1 00:00:00,840 --> 00:00:07,170 So far, we have learned a lot about networking standards and related technologies and even know how 2 00:00:07,170 --> 00:00:12,440 to make computers and devices communicate so that you can get a network up and running. 3 00:00:13,110 --> 00:00:17,350 But there's more because network security is absolutely critical. 4 00:00:17,610 --> 00:00:23,000 I'm going to equip you with the knowledge you need to keep your network safe from hackers. 5 00:00:23,730 --> 00:00:30,750 Yes, communication and accessing the information you need is all good, but knowing the exactly who 6 00:00:30,750 --> 00:00:33,430 is at the other end of the connection is also vital. 7 00:00:34,140 --> 00:00:39,870 Now, this means that you need ways to confirm that the person or the computer at the other end of the 8 00:00:39,870 --> 00:00:44,350 connection is really supposed to be accessing the resource it's trying to. 9 00:00:44,970 --> 00:00:51,810 And even whether the resources or the entities that we are contacting are really who and what they appear 10 00:00:51,810 --> 00:00:52,170 to be. 11 00:00:53,040 --> 00:00:59,040 Seriously, if you don't have network security firmly in place, you are flying dangerously blind. 12 00:00:59,700 --> 00:01:05,880 You could be inadvertently exposing critical data to people who have no right to see that information 13 00:01:06,150 --> 00:01:09,300 and may even intend to exploit it in a big way. 14 00:01:10,440 --> 00:01:15,530 So in this section will focus on some very important pieces of the security puzzle. 15 00:01:16,380 --> 00:01:22,920 The first things that are security filtering and user authentication, the how do we know who is really 16 00:01:22,920 --> 00:01:24,570 at the other end of our connections? 17 00:01:25,200 --> 00:01:32,940 The answer to that may seem simple enough because the computer or the person on the other end must identify 18 00:01:32,940 --> 00:01:36,150 him or herself, right or wrong. 19 00:01:36,510 --> 00:01:41,190 That's not good enough because people, especially hackers, lie. 20 00:01:41,940 --> 00:01:48,150 So it's totally naive to assume that person or computer on the other end of the line is who they are 21 00:01:48,150 --> 00:01:49,980 claiming to be sacked. 22 00:01:49,980 --> 00:01:57,360 But true hackers use many tools out there today with the precise goal of convincing us that someone 23 00:01:57,360 --> 00:02:00,120 else, that is to try to impersonate people. 24 00:02:00,990 --> 00:02:07,680 And we all know that someone has been a victim of this and they have failed to identify theft. 25 00:02:07,920 --> 00:02:14,040 And that is why, thanks to the bad guys with the right spoofing software in hand, which helps us make 26 00:02:14,130 --> 00:02:15,690 it easier to identify them. 27 00:02:17,530 --> 00:02:24,250 This means it's imperative to control who or what can get into one network by identifying the specific 28 00:02:24,250 --> 00:02:24,970 computers. 29 00:02:25,810 --> 00:02:31,810 Well, for starters, I'm going to cover some basic ways to safely allow the computers. 30 00:02:32,050 --> 00:02:38,920 You want to have access in your network, plus keep the weeds out of the ones you honestly don't want 31 00:02:38,920 --> 00:02:39,520 people to. 32 00:02:40,300 --> 00:02:46,330 The first line of defense is something called security filtering, which broadly refers to the V's to 33 00:02:46,330 --> 00:02:49,330 let people securely access your resources. 34 00:02:50,020 --> 00:02:58,090 This process is twofold, and it includes ensuring that only authorized computers get entry to a network, 35 00:02:58,390 --> 00:03:05,590 making sure that the data you are sending back and forth between the networks is secured so that it 36 00:03:05,590 --> 00:03:09,720 can be intercepted and translated by bad guys. 37 00:03:09,730 --> 00:03:13,420 It's sorry and it cannot be intercepted by bad guys. 38 00:03:13,420 --> 00:03:18,670 And that is why we need a security filtering and the idea of network security. 39 00:03:19,790 --> 00:03:22,930 So this was it for this lecture. 40 00:03:22,940 --> 00:03:30,760 So the basic idea of security filtering, as the words suggest, is to disallow bad guys from entering 41 00:03:30,760 --> 00:03:34,630 into your network and not allowing them to tamper with your data. 42 00:03:35,170 --> 00:03:40,840 So there are various security filtering techniques like access control list encryption, which we are 43 00:03:40,840 --> 00:03:42,370 going to see in this section. 44 00:03:42,890 --> 00:03:45,390 So let us get started with the next lecture.