1 00:00:00,150 --> 00:00:03,360 Pistorius welcoming fundamental of network security. 2 00:00:03,600 --> 00:00:10,250 Now in morning number four, we understand how we protect the network below. 3 00:00:10,470 --> 00:00:11,730 We understand that. 4 00:00:12,180 --> 00:00:18,030 How DWB, trust me, to prompt us Mutare State to receive our site using that as a model. 5 00:00:18,540 --> 00:00:24,960 Then we understand about the different different types of attacks we will be happen on our network. 6 00:00:25,650 --> 00:00:34,210 Now, here we understand about the protecting types that how we protect the network, often learning 7 00:00:34,220 --> 00:00:35,960 types of network attacks. 8 00:00:36,270 --> 00:00:40,980 We must also know to secure the network that how we secure that network. 9 00:00:41,190 --> 00:00:47,400 Here are some some biotech things that are a huge win for protecting the network. 10 00:00:47,810 --> 00:00:51,950 By these methods, we can protect our network from the attackers. 11 00:00:52,730 --> 00:00:59,970 Putting the physical security, physical security described security may just that I'd be Jane to deny. 12 00:01:00,330 --> 00:01:08,580 I'm not for exes to facilitate a group of men and discourse and to protect personal and property from 13 00:01:08,580 --> 00:01:10,140 damage or harm. 14 00:01:10,340 --> 00:01:16,080 Such Ted a passionate keep daily star attacks PDK security. 15 00:01:16,080 --> 00:01:21,300 Nor will they usual dumb multiplayer or in their dependent system. 16 00:01:21,570 --> 00:01:31,280 That includes CCTV sort of evidence security guard protecting the areas, lock access control bad and 17 00:01:31,430 --> 00:01:34,170 instruction deductions, didn't it? 18 00:01:34,680 --> 00:01:41,110 Systems, fire protections and that system designed to protect Bustan and property. 19 00:01:41,460 --> 00:01:48,330 So mean that by the physical security we have different different types of security and we can secure 20 00:01:48,360 --> 00:01:50,490 that data by the physical side. 21 00:01:51,090 --> 00:01:55,260 Second is that you divide tweet management. 22 00:01:55,570 --> 00:02:02,970 There's also knowledge UTM Unified Field Management Agent approach to information security. 23 00:02:03,320 --> 00:02:07,430 Where is single hardware or software installation? 24 00:02:07,440 --> 00:02:09,990 Provide multiple security functions. 25 00:02:10,880 --> 00:02:20,350 UTM must have a minimum more Sevda convoluting security features which you need rigidified role interaction, 26 00:02:20,420 --> 00:02:23,370 detection and Chun's preventions. 27 00:02:23,820 --> 00:02:26,220 So first is the firewall. 28 00:02:26,640 --> 00:02:34,170 There are two types of security which will be covered in the UTM Presti the firewall interaction detection. 29 00:02:34,200 --> 00:02:36,150 Second, entire interaction prevention. 30 00:02:36,470 --> 00:02:42,990 Now Prestons that pipework pyro ILIJA computer network security systems that from tannish to protect 31 00:02:42,990 --> 00:02:47,250 computers from various types of attacks from outside computers. 32 00:02:47,810 --> 00:02:49,270 That paywall E.J.. 33 00:02:49,440 --> 00:02:50,480 Got it. 34 00:02:50,720 --> 00:02:54,590 Go to guarding for your computer if box. 35 00:02:54,750 --> 00:03:03,150 By monitoring and controlling all incoming and outgoing network traffic that used to be based on stablest 36 00:03:03,180 --> 00:03:04,490 security rules. 37 00:03:04,730 --> 00:03:10,900 With that in New Delhi, which will be coming, your computer its first jeg by the firewall. 38 00:03:11,910 --> 00:03:13,440 Second is the ideas. 39 00:03:13,740 --> 00:03:16,560 Ideas is the intrusion detection system. 40 00:03:16,710 --> 00:03:17,730 It didn't matter. 41 00:03:18,330 --> 00:03:26,740 That can be used to support suggested activity in the system or network means that how we perform them 42 00:03:26,740 --> 00:03:35,190 work, how we do them, what in our network that is directed or so dictated by the ideas and tardies. 43 00:03:35,220 --> 00:03:38,360 The IPL intrusion prevention system. 44 00:03:38,550 --> 00:03:45,120 Just software that locks behind a fine line to identify and block players to the network. 45 00:03:45,150 --> 00:03:52,920 By accepting every bickett their asses based on their network peppercorn in their applications and breaking 46 00:03:52,920 --> 00:03:55,420 things to the network security. 47 00:03:55,680 --> 00:03:58,030 So Binder who matters? 48 00:03:58,290 --> 00:04:00,030 We can secure our network. 49 00:04:00,280 --> 00:04:03,890 First is the physical security and they're tied with security. 50 00:04:04,200 --> 00:04:09,900 And second is the UTM that did cover the software security. 51 00:04:10,380 --> 00:04:15,240 This is the model number four of the fundamental law network security.