Third party cookies may be stored when visiting this site. Please see the cookie information.

Penguin Fortress YouTube Channel

Video transcript: ITGC IT General Controls

This is a transcript for a video linked here: ITGC IT General Controls.

Video transcript - ITGC IT General Controls


00:00:01.120 --> 00:00:02.710



in this video i'm going to give an



00:00:02.710 --> 00:00:02.720

in this video i'm going to give an





00:00:02.720 --> 00:00:06.070

in this video i'm going to give an

overview of itgc information technology



00:00:06.070 --> 00:00:06.080

overview of itgc information technology





00:00:06.080 --> 00:00:07.829

overview of itgc information technology

general controls



00:00:07.829 --> 00:00:07.839

general controls





00:00:07.839 --> 00:00:09.509

general controls

understand what they are



00:00:09.509 --> 00:00:09.519

understand what they are





00:00:09.519 --> 00:00:11.669

understand what they are

why do you want to use them and how they



00:00:11.669 --> 00:00:11.679

why do you want to use them and how they





00:00:11.679 --> 00:00:13.990

why do you want to use them and how they

can make your it systems more secure



00:00:13.990 --> 00:00:14.000

can make your it systems more secure





00:00:14.000 --> 00:00:17.189

can make your it systems more secure

reliable and effective



00:00:17.189 --> 00:00:17.199

reliable and effective





00:00:17.199 --> 00:00:20.230

reliable and effective

itgc controls are often used as part of



00:00:20.230 --> 00:00:20.240

itgc controls are often used as part of





00:00:20.240 --> 00:00:22.470

itgc controls are often used as part of

business compliance requirements this



00:00:22.470 --> 00:00:22.480

business compliance requirements this





00:00:22.480 --> 00:00:24.630

business compliance requirements this

includes the cobit framework



00:00:24.630 --> 00:00:24.640

includes the cobit framework





00:00:24.640 --> 00:00:26.950

includes the cobit framework

control objectives for information and



00:00:26.950 --> 00:00:26.960

control objectives for information and





00:00:26.960 --> 00:00:28.550

control objectives for information and

related technology



00:00:28.550 --> 00:00:28.560

related technology





00:00:28.560 --> 00:00:31.189

related technology

and sarbanes-oxley act



00:00:31.189 --> 00:00:31.199

and sarbanes-oxley act





00:00:31.199 --> 00:00:33.590

and sarbanes-oxley act

abbreviated to socks



00:00:33.590 --> 00:00:33.600

abbreviated to socks





00:00:33.600 --> 00:00:35.030

abbreviated to socks

even if you don't need to comply with



00:00:35.030 --> 00:00:35.040

even if you don't need to comply with





00:00:35.040 --> 00:00:37.510

even if you don't need to comply with

that act or any other compliance it's a



00:00:37.510 --> 00:00:37.520

that act or any other compliance it's a





00:00:37.520 --> 00:00:40.790

that act or any other compliance it's a

good idea to know about igtgc



00:00:40.790 --> 00:00:40.800

good idea to know about igtgc





00:00:40.800 --> 00:00:42.950

good idea to know about igtgc

as it provides best practice for



00:00:42.950 --> 00:00:42.960

as it provides best practice for





00:00:42.960 --> 00:00:45.190

as it provides best practice for

operating it systems



00:00:45.190 --> 00:00:45.200

operating it systems





00:00:45.200 --> 00:00:48.310

operating it systems

essentially itgc's are internal controls



00:00:48.310 --> 00:00:48.320

essentially itgc's are internal controls





00:00:48.320 --> 00:00:49.990

essentially itgc's are internal controls

which helps your business to be more



00:00:49.990 --> 00:00:50.000

which helps your business to be more





00:00:50.000 --> 00:00:51.510

which helps your business to be more

effective



00:00:51.510 --> 00:00:51.520

effective





00:00:51.520 --> 00:00:53.350

effective

this video will just give a quick



00:00:53.350 --> 00:00:53.360

this video will just give a quick





00:00:53.360 --> 00:00:55.590

this video will just give a quick

overview of the different aspects that



00:00:55.590 --> 00:00:55.600

overview of the different aspects that





00:00:55.600 --> 00:00:59.029

overview of the different aspects that

make up the itgc framework the framework



00:00:59.029 --> 00:00:59.039

make up the itgc framework the framework





00:00:59.039 --> 00:01:01.270

make up the itgc framework the framework

provides controls over the major risks



00:01:01.270 --> 00:01:01.280

provides controls over the major risks





00:01:01.280 --> 00:01:03.670

provides controls over the major risks

related to it systems



00:01:03.670 --> 00:01:03.680

related to it systems





00:01:03.680 --> 00:01:06.070

related to it systems

these are in the four categories



00:01:06.070 --> 00:01:06.080

these are in the four categories





00:01:06.080 --> 00:01:08.310

these are in the four categories

access to programs and data



00:01:08.310 --> 00:01:08.320

access to programs and data





00:01:08.320 --> 00:01:09.910

access to programs and data

program changes



00:01:09.910 --> 00:01:09.920

program changes





00:01:09.920 --> 00:01:12.149

program changes

computer operations and program



00:01:12.149 --> 00:01:12.159

computer operations and program





00:01:12.159 --> 00:01:15.350

computer operations and program

development



00:01:15.350 --> 00:01:15.360







00:01:15.360 --> 00:01:17.270



the first category looks at who can



00:01:17.270 --> 00:01:17.280

the first category looks at who can





00:01:17.280 --> 00:01:20.070

the first category looks at who can

access the programs and data



00:01:20.070 --> 00:01:20.080

access the programs and data





00:01:20.080 --> 00:01:21.910

access the programs and data

this should start with the security



00:01:21.910 --> 00:01:21.920

this should start with the security





00:01:21.920 --> 00:01:25.350

this should start with the security

policy it policy or other policy which



00:01:25.350 --> 00:01:25.360

policy it policy or other policy which





00:01:25.360 --> 00:01:27.590

policy it policy or other policy which

defines who is allowed to access what



00:01:27.590 --> 00:01:27.600

defines who is allowed to access what





00:01:27.600 --> 00:01:29.590

defines who is allowed to access what

data and the appropriate level of access



00:01:29.590 --> 00:01:29.600

data and the appropriate level of access





00:01:29.600 --> 00:01:31.270

data and the appropriate level of access

for each system



00:01:31.270 --> 00:01:31.280

for each system





00:01:31.280 --> 00:01:33.030

for each system

typically this will be based on the



00:01:33.030 --> 00:01:33.040

typically this will be based on the





00:01:33.040 --> 00:01:35.350

typically this will be based on the

principle of least privilege whereby



00:01:35.350 --> 00:01:35.360

principle of least privilege whereby





00:01:35.360 --> 00:01:37.429

principle of least privilege whereby

only the minimum access is given to a



00:01:37.429 --> 00:01:37.439

only the minimum access is given to a





00:01:37.439 --> 00:01:39.590

only the minimum access is given to a

user



00:01:39.590 --> 00:01:39.600

user





00:01:39.600 --> 00:01:41.270

user

you need to ensure that the aaa



00:01:41.270 --> 00:01:41.280

you need to ensure that the aaa





00:01:41.280 --> 00:01:43.910

you need to ensure that the aaa

framework is implemented



00:01:43.910 --> 00:01:43.920

framework is implemented





00:01:43.920 --> 00:01:47.429

framework is implemented

ensuring authentication authorization



00:01:47.429 --> 00:01:47.439

ensuring authentication authorization





00:01:47.439 --> 00:01:49.590

ensuring authentication authorization

and auditing



00:01:49.590 --> 00:01:49.600

and auditing





00:01:49.600 --> 00:01:51.270

and auditing

cissp



00:01:51.270 --> 00:01:51.280

cissp





00:01:51.280 --> 00:01:54.069

cissp

also includes identification and



00:01:54.069 --> 00:01:54.079

also includes identification and





00:01:54.079 --> 00:01:57.670

also includes identification and

accounting when referring to aaa



00:01:57.670 --> 00:01:57.680

accounting when referring to aaa





00:01:57.680 --> 00:01:59.670

accounting when referring to aaa

there should be a process for then



00:01:59.670 --> 00:01:59.680

there should be a process for then





00:01:59.680 --> 00:02:02.069

there should be a process for then

adding that access and at least as



00:02:02.069 --> 00:02:02.079

adding that access and at least as





00:02:02.079 --> 00:02:04.950

adding that access and at least as

important a process for removing access



00:02:04.950 --> 00:02:04.960

important a process for removing access





00:02:04.960 --> 00:02:07.109

important a process for removing access

when someone leaves the company



00:02:07.109 --> 00:02:07.119

when someone leaves the company





00:02:07.119 --> 00:02:09.109

when someone leaves the company

or changes role which no longer needs



00:02:09.109 --> 00:02:09.119

or changes role which no longer needs





00:02:09.119 --> 00:02:10.550

or changes role which no longer needs

that access



00:02:10.550 --> 00:02:10.560

that access





00:02:10.560 --> 00:02:12.229

that access

there should also be a process for



00:02:12.229 --> 00:02:12.239

there should also be a process for





00:02:12.239 --> 00:02:14.390

there should also be a process for

revalidating that access on a regular



00:02:14.390 --> 00:02:14.400

revalidating that access on a regular





00:02:14.400 --> 00:02:16.390

revalidating that access on a regular

basis



00:02:16.390 --> 00:02:16.400

basis





00:02:16.400 --> 00:02:18.470

basis

additional checks need to be made



00:02:18.470 --> 00:02:18.480

additional checks need to be made





00:02:18.480 --> 00:02:23.190

additional checks need to be made

on anyone who has administrator access



00:02:23.190 --> 00:02:23.200

on anyone who has administrator access





00:02:23.200 --> 00:02:24.869

on anyone who has administrator access

and there should also be a process for



00:02:24.869 --> 00:02:24.879

and there should also be a process for





00:02:24.879 --> 00:02:30.790

and there should also be a process for

monitoring for invalid logins



00:02:30.790 --> 00:02:30.800







00:02:30.800 --> 00:02:32.869



next is to have controls around changes



00:02:32.869 --> 00:02:32.879

next is to have controls around changes





00:02:32.879 --> 00:02:35.190

next is to have controls around changes

to the programs



00:02:35.190 --> 00:02:35.200

to the programs





00:02:35.200 --> 00:02:37.430

to the programs

again this typically starts with a



00:02:37.430 --> 00:02:37.440

again this typically starts with a





00:02:37.440 --> 00:02:39.910

again this typically starts with a

policy in this case it's normally the it



00:02:39.910 --> 00:02:39.920

policy in this case it's normally the it





00:02:39.920 --> 00:02:40.949

policy in this case it's normally the it

policy



00:02:40.949 --> 00:02:40.959

policy





00:02:40.959 --> 00:02:43.030

policy

although it may include the it security



00:02:43.030 --> 00:02:43.040

although it may include the it security





00:02:43.040 --> 00:02:45.350

although it may include the it security

policy as well



00:02:45.350 --> 00:02:45.360

policy as well





00:02:45.360 --> 00:02:47.670

policy as well

what is the process and systems used to



00:02:47.670 --> 00:02:47.680

what is the process and systems used to





00:02:47.680 --> 00:02:49.430

what is the process and systems used to

ensure that changes to hardware and



00:02:49.430 --> 00:02:49.440

ensure that changes to hardware and





00:02:49.440 --> 00:02:52.070

ensure that changes to hardware and

software will not risk either the system



00:02:52.070 --> 00:02:52.080

software will not risk either the system





00:02:52.080 --> 00:02:53.670

software will not risk either the system

availability



00:02:53.670 --> 00:02:53.680

availability





00:02:53.680 --> 00:02:56.869

availability

or the security of the system



00:02:56.869 --> 00:02:56.879

or the security of the system





00:02:56.879 --> 00:02:59.509

or the security of the system

program changes could include hardware



00:02:59.509 --> 00:02:59.519

program changes could include hardware





00:02:59.519 --> 00:03:03.190

program changes could include hardware

or system replacements



00:03:03.190 --> 00:03:03.200







00:03:03.200 --> 00:03:05.110



changes to the software this could



00:03:05.110 --> 00:03:05.120

changes to the software this could





00:03:05.120 --> 00:03:07.430

changes to the software this could

include upgrades book physics



00:03:07.430 --> 00:03:07.440

include upgrades book physics





00:03:07.440 --> 00:03:10.790

include upgrades book physics

or code developed in-house



00:03:10.790 --> 00:03:10.800

or code developed in-house





00:03:10.800 --> 00:03:12.710

or code developed in-house

in particular changes that could impact



00:03:12.710 --> 00:03:12.720

in particular changes that could impact





00:03:12.720 --> 00:03:14.630

in particular changes that could impact

performance or changes to security



00:03:14.630 --> 00:03:14.640

performance or changes to security





00:03:14.640 --> 00:03:18.229

performance or changes to security

mechanisms for example able to enabling



00:03:18.229 --> 00:03:18.239

mechanisms for example able to enabling





00:03:18.239 --> 00:03:22.309

mechanisms for example able to enabling

or disabling multi-factor authentication



00:03:22.309 --> 00:03:22.319

or disabling multi-factor authentication





00:03:22.319 --> 00:03:24.229

or disabling multi-factor authentication

another consideration is the approval



00:03:24.229 --> 00:03:24.239

another consideration is the approval





00:03:24.239 --> 00:03:25.430

another consideration is the approval

process



00:03:25.430 --> 00:03:25.440

process





00:03:25.440 --> 00:03:27.430

process

does someone need to review or approve



00:03:27.430 --> 00:03:27.440

does someone need to review or approve





00:03:27.440 --> 00:03:30.309

does someone need to review or approve

changes before they are implemented



00:03:30.309 --> 00:03:30.319

changes before they are implemented





00:03:30.319 --> 00:03:32.070

changes before they are implemented

is there a different approval process



00:03:32.070 --> 00:03:32.080

is there a different approval process





00:03:32.080 --> 00:03:34.789

is there a different approval process

for emergency security patches



00:03:34.789 --> 00:03:34.799

for emergency security patches





00:03:34.799 --> 00:03:37.190

for emergency security patches

or what about code developed in-house is



00:03:37.190 --> 00:03:37.200

or what about code developed in-house is





00:03:37.200 --> 00:03:39.190

or what about code developed in-house is

that reviewed by someone other than the



00:03:39.190 --> 00:03:39.200

that reviewed by someone other than the





00:03:39.200 --> 00:03:41.030

that reviewed by someone other than the

developer



00:03:41.030 --> 00:03:41.040

developer





00:03:41.040 --> 00:03:42.949

developer

the computer operations controls are



00:03:42.949 --> 00:03:42.959

the computer operations controls are





00:03:42.959 --> 00:03:44.949

the computer operations controls are

about maintaining the system including



00:03:44.949 --> 00:03:44.959

about maintaining the system including





00:03:44.959 --> 00:03:48.229

about maintaining the system including

physical access and data integrity



00:03:48.229 --> 00:03:48.239

physical access and data integrity





00:03:48.239 --> 00:03:50.550

physical access and data integrity

this will need input from both the it



00:03:50.550 --> 00:03:50.560

this will need input from both the it





00:03:50.560 --> 00:03:53.990

this will need input from both the it

and security policies



00:03:53.990 --> 00:03:54.000







00:03:54.000 --> 00:03:56.390



what system monitoring is in place both



00:03:56.390 --> 00:03:56.400

what system monitoring is in place both





00:03:56.400 --> 00:03:58.630

what system monitoring is in place both

in terms of availability and monitoring



00:03:58.630 --> 00:03:58.640

in terms of availability and monitoring





00:03:58.640 --> 00:04:01.670

in terms of availability and monitoring

for potential security issues



00:04:01.670 --> 00:04:01.680

for potential security issues





00:04:01.680 --> 00:04:03.910

for potential security issues

is there fixed job scheduling and what



00:04:03.910 --> 00:04:03.920

is there fixed job scheduling and what





00:04:03.920 --> 00:04:05.910

is there fixed job scheduling and what

processes are in place to ensure that



00:04:05.910 --> 00:04:05.920

processes are in place to ensure that





00:04:05.920 --> 00:04:08.789

processes are in place to ensure that

those are not compromised



00:04:08.789 --> 00:04:08.799

those are not compromised





00:04:08.799 --> 00:04:10.869

those are not compromised

how is the data center managed is there



00:04:10.869 --> 00:04:10.879

how is the data center managed is there





00:04:10.879 --> 00:04:12.949

how is the data center managed is there

appropriate systems for redundant power



00:04:12.949 --> 00:04:12.959

appropriate systems for redundant power





00:04:12.959 --> 00:04:16.629

appropriate systems for redundant power

cooling and access control



00:04:16.629 --> 00:04:16.639







00:04:16.639 --> 00:04:18.310



are there appropriate systems in place



00:04:18.310 --> 00:04:18.320

are there appropriate systems in place





00:04:18.320 --> 00:04:20.629

are there appropriate systems in place

for backup and recovery are the backups



00:04:20.629 --> 00:04:20.639

for backup and recovery are the backups





00:04:20.639 --> 00:04:23.030

for backup and recovery are the backups

verified and a process to restore data



00:04:23.030 --> 00:04:23.040

verified and a process to restore data





00:04:23.040 --> 00:04:27.270

verified and a process to restore data

when required



00:04:27.270 --> 00:04:27.280







00:04:27.280 --> 00:04:29.110



you may also need to include disaster



00:04:29.110 --> 00:04:29.120

you may also need to include disaster





00:04:29.120 --> 00:04:31.270

you may also need to include disaster

recovery plans in the case the site is



00:04:31.270 --> 00:04:31.280

recovery plans in the case the site is





00:04:31.280 --> 00:04:33.590

recovery plans in the case the site is

completely unavailable perhaps due to



00:04:33.590 --> 00:04:33.600

completely unavailable perhaps due to





00:04:33.600 --> 00:04:37.110

completely unavailable perhaps due to

fire or a natural disaster



00:04:37.110 --> 00:04:37.120

fire or a natural disaster





00:04:37.120 --> 00:04:39.110

fire or a natural disaster

program development covers internal



00:04:39.110 --> 00:04:39.120

program development covers internal





00:04:39.120 --> 00:04:41.270

program development covers internal

software development but also any



00:04:41.270 --> 00:04:41.280

software development but also any





00:04:41.280 --> 00:04:42.950

software development but also any

software and systems from other



00:04:42.950 --> 00:04:42.960

software and systems from other





00:04:42.960 --> 00:04:45.430

software and systems from other

developers



00:04:45.430 --> 00:04:45.440

developers





00:04:45.440 --> 00:04:47.430

developers

as with all these controls it needs to



00:04:47.430 --> 00:04:47.440

as with all these controls it needs to





00:04:47.440 --> 00:04:49.590

as with all these controls it needs to

start with having a policy in place as



00:04:49.590 --> 00:04:49.600

start with having a policy in place as





00:04:49.600 --> 00:04:52.629

start with having a policy in place as

to how these are implemented



00:04:52.629 --> 00:04:52.639

to how these are implemented





00:04:52.639 --> 00:04:55.270

to how these are implemented

as i said this includes systems that are



00:04:55.270 --> 00:04:55.280

as i said this includes systems that are





00:04:55.280 --> 00:04:58.070

as i said this includes systems that are

brought in or manage services



00:04:58.070 --> 00:04:58.080

brought in or manage services





00:04:58.080 --> 00:04:59.670

brought in or manage services

the controls could start with the



00:04:59.670 --> 00:04:59.680

the controls could start with the





00:04:59.680 --> 00:05:01.189

the controls could start with the

selection of the supplier and the



00:05:01.189 --> 00:05:01.199

selection of the supplier and the





00:05:01.199 --> 00:05:03.990

selection of the supplier and the

acquisition of the services including



00:05:03.990 --> 00:05:04.000

acquisition of the services including





00:05:04.000 --> 00:05:05.990

acquisition of the services including

the implementation and the ongoing



00:05:05.990 --> 00:05:06.000

the implementation and the ongoing





00:05:06.000 --> 00:05:09.430

the implementation and the ongoing

maintenance of the system



00:05:09.430 --> 00:05:09.440







00:05:09.440 --> 00:05:11.430



developing your own code then the system



00:05:11.430 --> 00:05:11.440

developing your own code then the system





00:05:11.440 --> 00:05:13.270

developing your own code then the system

design and architecture needs to be



00:05:13.270 --> 00:05:13.280

design and architecture needs to be





00:05:13.280 --> 00:05:15.189

design and architecture needs to be

covered



00:05:15.189 --> 00:05:15.199

covered





00:05:15.199 --> 00:05:18.310

covered

as well as the development methodology



00:05:18.310 --> 00:05:18.320

as well as the development methodology





00:05:18.320 --> 00:05:20.390

as well as the development methodology

you also need to cover the full software



00:05:20.390 --> 00:05:20.400

you also need to cover the full software





00:05:20.400 --> 00:05:22.390

you also need to cover the full software

development lifecycle



00:05:22.390 --> 00:05:22.400

development lifecycle





00:05:22.400 --> 00:05:24.790

development lifecycle

this should cover in-house systems which



00:05:24.790 --> 00:05:24.800

this should cover in-house systems which





00:05:24.800 --> 00:05:27.350

this should cover in-house systems which

may include testing and software reviews



00:05:27.350 --> 00:05:27.360

may include testing and software reviews





00:05:27.360 --> 00:05:29.110

may include testing and software reviews

also for third-party systems



00:05:29.110 --> 00:05:29.120

also for third-party systems





00:05:29.120 --> 00:05:30.390

also for third-party systems

particularly



00:05:30.390 --> 00:05:30.400

particularly





00:05:30.400 --> 00:05:32.469

particularly

reviews when there is a significant



00:05:32.469 --> 00:05:32.479

reviews when there is a significant





00:05:32.479 --> 00:05:35.909

reviews when there is a significant

change to the software or to the system



00:05:35.909 --> 00:05:35.919

change to the software or to the system





00:05:35.919 --> 00:05:38.070

change to the software or to the system

implementing it general controls



00:05:38.070 --> 00:05:38.080

implementing it general controls





00:05:38.080 --> 00:05:40.550

implementing it general controls

involves an initial assessment writing



00:05:40.550 --> 00:05:40.560

involves an initial assessment writing





00:05:40.560 --> 00:05:42.950

involves an initial assessment writing

document collecting evidence and then



00:05:42.950 --> 00:05:42.960

document collecting evidence and then





00:05:42.960 --> 00:05:44.310

document collecting evidence and then

reviewing



00:05:44.310 --> 00:05:44.320

reviewing





00:05:44.320 --> 00:05:46.230

reviewing

this needs to be repeated



00:05:46.230 --> 00:05:46.240

this needs to be repeated





00:05:46.240 --> 00:05:48.310

this needs to be repeated

as changes are made



00:05:48.310 --> 00:05:48.320

as changes are made





00:05:48.320 --> 00:05:51.350

as changes are made

or as part of a regular review schedule



00:05:51.350 --> 00:05:51.360

or as part of a regular review schedule





00:05:51.360 --> 00:05:53.590

or as part of a regular review schedule

i've illustrated this as a cycle this is



00:05:53.590 --> 00:05:53.600

i've illustrated this as a cycle this is





00:05:53.600 --> 00:05:55.510

i've illustrated this as a cycle this is

something that should be repeated



00:05:55.510 --> 00:05:55.520

something that should be repeated





00:05:55.520 --> 00:05:57.029

something that should be repeated

different systems may need to be



00:05:57.029 --> 00:05:57.039

different systems may need to be





00:05:57.039 --> 00:05:59.110

different systems may need to be

reviewed at a different rate depending



00:05:59.110 --> 00:05:59.120

reviewed at a different rate depending





00:05:59.120 --> 00:06:03.670

reviewed at a different rate depending

upon how the systems change over time



00:06:03.670 --> 00:06:03.680







00:06:03.680 --> 00:06:05.270



this has just been a quick overview of



00:06:05.270 --> 00:06:05.280

this has just been a quick overview of





00:06:05.280 --> 00:06:06.790

this has just been a quick overview of

some of the aspects related to



00:06:06.790 --> 00:06:06.800

some of the aspects related to





00:06:06.800 --> 00:06:09.430

some of the aspects related to

implementing it general controls



00:06:09.430 --> 00:06:09.440

implementing it general controls





00:06:09.440 --> 00:06:10.950

implementing it general controls

there are many sub-aspects to the



00:06:10.950 --> 00:06:10.960

there are many sub-aspects to the





00:06:10.960 --> 00:06:13.749

there are many sub-aspects to the

process which i've only skimmed over



00:06:13.749 --> 00:06:13.759

process which i've only skimmed over





00:06:13.759 --> 00:06:15.990

process which i've only skimmed over

hopefully this has been useful if so



00:06:15.990 --> 00:06:16.000

hopefully this has been useful if so





00:06:16.000 --> 00:06:17.909

hopefully this has been useful if so

please give the video a like



00:06:17.909 --> 00:06:17.919

please give the video a like





00:06:17.919 --> 00:06:19.350

please give the video a like

i'll be adding more cyber security



00:06:19.350 --> 00:06:19.360

i'll be adding more cyber security





00:06:19.360 --> 00:06:22.070

i'll be adding more cyber security

videos in future so please subscribe if



00:06:22.070 --> 00:06:22.080

videos in future so please subscribe if





00:06:22.080 --> 00:06:23.029

videos in future so please subscribe if

that is something you would be



00:06:23.029 --> 00:06:23.039

that is something you would be





00:06:23.039 --> 00:06:24.950

that is something you would be

interested in and don't forget to click



00:06:24.950 --> 00:06:24.960

interested in and don't forget to click





00:06:24.960 --> 00:06:26.950

interested in and don't forget to click

on the notification icon to get notified



00:06:26.950 --> 00:06:26.960

on the notification icon to get notified





00:06:26.960 --> 00:06:29.029

on the notification icon to get notified

when a new video is released



00:06:29.029 --> 00:06:29.039

when a new video is released





00:06:29.039 --> 00:06:30.790

when a new video is released

thanks for watching i look forward to



00:06:30.790 --> 00:06:30.800

thanks for watching i look forward to





00:06:30.800 --> 00:06:34.840

thanks for watching i look forward to

seeing you on a future video



Previous Introduction to Cryptography
Introduction to Cryptography