1 00:00:00,780 --> 00:00:07,440 Just thinking about the huge amount of sensitive data that is bouncing all over the Internet, 24 by 2 00:00:07,440 --> 00:00:15,240 seven makes me want to scream the word security, it is seriously clear that we need it almost as much 3 00:00:15,240 --> 00:00:15,820 as air. 4 00:00:15,840 --> 00:00:16,240 Right. 5 00:00:16,260 --> 00:00:18,870 I hope you understand words. 6 00:00:19,140 --> 00:00:27,060 Most of that data is sent out over the Internet without any encryption or any security measures, but 7 00:00:27,510 --> 00:00:34,680 at least not really the sensitive stuff which should be sent via one of the several different security 8 00:00:34,680 --> 00:00:36,210 protocols available today. 9 00:00:37,290 --> 00:00:45,270 Now, these vital protocols are really sets of conditions or rules that define how a secure connection 10 00:00:45,270 --> 00:00:46,230 is maintained. 11 00:00:46,500 --> 00:00:53,280 And when we send sensitive data through an unsecured medium like the Internet or a wireless connection 12 00:00:54,360 --> 00:01:00,630 before talking about the security protocols that data network exams or any other placement interviews 13 00:01:00,750 --> 00:01:04,140 you can ask on, I'd like to define a few terms. 14 00:01:04,920 --> 00:01:06,570 The first one is tunnelling. 15 00:01:07,170 --> 00:01:13,950 Now, tunnelling is basically a means of encapsulating one protocol with another protocol to ensure 16 00:01:13,950 --> 00:01:15,960 that the transmission is secure. 17 00:01:16,900 --> 00:01:19,410 Now, let's give an example. 18 00:01:19,740 --> 00:01:23,720 Uh, the lion's share of us use IP protocol, right? 19 00:01:23,730 --> 00:01:30,960 That is the Internet protocol known as the payload protocol, which can be encapsulated within a delivery, 20 00:01:31,530 --> 00:01:34,740 like the delivery protocol, like the IP sick. 21 00:01:35,580 --> 00:01:40,290 If you take a look at these individual packets, you would see that they're encrypted. 22 00:01:40,770 --> 00:01:46,590 If you look at the process as a whole, it appears that a point to point channel is created over the 23 00:01:46,590 --> 00:01:47,230 Internet. 24 00:01:48,600 --> 00:01:56,490 Now, make a note to yourself that usually standard protocol works at the higher level than the layer 25 00:01:56,700 --> 00:02:00,070 of than the layer in which the payload protocol is working. 26 00:02:00,720 --> 00:02:03,010 So basically a tunnel is like this. 27 00:02:03,010 --> 00:02:07,530 So if you can see here this image, so I'll take my pen. 28 00:02:08,220 --> 00:02:16,650 This tunnel is basically the IP protocol and these are the data packets that are going through the Internet 29 00:02:16,650 --> 00:02:17,150 protocol. 30 00:02:17,520 --> 00:02:24,240 It's like a protective measure so that hackers are the interceptors cannot have your data and generally 31 00:02:24,240 --> 00:02:33,300 this is together is encrypted and then sent or or you can just and encrypt this package and sent through 32 00:02:33,660 --> 00:02:35,020 the IP protocol. 33 00:02:35,880 --> 00:02:37,790 This is the basic idea of tunneling. 34 00:02:38,100 --> 00:02:44,310 You just have to imagine a tunnel and the car's going through it are the individual packets. 35 00:02:44,310 --> 00:02:49,860 And if someone tries to attack the tunnels or someone tries to harm that car, the tunnel is there to 36 00:02:49,860 --> 00:02:51,180 protect those cars. 37 00:02:51,600 --> 00:02:53,760 That is the basic idea of tunneling. 38 00:02:54,150 --> 00:02:57,840 In the next lecture, we'll see about the virtual private network. 39 00:02:58,500 --> 00:03:01,040 I'm pretty sure that most of you use weapons. 40 00:03:01,050 --> 00:03:07,980 But in the next lecture, let us have a clear idea of why do we need to use weapons and what are exactly 41 00:03:07,980 --> 00:03:08,670 weapons?