1 00:00:00,680 --> 00:00:02,150 Cyber security defenses. 2 00:00:03,360 --> 00:00:09,450 The first thing which is the antivenoms, it is kind of software that used to prevent, scan, detect 3 00:00:09,450 --> 00:00:16,860 and delete viruses from computer once installed, most antivirus software runs automatically in the 4 00:00:16,860 --> 00:00:20,460 background to provide real time protection against virus attacks. 5 00:00:21,440 --> 00:00:29,150 Encryption encryption is the method which encryption is the method by which information is converted 6 00:00:29,150 --> 00:00:36,380 into secret code that hides the information through meaning the sense of encryption and decryption information 7 00:00:36,380 --> 00:00:39,440 is called cryptography in computing. 8 00:00:39,680 --> 00:00:43,250 And encrypted data is also known as plaintext. 9 00:00:43,250 --> 00:00:45,950 And encrypted data is called ciphertext. 10 00:00:47,750 --> 00:00:54,670 Firewall, the firewall is a system designed to prevent unauthorized access to or from a private network, 11 00:00:55,040 --> 00:01:00,050 you can implement the firewall in either hardware or software form or a combination of both. 12 00:01:01,070 --> 00:01:08,630 We have the biometrics, biometrics is the measurement and statistical analysis of people's unique physical 13 00:01:08,630 --> 00:01:15,020 and behavioral characteristics, that technology is mainly used for identification and access control 14 00:01:15,350 --> 00:01:19,940 or for identifying individuals who are under surveillance. 15 00:01:21,750 --> 00:01:28,950 We have the mafia or the multi factor authentication now it is an electronic authentication method in 16 00:01:28,950 --> 00:01:35,700 which a device user is granted access to a website or application and only after successfully presenting 17 00:01:35,700 --> 00:01:42,800 two or more pieces of evidence to an authentication mechanism, knowledge, decision and inheritance. 18 00:01:42,900 --> 00:01:45,930 So this means that you can access this.