1 00:00:00,180 --> 00:00:07,190 Just below, we understand about the type of protections first, the particular protection that is called 2 00:00:07,190 --> 00:00:08,400 the hollow protections. 3 00:00:08,820 --> 00:00:14,980 And then we understand about the software protections, not legal in the software provisions there, 4 00:00:15,150 --> 00:00:17,710 how we do the different types of predictions. 5 00:00:18,870 --> 00:00:21,330 It doesn't matter what day more business you have. 6 00:00:21,780 --> 00:00:29,610 It is important to give priority to network security since it protects the integrity and you WTOP your 7 00:00:29,610 --> 00:00:38,340 data and network means that both people, particularly the required security required for data security 8 00:00:38,370 --> 00:00:40,050 and put network security. 9 00:00:40,680 --> 00:00:49,470 It works like your personal war to protect your network had it identified and target different leads 10 00:00:49,830 --> 00:00:53,970 and then prevent them from gaining access to the network. 11 00:00:54,660 --> 00:01:02,800 There are four main type of network security that can take advantage and we are also going to go. 12 00:01:03,240 --> 00:01:04,440 Why you need that? 13 00:01:05,010 --> 00:01:12,210 Now we understand about the basic software type of protection, that type of protections we require. 14 00:01:12,540 --> 00:01:13,940 Put our network aside. 15 00:01:14,400 --> 00:01:17,190 No, first is the network access control. 16 00:01:17,940 --> 00:01:25,470 It is known at NBC that network access control or NSA control, which people can access your network 17 00:01:25,560 --> 00:01:33,730 and which ones cannot means that rich people can access which people can your hide your network. 18 00:01:34,960 --> 00:01:42,480 It allows you to identify different users and devise and find out if unauthorized personnel are trying 19 00:01:42,480 --> 00:01:44,280 to gain access to the network. 20 00:01:45,030 --> 00:01:48,160 If anybody with one book got Jordan not broke. 21 00:01:48,540 --> 00:01:50,970 So this do it automatically. 22 00:01:51,600 --> 00:01:59,700 You that sense that this type of things and give you information as you can therefore enforce different 23 00:01:59,700 --> 00:02:04,890 security policies in order to block device and control what can happen. 24 00:02:04,890 --> 00:02:06,420 Your network Muzak. 25 00:02:06,470 --> 00:02:11,190 In this way you can control all things or which are going in your networks. 26 00:02:11,210 --> 00:02:19,560 And you can also setup behavior, analytical tools which help you identify a normal behavior on your 27 00:02:19,560 --> 00:02:25,860 network so that you get notified when someone is acting normally on your network. 28 00:02:26,130 --> 00:02:33,090 So the method is that you can use it, behave in analytic to be it analytical tool, automatically detect 29 00:02:33,360 --> 00:02:36,420 that what is going, you know, your network site. 30 00:02:36,510 --> 00:02:44,010 If any abnormal condition will be happen in your network, then it automatically detect and correct 31 00:02:44,010 --> 00:02:45,720 that error automatically. 32 00:02:46,230 --> 00:02:51,250 Now, this is the first time for network security you can be in your network. 33 00:02:51,750 --> 00:02:57,310 Secondly, the application security application security means that the applications which are running 34 00:02:57,390 --> 00:03:04,120 your in your network site, you can also take advantage of application security, rigid deejaying to 35 00:03:04,140 --> 00:03:07,290 or for complete protection through your network. 36 00:03:08,200 --> 00:03:17,730 It is important to ensure that apps which flows in that area are more targeted and taken advantage of 37 00:03:17,730 --> 00:03:19,020 by hackers. 38 00:03:19,470 --> 00:03:27,150 It basically secure network from the through to your applications getting hacked, which is why it is 39 00:03:27,150 --> 00:03:29,010 definitely an essential network. 40 00:03:29,010 --> 00:03:29,910 Security tools. 41 00:03:30,210 --> 00:03:31,770 You must have missed that. 42 00:03:32,100 --> 00:03:35,760 There are many type of applications which are running in the network side. 43 00:03:36,210 --> 00:03:43,740 So the security or the application is it's also a necessity that any money reaches from outside. 44 00:03:45,000 --> 00:03:47,340 That can not hack into your network. 45 00:03:47,580 --> 00:03:52,470 So the security on the applications is also necessary. 46 00:03:52,650 --> 00:03:56,090 So this is the second type of secured activity. 47 00:03:56,250 --> 00:03:59,580 While in our network, no part is that. 48 00:03:59,730 --> 00:04:06,250 And do Iris and anti Miller software, you can you can secure an audit. 49 00:04:06,500 --> 00:04:06,850 No. 50 00:04:07,220 --> 00:04:07,650 You can. 51 00:04:07,650 --> 00:04:08,970 Security or network. 52 00:04:09,150 --> 00:04:12,110 You do not enter at it and and diminish or peer out. 53 00:04:12,120 --> 00:04:20,190 So you might definitely use antivirus and cumulous or queer in order to protect your network from spyware 54 00:04:20,430 --> 00:04:22,570 facing dargin and wideness. 55 00:04:22,860 --> 00:04:28,470 So these are some of Normal's programs which will come in your network. 56 00:04:28,500 --> 00:04:30,690 Then they can harm your network. 57 00:04:30,780 --> 00:04:38,820 Also my leverage like it, BGH put your network and will not only air within your network, but will 58 00:04:38,880 --> 00:04:45,690 spring attacks and called your system to malfunctions that they can harm your network completely. 59 00:04:45,700 --> 00:04:48,120 Sure you're not gone will be shut down. 60 00:04:48,750 --> 00:04:56,070 Antivirus and and Dumela software allow you to Egypt to detect malware and identified as Trute says 61 00:04:56,280 --> 00:04:59,880 they will be continuously snick scanning the networks at. 62 00:05:00,090 --> 00:05:08,850 Put malware that is highly mean that if a mugger is hiding in your network, then antivirus and diminish 63 00:05:08,850 --> 00:05:14,080 or quit, detect that malware and inform you that. 64 00:05:14,140 --> 00:05:15,670 What do we do with that? 65 00:05:15,810 --> 00:05:17,370 This might appear so. 66 00:05:17,610 --> 00:05:25,920 If any, this type of programming come not product, then they can harm your network and also set down 67 00:05:25,920 --> 00:05:26,580 your network. 68 00:05:26,880 --> 00:05:34,830 So we require that antivirus and anti Miller software also in your network port is that email security? 69 00:05:35,820 --> 00:05:42,150 Email security means that in this attack there are many terrible Google services which are reusing for 70 00:05:42,180 --> 00:05:42,840 the emails. 71 00:05:43,080 --> 00:05:46,020 So email security is also required in the network. 72 00:05:46,620 --> 00:05:50,780 It is important that you give importance to email security as well. 73 00:05:50,790 --> 00:05:57,090 It especially if you have a business that is primarily dealing with a loss of e-mails. 74 00:05:57,420 --> 00:06:04,590 Phishing attacks can certainly comprise your business operations, which is why it is imperative that 75 00:06:04,770 --> 00:06:06,240 you invest in data. 76 00:06:06,650 --> 00:06:08,400 I email security. 77 00:06:09,390 --> 00:06:17,220 If hackers are able to get their hands on personal or financial information, they can resort to blackmail. 78 00:06:17,580 --> 00:06:25,650 And you will also start deceiving your clients much, stealing their personal information and sending 79 00:06:25,650 --> 00:06:27,060 them malware. 80 00:06:28,050 --> 00:06:30,660 This is why you it by email. 81 00:06:30,660 --> 00:06:34,290 Security has to be priority for every business running Guley. 82 00:06:34,530 --> 00:06:37,140 So really quite the email security also. 83 00:06:37,500 --> 00:06:46,040 And we used a different type of tools for that email security so that any important information can 84 00:06:46,290 --> 00:06:48,540 be gained by the hackers. 85 00:06:49,140 --> 00:06:57,840 If anybody get your own personal information business information so they can harm your clients or they 86 00:06:57,840 --> 00:07:05,430 can say that I'm not writing for missions to clients and Ford is the wireless security. 87 00:07:06,120 --> 00:07:10,390 Another notebook security type that you should invest in it. 88 00:07:10,890 --> 00:07:15,820 Wireless security businesses are conducting more businesses on the cloud. 89 00:07:16,230 --> 00:07:20,390 And this means wireless network and access part dopp. 90 00:07:20,700 --> 00:07:28,140 Big problem here is that wireless networks are not really secure and can be easily attacked by hackers. 91 00:07:28,470 --> 00:07:32,130 And which is your wireless security needs to be top notch. 92 00:07:32,370 --> 00:07:32,750 Who's that? 93 00:07:33,100 --> 00:07:35,030 In Jensenius need you. 94 00:07:35,040 --> 00:07:40,500 We use the different different types of tools, different types of systems in the wireless. 95 00:07:40,710 --> 00:07:43,590 We use the Internet using the wireless. 96 00:07:43,830 --> 00:07:49,440 So wireless security is also required for the network security. 97 00:07:49,800 --> 00:07:51,390 So these pipe types. 98 00:07:51,390 --> 00:07:55,230 So security is essential for any type of network.