1 00:00:00,005 --> 00:00:01,006 - [Narrator] Throughout this course 2 00:00:01,006 --> 00:00:03,007 you will learn about many different controls 3 00:00:03,007 --> 00:00:05,007 that information security professionals 4 00:00:05,007 --> 00:00:07,007 use to achieve their goals. 5 00:00:07,007 --> 00:00:09,009 Each of these controls is aligned 6 00:00:09,009 --> 00:00:12,005 with at least one of three key objectives 7 00:00:12,005 --> 00:00:14,003 of information security: 8 00:00:14,003 --> 00:00:18,008 confidentiality, integrity, and availability. 9 00:00:18,008 --> 00:00:21,003 One of the things you'll need to do on the exam 10 00:00:21,003 --> 00:00:23,003 is match security controls 11 00:00:23,003 --> 00:00:26,005 what their corresponding security goals. 12 00:00:26,005 --> 00:00:28,007 Let's take a look at some of the controls 13 00:00:28,007 --> 00:00:30,005 that security professionals use 14 00:00:30,005 --> 00:00:33,001 to enhance confidentiality. 15 00:00:33,001 --> 00:00:35,003 One way that we protect the confidentiality 16 00:00:35,003 --> 00:00:37,003 of information is preventing people 17 00:00:37,003 --> 00:00:41,002 from accessing sensitive information in the first place. 18 00:00:41,002 --> 00:00:43,007 Access controls are the primary mechanism 19 00:00:43,007 --> 00:00:45,009 for restricting people from seeing data 20 00:00:45,009 --> 00:00:47,005 that they should not. 21 00:00:47,005 --> 00:00:50,004 Access controls protect confidentiality 22 00:00:50,004 --> 00:00:52,004 by limiting users to accessing 23 00:00:52,004 --> 00:00:56,000 only those files where they have been granted permission. 24 00:00:56,000 --> 00:00:58,008 You'll learn more about access controls 25 00:00:58,008 --> 00:01:02,004 in the courses covering domain two, asset security, 26 00:01:02,004 --> 00:01:06,002 and domain five, identity and access management. 27 00:01:06,002 --> 00:01:08,005 In those courses you learn how to use 28 00:01:08,005 --> 00:01:11,007 the Windows NTFS file access controls 29 00:01:11,007 --> 00:01:13,007 that are linked with Active Directory 30 00:01:13,007 --> 00:01:16,002 to restrict file and folder access 31 00:01:16,002 --> 00:01:18,002 to individual users and groups 32 00:01:18,002 --> 00:01:20,009 that require this type of access. 33 00:01:20,009 --> 00:01:23,005 In those same courses you learn how Linux 34 00:01:23,005 --> 00:01:26,000 file permissions achieve the same goal 35 00:01:26,000 --> 00:01:28,003 as administrators manipulate the permissions 36 00:01:28,003 --> 00:01:31,007 for a file's user owner, group owner, 37 00:01:31,007 --> 00:01:36,000 and other users by editing Linux permission strings. 38 00:01:36,000 --> 00:01:38,008 Encryption is also an important security control 39 00:01:38,008 --> 00:01:41,000 for enforcing confidentiality. 40 00:01:41,000 --> 00:01:43,009 Attackers may try to steal information 41 00:01:43,009 --> 00:01:46,003 without going through normal channels. 42 00:01:46,003 --> 00:01:48,006 For example, they might attempt 43 00:01:48,006 --> 00:01:51,000 to eavesdrop on network communications 44 00:01:51,000 --> 00:01:53,002 or remove data from a hard drive 45 00:01:53,002 --> 00:01:55,004 by bypassing the operating system 46 00:01:55,004 --> 00:01:57,006 and its access controls. 47 00:01:57,006 --> 00:02:00,001 Encryption uses mathematical algorithms 48 00:02:00,001 --> 00:02:03,004 to transform plain text into cipher text 49 00:02:03,004 --> 00:02:05,004 that is unintelligible to anyone 50 00:02:05,004 --> 00:02:09,000 who does not have the appropriate decryption key. 51 00:02:09,000 --> 00:02:12,004 Encryption is an incredibly important topic on the exam, 52 00:02:12,004 --> 00:02:14,004 and you'll learn more about it in the course 53 00:02:14,004 --> 00:02:18,002 covering domain three, security engineering. 54 00:02:18,002 --> 00:02:20,009 Information can also be hidden in plain sight 55 00:02:20,009 --> 00:02:22,004 to protect it. 56 00:02:22,004 --> 00:02:25,005 Steganography is a technique that hides information 57 00:02:25,005 --> 00:02:27,009 inside of other files by subtly 58 00:02:27,009 --> 00:02:30,008 manipulating the contents of that file. 59 00:02:30,008 --> 00:02:33,004 For example, steganography may be used 60 00:02:33,004 --> 00:02:36,004 to embed a secret message within an image file 61 00:02:36,004 --> 00:02:38,007 that is undetectable to the naked eye.