1 00:00:00,090 --> 00:00:03,420 Pronounced welcome in network security fundamental course. 2 00:00:03,690 --> 00:00:09,030 Before we enter the video section of network security fundamentals, we must understand broadly the 3 00:00:09,030 --> 00:00:10,380 meaning of computer network. 4 00:00:10,530 --> 00:00:16,740 Is that what is the computer network now in network calls his top two or more computers that are linked 5 00:00:16,860 --> 00:00:21,810 in order to serve this source, exchange fires or allow electronic communications. 6 00:00:21,990 --> 00:00:26,040 It's called that computer network means that computer network is the matter. 7 00:00:26,270 --> 00:00:31,290 My image, we connect the computers for action, the different type of computer components. 8 00:00:31,770 --> 00:00:34,740 Now computer networks are divided into five types. 9 00:00:35,070 --> 00:00:37,220 First is the local media notebook. 10 00:00:37,410 --> 00:00:41,060 Shortly we can say it's like a local area network. 11 00:00:41,130 --> 00:00:48,720 Egypt Private Property Network in a building, a line it used to connect by cell computers and workstations 12 00:00:48,840 --> 00:00:52,750 in the office or a computer to exchange informations. 13 00:00:53,060 --> 00:00:59,000 With that, when we want to connect the different type of computers in east smaller area that is knowledge 14 00:00:59,160 --> 00:01:01,440 land such that your office. 15 00:01:01,950 --> 00:01:07,080 Second is that men many and on edge metropolitan area and network. 16 00:01:07,470 --> 00:01:09,780 Metropolitan area network. 17 00:01:10,050 --> 00:01:14,550 Basically a larger line man can include company office. 18 00:01:14,640 --> 00:01:15,660 They're done, located. 19 00:01:15,690 --> 00:01:24,450 Adjusting to or also located in a obesity means that when we connect the computers or the all the CB 20 00:01:24,690 --> 00:01:29,360 or down diners or knowledge men metropolitan area sniper. 21 00:01:29,700 --> 00:01:31,380 Now part is the wide area. 22 00:01:31,470 --> 00:01:33,090 I brought it to school. 23 00:01:33,120 --> 00:01:39,780 Go out to a wide geographical area means that we want to computer and we want to connect the different 24 00:01:39,780 --> 00:01:43,410 type of computers in the larger area than is known edge. 25 00:01:43,680 --> 00:01:45,030 Why did the network? 26 00:01:45,570 --> 00:01:47,760 And next is the Internet. 27 00:01:48,300 --> 00:01:54,960 The Internet is a communication that bread that connects one electronic media with another. 28 00:01:54,960 --> 00:01:56,840 Media supporting technology. 29 00:01:56,840 --> 00:01:57,440 Stenders. 30 00:01:57,640 --> 00:02:06,670 It was that transmission control protocol or Internet protocol suits means that when we want to exchange 31 00:02:06,670 --> 00:02:11,340 the information in the Internet, then we use that DCP IP protocol. 32 00:02:11,640 --> 00:02:20,790 Is that before you need rules or that DCP IP protocol next is not wireless area network linked to communications 33 00:02:20,790 --> 00:02:25,490 between computers systems without using cables did wireless. 34 00:02:25,530 --> 00:02:28,290 Nobody could tell from huge computer networks. 35 00:02:28,560 --> 00:02:34,340 What I cloyed distance a few meters using your device, Bluetooth transmitter and the distance. 36 00:02:34,350 --> 00:02:35,370 Why satellites? 37 00:02:35,680 --> 00:02:42,240 These feelings clearly get closely related to telecommunications, information technology and computer 38 00:02:42,240 --> 00:02:42,930 engineering. 39 00:02:43,260 --> 00:02:49,830 Popular type of network in this wireless network category include wireless, local area network and 40 00:02:49,830 --> 00:02:56,610 Wi-Fi means that the wireless network covered that dipole communications. 41 00:02:56,610 --> 00:02:59,000 First is the Bluetooth transmitter communications. 42 00:02:59,280 --> 00:03:01,410 And second is the Wi-Fi communications. 43 00:03:01,740 --> 00:03:04,080 These are companies, not wireless network. 44 00:03:04,800 --> 00:03:05,100 Now. 45 00:03:05,700 --> 00:03:08,160 Next is the what is done network security. 46 00:03:08,500 --> 00:03:17,180 That why we won that secured network security policy and practice to prevent and monitor access, misuse 47 00:03:17,460 --> 00:03:24,480 and benign oh and authorized modifications that got on computer network news that we does not want to 48 00:03:24,480 --> 00:03:25,800 change the information. 49 00:03:26,040 --> 00:03:28,680 We did not want to change that data into one computer. 50 00:03:28,890 --> 00:03:35,250 So we require the network security network security fundamental and deliver security that cover that 51 00:03:35,250 --> 00:03:37,260 basic concept of network security. 52 00:03:37,560 --> 00:03:42,150 So in this course, reconvert the fundamental parts of the network security. 53 00:03:42,950 --> 00:03:50,130 No network security consist of several concepts such it confidence, liberty, network security, huge 54 00:03:50,130 --> 00:03:57,180 full for maintaining the confidentiality of company data mean that we does not want to disclose the 55 00:03:57,180 --> 00:03:58,170 company data. 56 00:03:58,440 --> 00:04:02,490 So we require that confidentiality of that company data. 57 00:04:02,850 --> 00:04:04,500 Next is the integrity. 58 00:04:04,800 --> 00:04:12,880 Integrity means maintained that consistency, accuracy and trust that data it it must not be changed. 59 00:04:12,990 --> 00:04:19,590 People who did know to write in it means that he does not want to change that into my other person's 60 00:04:19,900 --> 00:04:24,060 means that only auton Antarctica persons change that data. 61 00:04:24,510 --> 00:04:31,800 Next is the availability, make improvement to hardware if needed, and maintain the operating system 62 00:04:32,010 --> 00:04:35,430 environment next to the automatic ations. 63 00:04:35,700 --> 00:04:42,810 The sender of the information can be correctly identified and there is a guarantee that the identify 64 00:04:42,930 --> 00:04:48,460 obtain is not fake is that we want a termination of that data. 65 00:04:48,870 --> 00:04:54,210 So we require that network security to the known reproduction done. 66 00:04:54,210 --> 00:04:59,770 Neither sending or receiving information can nor denied those standing and receiving the. 67 00:05:00,110 --> 00:05:00,630 Macy's. 68 00:05:00,930 --> 00:05:03,590 So these are just some components. 69 00:05:03,780 --> 00:05:06,350 So we required up nine to execute. 70 00:05:06,660 --> 00:05:08,400 So this is the model number one. 71 00:05:08,580 --> 00:05:10,400 Now we're going to model number two.