1 00:00:01,140 --> 00:00:06,780 Walk into the module and title defense and depth model or how not to become an easy target. 2 00:00:07,880 --> 00:00:12,770 In this module I'd like to show you a strategy for effective computer system protection that has been 3 00:00:12,770 --> 00:00:19,300 developed for military purposes and was subsequently adopted by computer system security specialists. 4 00:00:20,840 --> 00:00:28,680 This model is also described as layered security commonly compared to an onion. 5 00:00:28,780 --> 00:00:32,990 I'd like to explain to you why this model has replaced one line defense strategies. 6 00:00:35,370 --> 00:00:40,130 Such strategies assume that one security mechanism is enough. 7 00:00:40,150 --> 00:00:45,760 It's been a common opinion that computers behind the firewall are safe because all unsafe computers 8 00:00:45,760 --> 00:00:49,340 are outside. 9 00:00:49,360 --> 00:00:55,510 We will use a few realistic scenarios that although based on simplified and optimistic assumptions will 10 00:00:55,510 --> 00:01:02,820 help us examine the effectiveness of the defense in-depth strategy. 11 00:01:02,910 --> 00:01:10,010 We will analyze this model against the ten immutable laws of computer system security these laws were 12 00:01:10,010 --> 00:01:17,770 created more than a decade ago by Scott Cole an I.T. security specialist at Microsoft. 13 00:01:17,790 --> 00:01:20,690 We will determine if these 10 laws are still valid. 14 00:01:21,590 --> 00:01:28,990 If the general rules and guidelines created by Scott Koepp are still applicable Let's start the seminar.