1 00:00:00,620 --> 00:00:06,360 Similar to how the nervous system forms one of the basic functional building blocks of our human body. 2 00:00:06,380 --> 00:00:13,250 So computer networks are at the very core of the interconnected, seamless world that we all know today. 3 00:00:13,250 --> 00:00:20,570 So hence it's a paramount importance to dedicate our efforts and focus on building and maintaining the 4 00:00:20,570 --> 00:00:22,820 security posture of our networks. 5 00:00:22,820 --> 00:00:29,930 Protecting our networks from an internal and external threats is one of the most important aspects of 6 00:00:29,930 --> 00:00:33,470 any information security program for an organization. 7 00:00:33,590 --> 00:00:38,690 In this chapter, we will be looking at the core concepts that will form our building blocks for our 8 00:00:38,690 --> 00:00:41,220 comprehensively secure network architecture. 9 00:00:41,240 --> 00:00:47,450 Besides a few best practices and guidelines and also for now, there is no technical requirements for 10 00:00:47,450 --> 00:00:53,720 this section of our course for an effective network security apparatus to be in place, it is important 11 00:00:53,720 --> 00:01:00,810 to understand the central concepts associated with it and the implied technologies and processes around 12 00:01:00,810 --> 00:01:04,710 it that make it robust and resilient to cyber attacks. 13 00:01:05,010 --> 00:01:11,460 Today, some of the common challenges that security professionals face is the lack of clear distinction 14 00:01:11,460 --> 00:01:17,730 between the devices in their infrastructure and the data that they hold or process. 15 00:01:18,030 --> 00:01:24,030 This is further complicated when the visibility is blurred by not having a demarcation of the various 16 00:01:24,030 --> 00:01:24,960 network boundaries. 17 00:01:24,960 --> 00:01:30,630 So today we have evolved networks with a component such as Internet of Things, industrial Internet 18 00:01:30,630 --> 00:01:35,820 of things and cloud computing, which have further added to the network's complexity. 19 00:01:35,850 --> 00:01:42,180 Network security in itself touches upon various attributes of security controls that a security professional 20 00:01:42,180 --> 00:01:49,410 should take into account, such as security gateways, SSL inspection, threat prevention engines, 21 00:01:49,440 --> 00:01:58,390 policy enforcement, cloud security solutions, threat detection and insights, attack analysis, w.r.t 22 00:01:58,590 --> 00:02:00,900 frameworks and so on. 23 00:02:00,960 --> 00:02:07,050 Therefore, it is important as a network security professional to not only have a clear visibility of 24 00:02:07,050 --> 00:02:11,850 your network, but also understand the effectiveness of your security products and solutions. 25 00:02:12,120 --> 00:02:18,660 The following subsections will help us get familiar with the key terms and components of network security.