1 00:00:00,120 --> 00:00:06,330 In the last lecture, we talked about the definition of cybersecurity, now let's have a look at the 2 00:00:06,330 --> 00:00:08,590 different types of cybersecurity. 3 00:00:09,020 --> 00:00:13,320 Well, what is network security to force type is network security. 4 00:00:14,130 --> 00:00:16,520 We all use Internet today, right? 5 00:00:16,530 --> 00:00:23,640 Even if you are watching this online course using the Internet, Internet works as a network of four 6 00:00:23,640 --> 00:00:25,110 different protocols. 7 00:00:25,560 --> 00:00:33,180 It is a combination of small networks and everything in order to protect the network from cyber attacks. 8 00:00:33,480 --> 00:00:36,060 Network security is the picture. 9 00:00:36,060 --> 00:00:42,780 So network security, compromises of different security protocols like the IP protocol, which is very 10 00:00:42,780 --> 00:00:46,680 common, it again makes use of encryption and decryption. 11 00:00:46,680 --> 00:00:54,780 That is the cryptography, digital certificates, user account management, SSL protocol, beardless 12 00:00:55,280 --> 00:00:56,240 weapons. 13 00:00:56,560 --> 00:00:58,950 All this comes on network security. 14 00:00:59,580 --> 00:01:08,220 So the domain which looks after the security of networks, is known as network security nexus application 15 00:01:08,220 --> 00:01:08,830 security. 16 00:01:09,180 --> 00:01:13,620 Now many people, including us, use different applications. 17 00:01:13,620 --> 00:01:21,840 You use mobile applications, you use different apps, whether it is Mac or Mac OS or Android, whether 18 00:01:21,840 --> 00:01:24,960 it is Windows application or, you know, device. 19 00:01:25,170 --> 00:01:28,920 So every application also needs to be secure. 20 00:01:29,220 --> 00:01:33,980 If you're using an e-learning app, that e-learning app is going to store your data. 21 00:01:34,320 --> 00:01:38,720 So in order to protect that data, the application must be protected. 22 00:01:39,300 --> 00:01:45,360 So application security basically deals with all the factors that are required for an application to 23 00:01:45,360 --> 00:01:55,470 be completely secure and which can help to secure the data of people or the users next system security, 24 00:01:55,530 --> 00:02:01,070 which is like operating systems or firewalls or antivirus. 25 00:02:01,440 --> 00:02:10,200 Now, many of the employees will have a great amount of network and different operating systems in their 26 00:02:10,200 --> 00:02:10,900 own companies. 27 00:02:11,040 --> 00:02:20,340 In order to protect those laptops or protect those devices systems, security is used physical security, 28 00:02:20,340 --> 00:02:23,550 as we had already discussed in the last couple of lectures. 29 00:02:25,860 --> 00:02:33,390 Physical security deals with checking if a security guard is in place or other data centers properly 30 00:02:33,390 --> 00:02:37,530 protected, is access controlled mechanism properly installed? 31 00:02:38,010 --> 00:02:43,730 Are the clean desk and clean clear screen policies being implemented in the organization. 32 00:02:43,740 --> 00:02:47,710 So all this comes under the domain of physical security. 33 00:02:48,810 --> 00:02:50,610 Next is personal security. 34 00:02:51,150 --> 00:02:56,660 But in identity access, management is one of the major areas in the picture. 35 00:02:57,000 --> 00:03:05,010 So whether the employees are using the systems properly, if, if, if they are using properly, what 36 00:03:05,010 --> 00:03:06,990 is the password management policy? 37 00:03:07,200 --> 00:03:10,000 How well is the account of the users being managed? 38 00:03:10,260 --> 00:03:17,610 This comes on a deep personal security organization and security so in which business continuity management 39 00:03:17,610 --> 00:03:24,600 is one of the important factors, how organization is trying to protect its asset, whether the regular 40 00:03:24,600 --> 00:03:30,390 audits are being carried out, in what way the organization is implementing the security controls. 41 00:03:30,690 --> 00:03:37,470 All these questions are answered in organizational security, then comes to your development. 42 00:03:38,040 --> 00:03:44,910 Now, this practice has been recently gained momentum because what developers earlier used to do is 43 00:03:44,910 --> 00:03:48,270 they just used to develop a random software using the code. 44 00:03:48,870 --> 00:03:54,360 But, you know, again, the code has to go through the quality checking process, the testing process, 45 00:03:54,360 --> 00:03:56,980 again, alter the code to make it more secure. 46 00:03:57,510 --> 00:04:03,780 So this a secure code development makes the code more secure right from the beginning. 47 00:04:03,780 --> 00:04:11,580 So secure code development is therefore directly related to the application security here. 48 00:04:13,450 --> 00:04:20,820 And last is cloud security, we all know that cloud has gained momentum in the last decade. 49 00:04:21,190 --> 00:04:28,480 So cloud security is very important because most of the people have now started saving their documents, 50 00:04:28,480 --> 00:04:32,460 their data, their photos or videos, everything on cloud. 51 00:04:32,890 --> 00:04:34,780 So that cloud must also be protected. 52 00:04:34,780 --> 00:04:35,140 Right. 53 00:04:35,650 --> 00:04:43,450 That is why Google Drive, as your Amazon Web services have large teams of professionals in the cloud 54 00:04:43,450 --> 00:04:47,260 development model to specifically secure the cloud. 55 00:04:47,950 --> 00:04:52,720 Now, these are just the types which I've just told you as a basic introduction. 56 00:04:52,720 --> 00:04:56,440 But again, there are many other types of securities. 57 00:04:56,440 --> 00:05:03,780 For example, App Asset Security, Asset Management, again, financial security, monitoring, security. 58 00:05:03,790 --> 00:05:06,300 So all these securities are also in the picture. 59 00:05:06,910 --> 00:05:12,580 But for discourse, you just need to have the basic idea of these types of security. 60 00:05:13,720 --> 00:05:22,090 Greed in the next lecture will go through the history of cybersecurity, will understand how this cybersecurity 61 00:05:22,090 --> 00:05:30,190 world was formed and when exactly did it start to, you know, have the security need for organizations 62 00:05:30,310 --> 00:05:31,000 right now. 63 00:05:31,470 --> 00:05:32,010 Great. 64 00:05:32,410 --> 00:05:33,670 Keep the momentum going. 65 00:05:33,830 --> 00:05:35,820 I will see you in the next lecture.