1 00:00:00,120 --> 00:00:08,870 Into the module entitled computer security policy when theory meets practice and this module will consider 2 00:00:08,870 --> 00:00:13,000 why it's so difficult to develop an effective computer system security policy 3 00:00:15,750 --> 00:00:20,420 will learn why it's so important to change one's way of thinking about computer systems security 4 00:00:23,430 --> 00:00:24,290 for example 5 00:00:27,090 --> 00:00:30,920 a system may be more or less protected rather than more or less secure. 6 00:00:32,780 --> 00:00:37,040 There's a subtle difference in the meaning here and we'll learn how this subtlety may influence the 7 00:00:37,040 --> 00:00:41,380 security policy implementation. 8 00:00:41,410 --> 00:00:48,090 Moreover we will closely examine why many popular system security solutions are ineffective and why 9 00:00:48,090 --> 00:00:50,440 having a security policy is so essential 10 00:00:53,030 --> 00:01:01,360 that is to say regardless of how technologically advanced your security software may be the actual security 11 00:01:01,360 --> 00:01:06,720 of computer systems in your company depends on having a security policy. 12 00:01:06,790 --> 00:01:09,650 Without it your computers will be in much more vulnerable. 13 00:01:09,670 --> 00:01:11,640 No matter what software you use 14 00:01:15,580 --> 00:01:21,880 next we will briefly analyze the issue of security certification whether it's important to obtain for 15 00:01:21,880 --> 00:01:29,470 your company and his computer system a certificate of conformity to certain security standards. 16 00:01:29,580 --> 00:01:35,550 We'll also examine a strategy called threat modeling and learn how to look at your computer system security 17 00:01:35,550 --> 00:01:38,440 from the perspective of someone who wants to break into it. 18 00:01:40,690 --> 00:01:44,870 The last thing we will discuss is threat classification. 19 00:01:44,990 --> 00:01:51,130 That is to say what you can expect if your system falls prey to an attack. 20 00:01:51,170 --> 00:01:52,220 Let the course begin.