00:03:32,760 it allows an unauthorized device to connect to a network such as one that is wireless. 50 00:03:32,760 --> 00:03:33,030 Right. 51 00:03:33,030 --> 00:03:39,240 Because the Mac address is like an IP address, but it's for your local network and essentially get 52 00:03:39,240 --> 00:03:44,010 authenticated and get access to your network, your router, whatever that may be. 53 00:03:44,010 --> 00:03:44,370 Right. 54 00:03:44,580 --> 00:03:47,110 Do whatever they want with that information. 55 00:03:47,130 --> 00:03:51,320 So these are the four basic elements of security. 56 00:03:51,510 --> 00:03:58,170 It's important for you to understand what these are and how they can be taken advantage of through different 57 00:03:58,170 --> 00:04:01,650 malicious attacks so that you can know what to look for. 58 00:04:01,680 --> 00:04:03,480 So that's going to be here for this one. 59 00:04:03,480 --> 00:04:04,980 And we'll see you on the next one.