1 00:00:01,680 --> 00:00:06,600 Spoke students saw one more important thing before we move on to the next lecture. 2 00:00:07,290 --> 00:00:13,950 As you can see, the cybersecurity has become very important and there are many courses charging a whole 3 00:00:13,950 --> 00:00:23,430 lot of money that actually are secure as it is doing our best quality education with a minimal amount. 4 00:00:23,430 --> 00:00:26,850 Or some of you may have seen the freak of an intruder. 5 00:00:27,360 --> 00:00:31,790 Now, as a team, we need support and we need your motivation. 6 00:00:31,830 --> 00:00:38,620 So what we expect from you is just a simple routine if need not be a five star review on anything. 7 00:00:38,640 --> 00:00:41,180 We're not going to tell you it's your choice. 8 00:00:41,190 --> 00:00:43,050 If you want to give you a fight started. 9 00:00:43,350 --> 00:00:43,660 Stop. 10 00:00:43,660 --> 00:00:50,820 I'm not I'm not one to instruct, but want a review from decision really keep us motivated. 11 00:00:51,300 --> 00:00:55,170 So many of you actually have questioned me how to give a review. 12 00:00:55,290 --> 00:00:59,820 So now I'm going to show you how do you need to write a review for the class? 13 00:01:01,980 --> 00:01:08,440 So as a consumer, you need the rating is a good is option so you can click here. 14 00:01:08,790 --> 00:01:10,220 And how would you read this? 15 00:01:11,070 --> 00:01:18,480 I want you to please honestly give me your feedback, because your feedback is very valuable to us and 16 00:01:18,480 --> 00:01:24,390 we will try our best to give more interesting content every month. 17 00:01:24,400 --> 00:01:30,960 So I'm going to select Firestar because I am very proud of myself that I am doing some good for the 18 00:01:30,960 --> 00:01:32,980 community by doing this. 19 00:01:33,690 --> 00:01:36,240 So just tell us about your personal experience. 20 00:01:36,250 --> 00:01:37,640 Was it a good match for you? 21 00:01:37,640 --> 00:01:43,620 You can write anything or you can just write it as a good cause. 22 00:01:44,580 --> 00:01:51,960 See, people, we really need you to support us because we are working days and nights to drop and record 23 00:01:51,960 --> 00:01:52,530 this video. 24 00:01:52,540 --> 00:02:00,180 So all you can do is just give us everything you can even it's your choice of to give the number of 25 00:02:00,210 --> 00:02:00,460 it. 26 00:02:00,490 --> 00:02:05,790 So save and continue and you can select these options or it's optional. 27 00:02:05,790 --> 00:02:06,950 You can just skip. 28 00:02:07,290 --> 00:02:14,520 So I say everything else because I think I'm delivering the course the point safe and continue. 29 00:02:15,030 --> 00:02:17,970 And that's I'm not going to save my life. 30 00:02:17,970 --> 00:02:19,650 I'm not going to give this account. 31 00:02:20,160 --> 00:02:23,310 It's faulty information security purpose, of course. 32 00:02:23,310 --> 00:02:23,640 Yeah. 33 00:02:24,180 --> 00:02:26,550 So save that. 34 00:02:26,550 --> 00:02:27,360 Is it students? 35 00:02:27,360 --> 00:02:30,480 We are just expecting a small review from you. 36 00:02:30,480 --> 00:02:36,160 Please help us and please support us by writing that if you let us start with the next picture. 37 00:02:38,600 --> 00:02:46,880 Great, so far we have seen the CIA tried what its confidentiality, integrity, availability, we have 38 00:02:46,880 --> 00:02:48,680 seen what is a vulnerability. 39 00:02:49,010 --> 00:02:52,820 We have seen what is a threat, impact and risk. 40 00:02:53,150 --> 00:03:00,680 And now it is time to have a quick recap by actually seeing the relationship between all these information 41 00:03:00,680 --> 00:03:01,970 security aspects. 42 00:03:02,690 --> 00:03:08,180 So here's a wonderful diagram that you will have to remember throughout your life if you really want 43 00:03:08,180 --> 00:03:10,280 to get into information security. 44 00:03:12,530 --> 00:03:20,540 So controls are in place in order to reduce the risk controls are in place to order to reduce the risks, 45 00:03:20,900 --> 00:03:24,470 controls can also reduce the vulnerabilities. 46 00:03:24,470 --> 00:03:28,760 And that is why the auditors are in place to implement the security controls. 47 00:03:29,450 --> 00:03:34,540 But controls can have vulnerabilities as well. 48 00:03:34,550 --> 00:03:40,140 If the controls are not properly modified, it can result in two vulnerabilities. 49 00:03:40,820 --> 00:03:47,900 Well, if the vulnerabilities are present, they will increase the risk on the organization and in turn, 50 00:03:47,900 --> 00:03:51,470 risks can harm the assets of an organization. 51 00:03:52,670 --> 00:03:59,990 Also, many assets have vulnerabilities, like, for example, a router is not configured properly. 52 00:03:59,990 --> 00:04:02,690 Then a router is an asset for an organization. 53 00:04:03,050 --> 00:04:09,860 But at the same time, misconfiguration is a vulnerability and threats exploit the vulnerabilities. 54 00:04:09,860 --> 00:04:15,130 We have seen that and threats also increase the risk to an organization. 55 00:04:15,740 --> 00:04:21,210 So this is one complete chart of fundamental concepts of information security. 56 00:04:21,650 --> 00:04:27,350 This is a good to go chart and make sure that you note down this chart in your notes. 57 00:04:27,620 --> 00:04:35,360 And if anyone asks questions to you regarding information security fundamentals, you will you can answer 58 00:04:35,360 --> 00:04:36,740 them through this chart. 59 00:04:37,190 --> 00:04:43,730 And I'm pretty sure by this time you have understood all the fundamental concepts of information security. 60 00:04:44,000 --> 00:04:51,110 And now it's time to move on to the information security management system concept that it is the iciness, 61 00:04:51,560 --> 00:04:53,180 I hope, in enjoying this goal. 62 00:04:53,180 --> 00:05:00,260 And I really appreciate you watching this lecture because it takes a great amount of dedication and 63 00:05:00,260 --> 00:05:02,720 perseverance to come to this point. 64 00:05:03,050 --> 00:05:04,700 I will see you in the next section.