1 00:00:02,220 --> 00:00:06,660 The Internet: Cybersecurity and Crime 2 00:00:06,660 --> 00:00:11,080 Hi, my name's Jenny Martin and I'm the director of cyber security 3 00:00:11,080 --> 00:00:16,299 investigations at Symantec. Today cybercrime causes huge problems for 4 00:00:16,299 --> 00:00:22,550 society personally, financially, and even in matters of national security. Just in 5 00:00:22,550 --> 00:00:26,660 the last few years hundreds of millions of credit card numbers have been stolen, 6 00:00:26,660 --> 00:00:30,539 tens of millions of Social Security numbers and healthcare records were 7 00:00:30,539 --> 00:00:35,360 compromised, even nuclear centrifuges that have been hacked, and unmanned 8 00:00:35,360 --> 00:00:40,090 aerial drones have been hijacked. This is all done by exploiting vulnerabilities 9 00:00:40,090 --> 00:00:45,059 in hardware and software or more often by taking advantage of unintentional 10 00:00:45,059 --> 00:00:53,300 decisions made by the people using the software. People committing these cyber 11 00:00:53,300 --> 00:00:57,600 crimes don't a single profile or motivation it could be anyone from an 12 00:00:57,600 --> 00:01:03,329 international terrorist to a teenager competing for bragging rights. Today the largest 13 00:01:03,329 --> 00:01:08,960 countries not only have a regular army but also have a well armed cyber army. In 14 00:01:08,960 --> 00:01:12,500 fact the next World War may not be fought with traditional weapons, but with 15 00:01:12,500 --> 00:01:17,210 computers used to shut down national water supplies, energy grids, and 16 00:01:17,210 --> 00:01:25,330 transportation systems. Hi my name is Parisa and I'm Google Security Princess. I've worked 17 00:01:25,330 --> 00:01:29,540 on a lot of different products and a lot of different ways to try and 18 00:01:29,540 --> 00:01:33,600 make our software as secure as possible. 19 00:01:33,600 --> 00:01:36,690 Now let's take a look at how cybercrime works under the hood 20 00:01:36,690 --> 00:01:41,320 will learn about software viruses, denial-of-service attacks, and phishing 21 00:01:41,320 --> 00:01:46,170 scams. In biology and life, a virus is an organism that is spread by coughing, 22 00:01:46,170 --> 00:01:49,130 sneezing, or physical contact. 23 00:01:49,130 --> 00:01:53,370 Viruses work by infecting cells, injecting their genetic material, and 24 00:01:53,370 --> 00:01:59,140 using those cells to replicate. They can make people really sick and then spread to other people. 25 00:01:59,140 --> 00:02:04,290 A computer virus works bit similarly. A virus is an executable program that gets 26 00:02:04,290 --> 00:02:10,090 installed, usually unintentionally, and harms the user and their computer. It's also 27 00:02:10,090 --> 00:02:16,210 possible for a virus to spread itself to other computers. Now how does a virus get on your 28 00:02:16,210 --> 00:02:19,880 computer in the first place? There are a couple ways an attacker can infect someone's 29 00:02:19,880 --> 00:02:24,730 computer. They might lure a victim into installing a program with deception about the 30 00:02:24,730 --> 00:02:29,200 program's purpose, so for example a lot of viruses are disguised as security updates. 31 00:02:29,200 --> 00:02:35,920 It's also possible that the software on your computer has a vulnerability, so an attacker can install itself 32 00:02:35,920 --> 00:02:39,330 without even needing explicit permission. 33 00:02:39,330 --> 00:02:43,590 Once a virus is on your computer it can steal or delete any of your files, 34 00:02:43,590 --> 00:02:47,959 control other programs, or even allow someone else to remotely control your 35 00:02:47,959 --> 00:02:50,340 computer. 36 00:02:50,340 --> 00:02:55,830 Using computer viruses, hackers can take over millions of computers world wide 37 00:02:55,830 --> 00:03:01,280 and then use them as a digital army, otherwise known as a botnet, to attack and take down websites. 38 00:03:01,280 --> 00:03:07,269 This kind of attack is called a distributed denial of service. 39 00:03:07,269 --> 00:03:10,470 A denial of service is when hackers overwhelm a website with too many 40 00:03:10,470 --> 00:03:14,840 requests. We call it a distributed denial-of-service when the attack comes from many 41 00:03:14,840 --> 00:03:16,540 computers all at once. 42 00:03:16,540 --> 00:03:21,950 Most websites are ready to respond to millions of requests a day, but if you 43 00:03:21,950 --> 00:03:25,430 hit them with billions or trillions of requests, coming from different places, 44 00:03:25,430 --> 00:03:31,500 the computers are overloaded and stop responding. Another trick used by 45 00:03:31,500 --> 00:03:35,970 cybercriminals is to send large amounts of spam email in an attempt to trick people 46 00:03:35,970 --> 00:03:39,110 into sharing sensitive personal information. 47 00:03:39,110 --> 00:03:44,920 This is called a phishing scam. A phishing scam is when you get what seems like a 48 00:03:44,920 --> 00:03:49,590 trustworthy email asking you to log into your account, but clicking the email 49 00:03:49,590 --> 00:03:51,560 takes you to a fake website. 50 00:03:51,560 --> 00:03:55,599 if you log in anyway you've been tricked into giving your password away. 51 00:03:55,599 --> 00:04:00,390 Hackers can then use your login credentials to access your real accounts 52 00:04:00,390 --> 00:04:05,520 to steal information or maybe even to steal your money. Fortunately there are 53 00:04:05,520 --> 00:04:09,920 many companies, laws, and government organizations working to make the 54 00:04:09,920 --> 00:04:14,750 internet safer, but these efforts are not enough. 55 00:04:14,750 --> 00:04:18,450 You may think when a computer system gets hacked the problem was the security 56 00:04:18,450 --> 00:04:22,860 design or the software. Ninety percent of the time the system gets hacked 57 00:04:22,860 --> 00:04:26,980 however, it's not because of the security bug, but because of a simple mistake made by 58 00:04:26,980 --> 00:04:35,070 a human. It turns out there are steps we can all take to protect ourselves. Often 59 00:04:35,070 --> 00:04:39,040 your actions not only impact the security of your own data and computer, but the 60 00:04:39,040 --> 00:04:41,550 security of everyone at your school, 61 00:04:41,550 --> 00:04:46,510 workplace, and home. With billions or trillions of dollars at stake 62 00:04:46,510 --> 00:04:51,590 cybercriminals get smarter each year and we all need to keep up.