TRANSCRIPTEnglish

BTEC Level 3 IT - Unit 11 - Cyber Security & Incident Management - Part 02 - READING THE EXAM PAPER

22m 11s4,321 words610 segmentsEnglish

FULL TRANSCRIPT

0:01

[Music]

0:06

this is the 2018 paper as you can see

0:10

and this is part A now I do recommend

0:12

that you guys read the majority of this

0:15

this stuff here I don't need to read

0:16

this I've already gone over this quite a

0:18

few times but you should read it just to

0:20

clarify just to make sure everything is

0:22

okay this is instructions to teachers

0:24

tutors and or invigilators not really

0:27

for you but again read it just to make

0:30

sure you understand outcome for

0:31

submission

0:32

this mainly tells you what folders

0:34

you're supposed to create and the names

0:36

of the files for example it says here

0:38

this person's name is Joshua Smith your

0:42

registration number is that there and

0:44

this is their Center number this is how

0:46

you should ideally name the folder that

0:49

you put your stuff in and the same thing

0:51

is going to be for Part B these are the

0:53

files that need to be inside this part a

0:56

folder and it tells you also how to name

0:58

the files

1:00

down here we have instructions for

1:02

Learners so this is the part that I

1:03

think that everybody should make sure

1:05

that they have written uh well read

1:07

properly it's kind of a repeat of the

1:10

previous section in terms of the folders

1:11

and file names but still please make

1:14

sure you read it I'm going to go down

1:16

set tasks now this is where it actually

1:18

starts to tell you what the scenario is

1:21

so let me zoom in some more

1:23

uh this one is called the black country

1:25

training assessment I'm guessing this is

1:27

some company so again always read the

1:31

assignment well not the assignment the

1:32

exam brief the scenario what I would do

1:35

what I've done is once I read it I

1:37

either highlight on the exam paper

1:39

directly with a highlighter or pen or

1:41

pencil or on a piece of blank paper and

1:43

make notes so right now or even in a

1:46

Word document because you're going to be

1:47

working in your word document what you

1:48

can do is simply go to your word

1:50

document and make some notes so that's

1:51

what I've been doing but in this video

1:53

all I'm going to do is read through the

1:56

entire thing I'm not going to make any

1:57

notes as of yet read through the entire

1:59

thing give some context where possible

2:01

and then in the next video we start

2:03

doing Activity one or task one black

2:05

country training assessment

2:07

um black country training and assessment

2:09

bctaa offers a vocational Based training

2:12

and Assessment Services for small and

2:14

medium-sized businesses let me zoom in

2:16

some more some training is routine such

2:18

as running food safety or I.T skill

2:20

courses it uses a database of freelance

2:23

trainers and assessors to meet clients

2:25

requirements I would make a note of this

2:26

the fact that it uses freelance people

2:28

are not in-house hired by the company

2:30

people freelance doesn't mean they work

2:33

for free freelance actually means

2:35

they're contracted so let's just say for

2:37

argument's sake I want I'm a company I

2:40

want someone to build me 500 PCS in the

2:43

next three months to six months what

2:44

they would do they would come to someone

2:45

like me that knows how to build PCS that

2:47

knows how to Source parts that knows how

2:49

to install a router and a switch and a

2:53

wireless printer or a wired printer

2:54

knows how to set up the operating system

2:56

they would come to someone like me and

2:58

they would get me to do the work I am

3:00

not hired by the company directly as in

3:03

I work for the company they don't give

3:05

me a salary what they might say is okay

3:07

for the next six months we'll give you I

3:09

don't know three grand every month for

3:11

the next six months and this is the

3:12

stuff that we want you to do that would

3:14

make me a freelancer I am not hired by

3:17

the company I am simply contracted

3:18

temporarily and this could be a security

3:21

issue in some cases so what I would I

3:24

would make a note of that so I'm just

3:26

I'm just trying to give context um as

3:28

and where necessary so please bear with

3:30

me if this video is a bit longer if I

3:31

read a bit slow I'm trying to give as

3:33

much context as I can

3:35

bctaa also develops bespoke training

3:38

training and assessment for specialized

3:40

skills such as the maintenance of

3:42

unusual Machinery or working with a

3:44

unique production process bespoke

3:46

training requires collaboration with the

3:48

client and often includes handling uh

3:50

highly confidential information such as

3:51

Trade Secrets this is very important as

3:53

well so they hold or they have

3:56

information on trade secrets what that

3:58

means a trade secret is something that a

4:00

company holds there so then for example

4:03

the new iPhone I think it's 15 or 16

4:05

coming out soon the new iPhone 15 or

4:08

whatever it is that's a trade secret of

4:10

apple and if other companies got hold of

4:12

that information they might not be able

4:15

to make much use of it because it's an

4:16

apple specific device but if for example

4:20

Samsung has Trade Secrets as well they

4:22

are going to release the Samsung Galaxy

4:24

s23 I believe very soon or s22 if

4:28

another company that makes Android

4:30

phones gets hold of their Trade Secrets

4:31

what they could do they could copy those

4:33

exact specifications in those exact

4:35

details create the phone either at the

4:39

same time as Samsung or before Samsung

4:40

and that could damage Samsung sales that

4:42

could damage the numbers of the number

4:44

of items that they sell

4:46

so trade secrets are those that are

4:48

specific to a company they hold it there

4:50

it means a lot to them it could be

4:52

Hardware as in a phone a laptop a PC a

4:54

gaming um a games console it could be

4:56

software so it could be Windows 12 it

4:59

could be iOS whatever version they're on

5:01

now it could be Android 14 whatever

5:04

trade secrets are it's supposed to be

5:06

specific to that company and if other

5:08

people get hold of it it could be

5:10

damaging in some way full-time training

5:12

managers meet clients and work with them

5:14

to create and run a bespoke training and

5:16

assessment all right nothing near that

5:18

catches my eye so far bcta is moving

5:21

from a business park on the outskirts of

5:23

Birmingham to a larger City Center

5:25

premises the company has taken a lease

5:27

on the 19th floor of a 20-story building

5:31

and that's the name of the building

5:32

there this I would make a note of as

5:34

well maybe not the entire sentence but

5:35

maybe say moving from or moving to Inner

5:39

City or moving to city center 19th floor

5:43

for 20-story building this gives the

5:45

impression I haven't read the entire

5:46

thing but this gives the impression that

5:48

they're going to be other companies

5:49

inside that building because if they're

5:50

only renting the 19th floor of a

5:53

20-story building that means that the

5:55

other 19 floors they rented one floor

5:58

the other 19 floors are going to have

6:00

other businesses other companies other

6:02

whatever it is

6:04

so they're going to be sharing the space

6:05

with other companies and sharing the

6:07

space could be a security risk later on

6:10

so I will probably make a note of this

6:12

eh has Mick well here we go has a mixed

6:15

commercial and office usage there we go

6:16

it tells us straight away the 18th floor

6:18

is leased by a recruitment agency this

6:21

uh there's a restaurant and cafe bar on

6:23

the 20th floor and a bar cafe on the

6:26

guard in the garden of the roof I'm

6:27

guessing on the garden of roof in the

6:28

garden of the roof there are several

6:30

small retail units on the ground floor

6:32

there is a gym an art gallery and

6:34

meeting rooms on other floors a number

6:36

of different companies have office it

6:38

tells us straight away a number of

6:40

different companies are office based on

6:41

the building this is what I would

6:42

probably make a note of this first one

6:44

here everything else is not as relevant

6:47

because we can make the assumption that

6:50

if there are other companies in the same

6:52

building and even the floor above on the

6:55

floor below someone could get access to

6:57

your stuff at some point so you're the

7:00

19th floor for example right there's a

7:02

floor above you the 20th floor and

7:03

there's a 4 or below the 18th floor

7:05

someone might press 19 by accident right

7:07

my eyes are very bad when I go into a

7:09

lift I have to squint sometimes to look

7:11

at the numbers so if someone presses 19

7:14

they come to the 19th floor they might

7:17

be able to I don't know access a wall

7:20

socket a wall plug um the Wi-Fi that you

7:23

guys use whatever the case is other

7:25

companies use the space and because of

7:26

that other people could potentially get

7:29

access to your stuff either physically

7:31

as in plugging into one of your USB

7:33

ports plug it into your ethernet socket

7:35

or using the Wi-Fi

7:37

this is an oh a layout of the building I

7:40

don't actually remember what WC means

7:42

but bear with me I will go back and make

7:45

sure I explain everything control door

7:46

so we have doors going uh both

7:48

directions we have the stairs here we

7:50

have the lift in the middle and at the

7:52

end it says Services internet access

7:54

point patch panel fire alarm panel

7:57

electrical panel so to be fair someone

8:00

could I'm guessing I don't know if this

8:03

is actually how it works based on this

8:04

plan someone could potentially get

8:06

access to the internet access point here

8:08

and that's that could and most likely

8:11

will be detrimental to the company if

8:12

the person is there to be nefarious to

8:16

steal data to steal information

8:18

let's scroll down some more and see the

8:20

detail we have a plan of the 19th floor

8:23

to be released by bctaa is showing in

8:26

figure one most of the public areas are

8:29

open outside of normal office hours and

8:31

the restaurant and bar are popular in

8:33

the evening I would make a note of this

8:34

this tells you that when your office is

8:37

closed when you and your company are not

8:39

at work there are still people operating

8:41

in the building your Wi-Fi might still

8:43

be active someone might get onto the

8:45

19th floor and do some bad things so I

8:47

would make a note of this

8:48

the lift stairs WC's and all the area

8:52

around them are used by the public there

8:55

we go the remaining area is a single

8:58

open space that can be partitioned to

9:00

create rooms or workspaces so this again

9:02

tells us that those main areas up here

9:04

this stuff here is used by the public

9:08

let's see what else we have the 19th

9:10

Floor has many electrical points the

9:12

data Outlets have an optical fiber

9:14

internet access point the data Outlets

9:16

are connected by Cat6 cable this is just

9:18

the the rating of the cable which mainly

9:21

deals with the speed if memory serves me

9:23

right Cat6 probably goes up to one

9:25

gigabit per second but again don't quote

9:28

me on this I don't remember these

9:29

specific details

9:31

um where was I uh the data Outlets are

9:33

connected by Cat6 cable to a patch panel

9:36

near the internet access point bctaa

9:39

that's the name of the company again

9:40

will have to set up their own network

9:42

devices so this sounds as if they patch

9:46

into what's already there

9:48

and that's how they get their internet

9:50

access again that could potentially be

9:52

an issue because that means that they

9:53

might be sharing the basic or general

9:56

internet access with other companies in

9:58

the same building either

9:59

from the first floor all the way to 20

10:01

or at least the ones above and below the

10:04

private areas of the 19th Floor are

10:06

protected by a card reader door control

10:08

system this uses nfcs or near field

10:11

communication or proximity cards so the

10:13

cards that you simply tap on the door

10:14

and it opens similar to those using

10:16

contactless Payment Systems so you know

10:18

your iPhone and your Android phone you

10:20

can tap or bring it close to a payment

10:22

card reader and it pays for it a similar

10:24

system can be used to open and close

10:26

doors

10:27

the readers are already in place for

10:29

each door the eh management company

10:31

supplies cards a card programming device

10:34

and logging and Control software this

10:37

could potentially be an issue an issue

10:38

because

10:40

your security protocol your your door

10:43

card system is provided by another

10:45

company now there's no way to know if

10:48

everyone in this company is good or bad

10:50

just know that this could potentially be

10:52

an issue the doors can also be unlocked

10:55

From the Inside by means of a push

10:57

button so if you're already inside you

10:58

can push a button from the inside to

11:01

Simply open the door just as if you're

11:03

inside your house you probably have that

11:04

bolt on inside that if you turn it you

11:06

can close it if you turn it the opposite

11:07

way you can open it probably something

11:09

similar bctaa has asked you to advise on

11:13

setting up and securing its Network in

11:15

its new location your contract is

11:19

bulge in the sing and experienced

11:22

computer user who is responsible for the

11:24

current network is not a network

11:26

specialist

11:28

this is already a big red flag

11:31

the fact that you're a company moving

11:33

from a small area to a town center means

11:35

that business is probably going well the

11:37

fact that you need someone to set up

11:39

your network and a person you're asking

11:41

I'm not a network specialist I would not

11:43

recommend me setting up a complex

11:45

Network for anyone if it's simply a

11:47

router or Gateway I must switch a few

11:50

devices connected to the switch that

11:51

need configuring fine but if it's very

11:54

detailed Network especially stuff I

11:56

wouldn't do it so it says he's not a

11:58

network specialist and says that the

12:00

current system had stuff added when he

12:03

thought it was needed not great again

12:05

reason being a network specialist would

12:08

sit there and hopefully design for now

12:11

and they were designed for potential

12:13

additions for the future whereas this

12:16

guy simply thought you know what I think

12:18

I need a switch now because this this

12:21

room alone has 10 devices the one next

12:23

door has 10 devices I don't want to use

12:24

all the ports on my router so it would

12:26

make sense for me to have a switch in

12:28

this room for all the 10 devices I have

12:29

one next door for all those 10 devices

12:30

and so on and so forth whereas a network

12:32

engineer would have or a network

12:34

Specialists would have seen this as an

12:36

issue and done this straight away

12:37

Belgian that has produced the basic

12:40

Network design but wants you to review

12:42

his ideas and make sure the new system

12:45

is secure from the start all right let's

12:47

have a look at there's not much we can

12:49

do with this information no it's after

12:52

we finish reading everything that we can

12:55

come back and have a look at this and

12:56

say okay maybe then we can add this or

12:58

take this away so I'm just going to

13:01

briefly go over this electronic door

13:02

control system that's there that's also

13:04

connected to the switch it seems so the

13:06

switch the difference between a switch

13:08

and a relator a switch on a modem is the

13:10

modem or the router gives internet

13:12

access gives access to the rest of the

13:14

world so

13:16

when you want to connect to the internet

13:17

typically from your house you have a

13:19

virgin rotor

13:21

um ee talk talk Vodafone whatever the

13:23

case is right you connect through that

13:24

and you get access to the internet

13:26

what a switch does it connects stuff

13:28

inside your network okay I'm in my room

13:31

right now and I'm looking at my TV stand

13:34

area right I've got my Smart TV there

13:36

I've got my Xbox my PlayStation I have a

13:39

laptop something over there I have a

13:41

desktop somewhere I'm gonna have a

13:43

server I'm gonna I'm buying a server at

13:45

some point as well that's six devices

13:46

already if I want a nice easy simple way

13:49

of connecting all these devices together

13:51

yes I can use the router that comes from

13:53

Virgin because the way they've done

13:55

routers and now we can actually use them

13:57

as switches inside of our networks but

13:59

let's say I'm a small company ideally I

14:01

want to have a switch and I want to have

14:03

devices connected to my switch

14:05

and that allows me to speak to

14:07

everything inside my network I don't

14:09

need the internet to go from my PC when

14:11

I'm trying to print something to the

14:13

printer on the opposite side of the

14:15

office right I don't need the Internet

14:17

for that if it's set up properly I can

14:19

go or redo everything through the switch

14:22

next I have Wi-Fi router with optical

14:25

fiber and Cat6 connections optical fiber

14:28

internet access points so what this is

14:30

I'm connected to the main switch and for

14:32

the main switch to get access to the

14:34

outside world it uses the internet

14:36

access point oh I have a server here as

14:38

well at the bottom a server used to

14:40

store data files whatever files the

14:44

company DMS fit they'll store them on a

14:46

server website whatever the case is over

14:48

here we have staff Wi-Fi and mobile

14:51

devices so there's a specific Wi-Fi it

14:54

seems like for stuff and that's also

14:57

connected to the main switch

14:59

we have staff PCS as well that's

15:02

connected to the main switch we have

15:03

guest Wi-Fi and mobile devices so any

15:05

guests that come in that have a

15:07

smartphone a laptop a tablet and they

15:09

want to connect they have a guest Wi-Fi

15:11

this is a good idea

15:13

um I don't see any firewalls anywhere I

15:17

would have probably added a firewall in

15:18

a few places uh maybe after the internet

15:21

access point maybe before the main

15:23

switch but but in any case we're not

15:25

going to focus too much on this now this

15:27

is just us reading over the paper

15:29

so the development plan at a meeting

15:31

with bulgender you agree these points on

15:34

the development of the new bctaa network

15:37

the network will conform to the outline

15:39

Network diagram so whatever he said

15:42

should be in the network is going to be

15:43

there we might be able to add a few

15:45

things but overall it should have what

15:47

it says the network uses private classy

15:49

ip4 addresses we don't need to worry

15:51

about anything here other than maybe

15:53

private and ipv4 ipv4 and IPv6 are

15:57

typically what we have ipv4 is still

16:00

predominantly used in in like computer

16:02

networks so your laptop your your PC is

16:05

probably connected via ipv for your your

16:07

consoles and so on

16:09

IPv6 is mainly used for wireless devices

16:12

such as your mobile phones your 3G 4G 5G

16:15

because

16:15

IPv6 has so many more addresses I think

16:19

it's like 2 to the power of 128 if

16:21

memory serves right that's a lot of

16:24

addresses so we can essentially have

16:26

multiple people having multiple multiple

16:28

devices around the world connected to

16:29

the internet and there shouldn't be any

16:31

issues ipv4 is all the technology still

16:34

being used but it doesn't have as many

16:35

addresses private simply means it's

16:38

inside your network there are certain

16:39

amount of Ip V4 addresses that companies

16:42

use inside a network so if you guys if I

16:44

do see actually I can't do it here

16:46

because it will show all my details if

16:48

you go to your console and you type in

16:50

uh well press your start and type CMD

16:53

and for Windows does it come up one

16:56

second CMD command prompt

16:59

for Windows I believe if you do if

17:01

config this will actually bring up all

17:05

your internet or all your network

17:07

connection stuff and you might have your

17:09

your personal IP address on your laptop

17:11

as

17:12

192.168.1. whatever it is that's what

17:15

private addresses are is used inside the

17:17

network the Ed Excelsior internet access

17:20

system will be kept and will use a fiber

17:23

optic connection Point not uh that okay

17:27

maybe some something I can pick out from

17:29

here is that you're going to be using

17:30

someone else's internet access point

17:32

this is not something that you paid for

17:34

yourself for your specific company this

17:36

comes with the building most likely

17:38

they're using a fiber optic connection

17:40

which means that your data will travel

17:42

at the speed of light number four says

17:44

the door control system will not be

17:47

changed that's fine the bcta network

17:51

must be protected against intrusion

17:54

through the internet now this tells me

17:57

one or two things are two things I I

17:59

need a firewall and I need to have some

18:01

VPN access firewall is probably going to

18:04

be the most

18:05

likely thing to have here the router

18:08

must ink oh well it tells us right here

18:10

actually the router must include a

18:11

firewall and relevant cyber security

18:13

technology to protect the network so if

18:15

there's a server we're probably going to

18:17

have a firewall we're probably going to

18:18

have some form of DDOS protection we're

18:20

probably going to have some form of

18:21

backup locally externally on storage

18:24

Medias again I'm going overboard but I'm

18:27

just trying to give you context as to

18:29

what each thing means both staff and

18:31

visitors must be able to connect using

18:33

mobile devices that's fine because we

18:35

have if I scroll up quickly we have the

18:38

the staff Wi-Fi and we have the guest

18:40

Wi-Fi as well so we should be okay for

18:42

that one number eight some visitors will

18:45

be clients who may need access to

18:47

appropriate secure areas of the network

18:49

that's fine as well

18:51

so what we could do is maybe have a um

18:55

have a guest Wi-Fi thing or maybe just

18:57

put them on stuff Wi-Fi temporarily or

18:59

we create another Wi-Fi thing and we

19:02

call that one client Wi-Fi and client

19:05

Wi-Fi might give a bit more access than

19:07

it than the typical

19:09

um what's this one called guest Wi-Fi

19:11

okay and again this is just me

19:13

freestyling this is just me reading and

19:15

trying to understand the context of what

19:17

they want freelance trainers and

19:19

assessors will need access to

19:20

appropriate secure areas of the network

19:22

from home or work locations perfect this

19:25

is going to be VPN so I'm going to leave

19:27

that first one or these two uh so five

19:30

and six I'm going to leave those as

19:31

firewalls so we're gonna have a hardware

19:33

firewall and potentially a software

19:35

firewall as well let me just quickly

19:36

explain that our Hardware firewall is

19:38

going to be a physical device that's

19:39

maybe attached to your router your modem

19:43

or your switch that's a hardware

19:44

firewall a software file one is just

19:46

going to be some anti-malware software

19:48

some some firewall program that's

19:50

installed on the individual PCS you

19:52

could even

19:53

install them on the server so a file so

19:55

a server is just a massive big computer

19:58

maybe 128 gigabytes of RAM instead of

20:00

the typical 8 or 16 maybe 24 cores

20:03

instead of the typical four or eight so

20:06

a server is just a PC so I can still

20:08

install operating systems on here I can

20:10

still install a firewall on here as a

20:12

piece of software so we could do that as

20:13

well some staff will need access to

20:15

secure areas from home or client

20:17

locations again VPN this tells me

20:19

straight away VPN a virtual private

20:22

network will be used to facilitate items

20:23

okay perfect it actually tells us

20:25

everything we need so 9 and 10 that's

20:27

going to be VPN let's see what comes

20:29

next

20:31

now you must complete all activities in

20:33

the task read the set task brief

20:36

carefully before you begin and note that

20:38

reading time is included in the overall

20:39

assessment time uh baljinda is aware

20:42

that the bctaa network is vulnerable to

20:44

attack you must uh you have been hired

20:47

to advise on cyber security and Incident

20:49

Management you should only consider

20:51

threats of vulnerabilities risks and

20:53

protection measures that are implied or

20:56

specified in the set task brief so this

20:59

is probably something that we should

21:00

focus on here you should only consider

21:02

threats vulnerabilities risks and

21:05

protection measures so we don't really

21:07

care about stuff like fires and floods

21:10

and all of that now if you want to

21:11

highlight them as something that that is

21:13

a potential risk or that's something we

21:15

should try and protect against fine but

21:17

please don't spend too much time on it

21:18

and the first activity is going to be

21:20

Activity one risk assessment of the

21:23

networked system so this is all we care

21:25

about right now and we're told to

21:27

duplicate so copy and paste I'm gonna

21:29

stop here I'm Gonna Leave this part

21:32

Activity one is going to be my next

21:33

video where I open the Activity one

21:36

document I go over the exam paper again

21:38

I make my notes I start making my list

21:41

of threads that I've picked up on and

21:43

then show you what comes next now I'm

21:45

not going to do a massive list of every

21:46

single threat I'm going to maybe do

21:48

let's say three or four that is very

21:50

very obvious and you can pick out the

21:52

rest yourself three or four and from

21:55

there I'm just going to show you how you

21:57

go through and do the risk assessment

21:58

for each one and how you do your

22:00

severity Matrix

22:02

foreign

22:07

[Music]

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.