Securing Hosts and Data in Network Defense Lectures

slide1 n.w
1 / 16
Embed
Share

"Explore key topics such as full disk encryption, UEFI, data loss prevention techniques, and cloud computing platforms discussed in lectures at King Saud University for Applied Studies and Community Service."

  • Security
  • Network Defense
  • Data Encryption
  • Cloud Computing
  • Lecture

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. 1213 Network Defense Lecture 5 Part 2 # Securing Hosts and Data Securing Hosts and Data - Lecture 1 King Saud University Applied Studies and Community Service 1213

  2. Full disk encryption (FDE) Encrypts entire drive Self-encrypting drives (SEDs) Automatically encrypts entire drive Users typically need to log on to access drive Encrypting Drives - Lecture 1 King Saud University Applied Studies and Community Service 1213

  3. Unified Extensible Firmware Interface (UEFI) Trusted Platform Module (TPM) Boot Integrity Hardware Security Module (HSM) - Lecture 1 King Saud University Applied Studies and Community Service 1213

  4. Data loss prevention (DLP) techniques & technologies Rights management Removable media Data exfiltration Encrypting data Database encryption DLP - Lecture 1 King Saud University Applied Studies and Community Service 1213

  5. Software as a Service (SaaS) Applications provided over the Internet (such as web-mail accessed with a web browser) Summarizing Cloud Computing Platform as a Service (PaaS) Provides customers with a fully managed platform Vendor keeps platform up-to-date - Lecture 1 King Saud University Applied Studies and Community Service 1213

  6. Infrastructure as a Service (IaaS) Provides customers with access to hardware in a self-managed platform Customers are responsible for keeping an IaaS system up to date Understanding Cloud Computing Anything as a Service (XaaS) Cloud services beyond SaaS, PaaS, and IaaS Services that can be delivered via the cloud, such as communications, databases, desktops, storage, and security - Lecture 1 King Saud University Applied Studies and Community Service 1213

  7. Cloud Service Provider Responsibilities - Lecture 1 King Saud University Applied Studies and Community Service 1213

  8. Public Available to anyone Private Only available within a company Cloud Deployment Models Community Cloud shared by two or more organizations Hybrid Combination of any two models - Lecture 1 King Saud University Applied Studies and Community Service 1213

  9. Patch management Vulnerability scanning Spam and virus filtering Data loss prevention (DLP) Virtual private network connections Proxy services for web content filtering MSSP Services Intrusion detection and prevention systems Unified threat management (UTM) appliances Advanced firewalls such as next-generation firewalls - Lecture 1 King Saud University Applied Studies and Community Service 1213

  10. Google Cloud and Amazon Web Services (AWS) documentation High availability and high availability across zones Resource policies Secrets management Integration and auditing Cloud Security Controls Cloud-based storage characteristics Permissions Encryption King Saud University Applied Studies and Community Service Replication - Lecture 1 1213

  11. Virtual networks Public and private subnets Segmentation Security groups Cloud-based Networks Dynamic resource allocation Instance awareness VPC endpoint Transit gateway Container security - Lecture 1 King Saud University Applied Studies and Community Service 1213

  12. Segmentation Instance awareness VPC endpoint Transit gateway Container security Cloud-based Networks Virtual networks Public and private subnets Security groups Dynamic resource allocation - Lecture 1 King Saud University Applied Studies and Community Service 1213

  13. On-premises Cloud resources owned, operated, and maintained by an organization for its employees On-Premises Versus Off- Premises Off-premises In the cloud CSP maintains - Lecture 1 King Saud University Applied Studies and Community Service 1213

  14. Cloud access security broker (CASB) Software tool or service Placed between organization s network and the cloud provider Cloud Computing Security Cloud-based DLP Secure web gateway (SWG) Cloud-based firewalls - Lecture 1 King Saud University Applied Studies and Community Service 1213

  15. Infrastructure as Code Software defined network (SDN) Software-defined visibility (SDV) Cloud Computing Edge computing Fog computing Cloud Security Alliance (CSA) - Lecture 1 King Saud University Applied Studies and Community Service 1213

  16. End of Second Lecture - Lecture 1 King Saud University Applied Studies and Community Service 1213

Related


More Related Content