1 00:00:00,480 --> 00:00:08,250 Cyber security is a vast and diverse field, whether you are setting up a firewall or creating a password 2 00:00:08,250 --> 00:00:08,820 policy. 3 00:00:09,120 --> 00:00:18,440 Your actions impacts all levels of an organization from its technicians to and helpdesk to the cyber 4 00:00:18,660 --> 00:00:25,020 security, and also affects every piece of technology, you know, organization, mobile phones, servers 5 00:00:25,020 --> 00:00:29,730 and even devices like industrial control systems. 6 00:00:30,150 --> 00:00:37,170 If failed, this expense expensive and DB can be a little intimidating when you first enter. 7 00:00:37,170 --> 00:00:43,470 It is especially true if you are trying to learn about cyber security without entering the field. 8 00:00:43,980 --> 00:00:51,930 For example, you might be an I.T. department head who wants to learn more so you can better protect 9 00:00:51,930 --> 00:00:52,850 your organization. 10 00:00:53,130 --> 00:00:59,060 So these course start slow, so we will talk about it. 11 00:00:59,100 --> 00:00:59,550 So it was. 12 00:00:59,550 --> 00:01:05,010 Security is and isn't as real as a difference between White Hat and Black Hat hackers. 13 00:01:05,850 --> 00:01:07,410 What is cybersecurity? 14 00:01:09,200 --> 00:01:17,600 As at its core, cybersecurity has one driving purpose to identify cyber threats in an organization 15 00:01:17,780 --> 00:01:26,630 calculated risk to, uh, to to, uh, related to DOS threats and handle those threats are appropriately. 16 00:01:27,080 --> 00:01:34,340 Not every threat that a company experiences is unusual that cyber security deals with directly, for 17 00:01:34,340 --> 00:01:40,190 example, pandemics or physical damage to a building caused by a tornado or food, of course. 18 00:01:40,730 --> 00:01:43,520 In general, cyber security uses. 19 00:01:45,410 --> 00:01:51,990 I see a thread model to determine which traits are under its previous. 20 00:01:53,030 --> 00:01:54,130 Uh, so. 21 00:01:56,510 --> 00:02:04,070 Some experts debate that, uh, merits of adding elements of a traditional trade to contend with the 22 00:02:04,070 --> 00:02:06,980 new technologies or priorities in cybersecurity. 23 00:02:07,610 --> 00:02:16,520 So on, one element of an added is non-repudiation, so which is the idea that when a person or entity 24 00:02:16,820 --> 00:02:22,640 does something, there must be specific evidence tying them to that action. 25 00:02:22,670 --> 00:02:25,940 So it's impossible for them to deny they did it. 26 00:02:26,790 --> 00:02:28,280 Cybersecurity and privacy. 27 00:02:29,370 --> 00:02:35,610 In recent years, there has been an impressive on the relationship between cybersecurity and privacy 28 00:02:36,180 --> 00:02:37,200 in this situation. 29 00:02:37,230 --> 00:02:42,960 Privacy means the rights and abilities of a person to control how information about them is stored, 30 00:02:42,960 --> 00:02:44,310 shared and used. 31 00:02:44,910 --> 00:02:52,170 Although the topic of privacy extends beyond cyber security, Liberty Security still plays a huge role 32 00:02:52,500 --> 00:02:57,660 in ensuring that an individual's data is secured against malicious jewels. 33 00:02:58,110 --> 00:03:05,340 Their security is also responsible for many of the controls that allow a company to audit its data laws, 34 00:03:05,700 --> 00:03:10,830 ensuring that it will use any necessary rules or regulations going forward. 35 00:03:11,100 --> 00:03:19,110 The protection of a user user privacy will likely become an increasingly integral part of the cybersecurity 36 00:03:19,110 --> 00:03:19,560 field. 37 00:03:20,670 --> 00:03:24,900 What cyber security isn't in a field? 38 00:03:24,900 --> 00:03:31,290 As a large cybersecurity, you are bound to encounter a field distorted ideas about its scope to mitigate 39 00:03:31,290 --> 00:03:32,880 these misconceptions. 40 00:03:33,030 --> 00:03:40,830 It's best to discuss what cyber security isn't doing, so will help to find the field and what it actually 41 00:03:40,830 --> 00:03:42,930 means to do cyber security. 42 00:03:43,900 --> 00:03:51,570 First, cybersecurity isn't synonymous with hacking, so the media would have you believe that all cyber 43 00:03:51,570 --> 00:03:57,570 security professionals do is click away at a keyboard trying to break into system. 44 00:03:57,970 --> 00:04:03,570 Although penetration testing the act of attempting to break into a system you are authorized to attack, 45 00:04:03,930 --> 00:04:11,870 such as your own or clients to discover vulnerabilities from an attacker perspective is a part of cybersecurity. 46 00:04:12,330 --> 00:04:14,640 It's part one section of the field. 47 00:04:15,120 --> 00:04:22,320 So able rarity is a flaw in the system, including how it's set up or how people use it. 48 00:04:23,430 --> 00:04:30,210 For example, having an error in a systems code can cause a vulnerability so attackers create exploits 49 00:04:30,210 --> 00:04:32,160 to take advantage of vulnerabilities. 50 00:04:32,520 --> 00:04:39,540 But just because you don't know how to execute and exploit, using a flaw in a comfortable memory doesn't 51 00:04:39,540 --> 00:04:44,670 mean you can't be an expert in setting up and maintaining firewalls. 52 00:04:45,030 --> 00:04:53,310 So this means that you don't need to understand how every hacking tool works or exactly what the latest 53 00:04:53,310 --> 00:04:57,720 exploit does to contribute to the cybersecurity industry. 54 00:04:58,440 --> 00:05:01,080 Second, cybersecurity isn't such an flipping. 55 00:05:02,530 --> 00:05:07,270 So some people use the term such sleeping to describe what they think. 56 00:05:07,450 --> 00:05:14,740 System engineers or other I.T. professionals do, they just flip switches or configure systems without 57 00:05:14,740 --> 00:05:19,240 understanding the underlying processes that make the system work? 58 00:05:19,600 --> 00:05:26,130 It's true that configuring a system to be secure is vitally important to cybersecurity, but securing 59 00:05:26,140 --> 00:05:30,040 a system can't necessarily be done by following a checklist. 60 00:05:30,490 --> 00:05:39,360 It requires looking at the entire system, noting how every component interacts importantly with the 61 00:05:39,370 --> 00:05:45,520 other components, but also with the other systems to fully understand how to secure a system. 62 00:05:45,970 --> 00:05:53,590 In addition, professionals need deliberation and critical thinking skills to know how to secure a system 63 00:05:53,710 --> 00:05:57,670 in situations where it's impossible to apply best practices. 64 00:05:58,180 --> 00:06:01,750 Third, the cybersecurity doesn't only require technical skills. 65 00:06:03,030 --> 00:06:08,790 Just as important as technical knowledge is the ability to translate that information to tips and resources 66 00:06:08,790 --> 00:06:14,250 that everyone can understand them professionals give presentations or write reports. 67 00:06:14,810 --> 00:06:21,300 Typekit security professionals work with every department in an organization, which means their interpersonal 68 00:06:21,450 --> 00:06:23,850 communication skills are essential. 69 00:06:24,300 --> 00:06:30,600 The only way you or your organization will become more secure is if everyone understands their role 70 00:06:30,600 --> 00:06:35,580 in maintaining security, which means you must communicate that role effectively.