0:00:02.220,0:00:06.660 The Internet: Cybersecurity and Crime 0:00:06.660,0:00:11.080 Hi, my name's Jenny Martin and I'm the[br]director of cyber security 0:00:11.080,0:00:16.299 investigations at Symantec. Today[br]cybercrime causes huge problems for 0:00:16.299,0:00:22.550 society personally, financially, and even[br]in matters of national security. Just in 0:00:22.550,0:00:26.660 the last few years hundreds of millions[br]of credit card numbers have been stolen, 0:00:26.660,0:00:30.539 tens of millions of Social Security[br]numbers and healthcare records were 0:00:30.539,0:00:35.360 compromised, even nuclear centrifuges[br]that have been hacked, and unmanned 0:00:35.360,0:00:40.090 aerial drones have been hijacked. This is[br]all done by exploiting vulnerabilities 0:00:40.090,0:00:45.059 in hardware and software or more often[br]by taking advantage of unintentional 0:00:45.059,0:00:53.300 decisions made by the people using the[br]software. People committing these cyber 0:00:53.300,0:00:57.600 crimes don't a single profile or[br]motivation it could be anyone from an 0:00:57.600,0:01:03.329 international terrorist to a teenager competing[br]for bragging rights. Today the largest 0:01:03.329,0:01:08.960 countries not only have a regular army[br]but also have a well armed cyber army. In 0:01:08.960,0:01:12.500 fact the next World War may not be[br]fought with traditional weapons, but with 0:01:12.500,0:01:17.210 computers used to shut down national[br]water supplies, energy grids, and 0:01:17.210,0:01:25.330 transportation systems. Hi my name is Parisa and[br]I'm Google Security Princess. I've worked 0:01:25.330,0:01:29.540 on a lot of different products[br]and a lot of different ways to try and 0:01:29.540,0:01:33.600 make our software as secure as possible. 0:01:33.600,0:01:36.690 Now let's take a look at how cybercrime[br]works under the hood 0:01:36.690,0:01:41.320 will learn about software viruses,[br]denial-of-service attacks, and phishing 0:01:41.320,0:01:46.170 scams. In biology and life, a virus is an[br]organism that is spread by coughing, 0:01:46.170,0:01:49.130 sneezing, or physical contact. 0:01:49.130,0:01:53.370 Viruses work by infecting cells,[br]injecting their genetic material, and 0:01:53.370,0:01:59.140 using those cells to replicate. They can make people really sick and then spread to other people. 0:01:59.140,0:02:04.290 A computer virus works bit similarly. A[br]virus is an executable program that gets 0:02:04.290,0:02:10.090 installed, usually unintentionally, and harms the user and their computer. It's also 0:02:10.090,0:02:16.210 possible for a virus to spread itself to other[br]computers. Now how does a virus get on your 0:02:16.210,0:02:19.880 computer in the first place? There are a[br]couple ways an attacker can infect someone's 0:02:19.880,0:02:24.730 computer. They might lure a victim into[br]installing a program with deception about the 0:02:24.730,0:02:29.200 program's purpose, so for example a lot[br]of viruses are disguised as security updates. 0:02:29.200,0:02:35.920 It's also possible that the software on your computer has a vulnerability, so an attacker can install itself 0:02:35.920,0:02:39.330 without even needing explicit permission. 0:02:39.330,0:02:43.590 Once a virus is on your computer it can[br]steal or delete any of your files, 0:02:43.590,0:02:47.959 control other programs, or even allow[br]someone else to remotely control your 0:02:47.959,0:02:50.340 computer. 0:02:50.340,0:02:55.830 Using computer viruses, hackers can take[br]over millions of computers world wide 0:02:55.830,0:03:01.280 and then use them as a digital army, otherwise known as a botnet, to attack and take down websites. 0:03:01.280,0:03:07.269 This kind of attack is called a[br]distributed denial of service. 0:03:07.269,0:03:10.470 A denial of service is when hackers[br]overwhelm a website with too many 0:03:10.470,0:03:14.840 requests. We call it a distributed[br]denial-of-service when the attack comes from many 0:03:14.840,0:03:16.540 computers all at once. 0:03:16.540,0:03:21.950 Most websites are ready to respond to[br]millions of requests a day, but if you 0:03:21.950,0:03:25.430 hit them with billions or trillions of requests, coming from different places, 0:03:25.430,0:03:31.500 the computers are overloaded and stop[br]responding. Another trick used by 0:03:31.500,0:03:35.970 cybercriminals is to send large amounts of spam[br]email in an attempt to trick people 0:03:35.970,0:03:39.110 into sharing sensitive personal information. 0:03:39.110,0:03:44.920 This is called a phishing scam. A phishing scam is when you get what seems like a 0:03:44.920,0:03:49.590 trustworthy email asking you to log[br]into your account, but clicking the email 0:03:49.590,0:03:51.560 takes you to a fake website. 0:03:51.560,0:03:55.599 if you log in anyway you've been[br]tricked into giving your password away. 0:03:55.599,0:04:00.390 Hackers can then use your login[br]credentials to access your real accounts 0:04:00.390,0:04:05.520 to steal information or maybe even to[br]steal your money. Fortunately there are 0:04:05.520,0:04:09.920 many companies, laws, and government[br]organizations working to make the 0:04:09.920,0:04:14.750 internet safer, but these efforts are[br]not enough. 0:04:14.750,0:04:18.450 You may think when a computer system[br]gets hacked the problem was the security 0:04:18.450,0:04:22.860 design or the software. Ninety percent[br]of the time the system gets hacked 0:04:22.860,0:04:26.980 however, it's not because of the security bug, but because of a simple mistake made by 0:04:26.980,0:04:35.070 a human. It turns out there are steps we[br]can all take to protect ourselves. Often 0:04:35.070,0:04:39.040 your actions not only impact the[br]security of your own data and computer, but the 0:04:39.040,0:04:41.550 security of everyone at your school, 0:04:41.550,0:04:46.510 workplace, and home. With billions or[br]trillions of dollars at stake 0:04:46.510,0:04:51.590 cybercriminals get smarter each year and[br]we all need to keep up.