[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:02.22,0:00:06.66,Default,,0000,0000,0000,,The Internet: Cybersecurity and Crime Dialogue: 0,0:00:06.66,0:00:11.08,Default,,0000,0000,0000,,Hi, my name's Jenny Martin and I'm the\Ndirector of cyber security Dialogue: 0,0:00:11.08,0:00:16.30,Default,,0000,0000,0000,,investigations at Symantec. Today\Ncybercrime causes huge problems for Dialogue: 0,0:00:16.30,0:00:22.55,Default,,0000,0000,0000,,society personally, financially, and even\Nin matters of national security. Just in Dialogue: 0,0:00:22.55,0:00:26.66,Default,,0000,0000,0000,,the last few years hundreds of millions\Nof credit card numbers have been stolen, Dialogue: 0,0:00:26.66,0:00:30.54,Default,,0000,0000,0000,,tens of millions of Social Security\Nnumbers and healthcare records were Dialogue: 0,0:00:30.54,0:00:35.36,Default,,0000,0000,0000,,compromised, even nuclear centrifuges\Nthat have been hacked, and unmanned Dialogue: 0,0:00:35.36,0:00:40.09,Default,,0000,0000,0000,,aerial drones have been hijacked. This is\Nall done by exploiting vulnerabilities Dialogue: 0,0:00:40.09,0:00:45.06,Default,,0000,0000,0000,,in hardware and software or more often\Nby taking advantage of unintentional Dialogue: 0,0:00:45.06,0:00:53.30,Default,,0000,0000,0000,,decisions made by the people using the\Nsoftware. People committing these cyber Dialogue: 0,0:00:53.30,0:00:57.60,Default,,0000,0000,0000,,crimes don't a single profile or\Nmotivation it could be anyone from an Dialogue: 0,0:00:57.60,0:01:03.33,Default,,0000,0000,0000,,international terrorist to a teenager competing\Nfor bragging rights. Today the largest Dialogue: 0,0:01:03.33,0:01:08.96,Default,,0000,0000,0000,,countries not only have a regular army\Nbut also have a well armed cyber army. In Dialogue: 0,0:01:08.96,0:01:12.50,Default,,0000,0000,0000,,fact the next World War may not be\Nfought with traditional weapons, but with Dialogue: 0,0:01:12.50,0:01:17.21,Default,,0000,0000,0000,,computers used to shut down national\Nwater supplies, energy grids, and Dialogue: 0,0:01:17.21,0:01:25.33,Default,,0000,0000,0000,,transportation systems. Hi my name is Parisa and\NI'm Google Security Princess. I've worked Dialogue: 0,0:01:25.33,0:01:29.54,Default,,0000,0000,0000,,on a lot of different products\Nand a lot of different ways to try and Dialogue: 0,0:01:29.54,0:01:33.60,Default,,0000,0000,0000,,make our software as secure as possible. Dialogue: 0,0:01:33.60,0:01:36.69,Default,,0000,0000,0000,,Now let's take a look at how cybercrime\Nworks under the hood Dialogue: 0,0:01:36.69,0:01:41.32,Default,,0000,0000,0000,,will learn about software viruses,\Ndenial-of-service attacks, and phishing Dialogue: 0,0:01:41.32,0:01:46.17,Default,,0000,0000,0000,,scams. In biology and life, a virus is an\Norganism that is spread by coughing, Dialogue: 0,0:01:46.17,0:01:49.13,Default,,0000,0000,0000,,sneezing, or physical contact. Dialogue: 0,0:01:49.13,0:01:53.37,Default,,0000,0000,0000,,Viruses work by infecting cells,\Ninjecting their genetic material, and Dialogue: 0,0:01:53.37,0:01:59.14,Default,,0000,0000,0000,,using those cells to replicate. They can make people really sick and then spread to other people. Dialogue: 0,0:01:59.14,0:02:04.29,Default,,0000,0000,0000,,A computer virus works bit similarly. A\Nvirus is an executable program that gets Dialogue: 0,0:02:04.29,0:02:10.09,Default,,0000,0000,0000,,installed, usually unintentionally, and harms the user and their computer. It's also Dialogue: 0,0:02:10.09,0:02:16.21,Default,,0000,0000,0000,,possible for a virus to spread itself to other\Ncomputers. Now how does a virus get on your Dialogue: 0,0:02:16.21,0:02:19.88,Default,,0000,0000,0000,,computer in the first place? There are a\Ncouple ways an attacker can infect someone's Dialogue: 0,0:02:19.88,0:02:24.73,Default,,0000,0000,0000,,computer. They might lure a victim into\Ninstalling a program with deception about the Dialogue: 0,0:02:24.73,0:02:29.20,Default,,0000,0000,0000,,program's purpose, so for example a lot\Nof viruses are disguised as security updates. Dialogue: 0,0:02:29.20,0:02:35.92,Default,,0000,0000,0000,,It's also possible that the software on your computer has a vulnerability, so an attacker can install itself Dialogue: 0,0:02:35.92,0:02:39.33,Default,,0000,0000,0000,,without even needing explicit permission. Dialogue: 0,0:02:39.33,0:02:43.59,Default,,0000,0000,0000,,Once a virus is on your computer it can\Nsteal or delete any of your files, Dialogue: 0,0:02:43.59,0:02:47.96,Default,,0000,0000,0000,,control other programs, or even allow\Nsomeone else to remotely control your Dialogue: 0,0:02:47.96,0:02:50.34,Default,,0000,0000,0000,,computer. Dialogue: 0,0:02:50.34,0:02:55.83,Default,,0000,0000,0000,,Using computer viruses, hackers can take\Nover millions of computers world wide Dialogue: 0,0:02:55.83,0:03:01.28,Default,,0000,0000,0000,,and then use them as a digital army, otherwise known as a botnet, to attack and take down websites. Dialogue: 0,0:03:01.28,0:03:07.27,Default,,0000,0000,0000,,This kind of attack is called a\Ndistributed denial of service. Dialogue: 0,0:03:07.27,0:03:10.47,Default,,0000,0000,0000,,A denial of service is when hackers\Noverwhelm a website with too many Dialogue: 0,0:03:10.47,0:03:14.84,Default,,0000,0000,0000,,requests. We call it a distributed\Ndenial-of-service when the attack comes from many Dialogue: 0,0:03:14.84,0:03:16.54,Default,,0000,0000,0000,,computers all at once. Dialogue: 0,0:03:16.54,0:03:21.95,Default,,0000,0000,0000,,Most websites are ready to respond to\Nmillions of requests a day, but if you Dialogue: 0,0:03:21.95,0:03:25.43,Default,,0000,0000,0000,,hit them with billions or trillions of requests, coming from different places, Dialogue: 0,0:03:25.43,0:03:31.50,Default,,0000,0000,0000,,the computers are overloaded and stop\Nresponding. Another trick used by Dialogue: 0,0:03:31.50,0:03:35.97,Default,,0000,0000,0000,,cybercriminals is to send large amounts of spam\Nemail in an attempt to trick people Dialogue: 0,0:03:35.97,0:03:39.11,Default,,0000,0000,0000,,into sharing sensitive personal information. Dialogue: 0,0:03:39.11,0:03:44.92,Default,,0000,0000,0000,,This is called a phishing scam. A phishing scam is when you get what seems like a Dialogue: 0,0:03:44.92,0:03:49.59,Default,,0000,0000,0000,,trustworthy email asking you to log\Ninto your account, but clicking the email Dialogue: 0,0:03:49.59,0:03:51.56,Default,,0000,0000,0000,,takes you to a fake website. Dialogue: 0,0:03:51.56,0:03:55.60,Default,,0000,0000,0000,,if you log in anyway you've been\Ntricked into giving your password away. Dialogue: 0,0:03:55.60,0:04:00.39,Default,,0000,0000,0000,,Hackers can then use your login\Ncredentials to access your real accounts Dialogue: 0,0:04:00.39,0:04:05.52,Default,,0000,0000,0000,,to steal information or maybe even to\Nsteal your money. Fortunately there are Dialogue: 0,0:04:05.52,0:04:09.92,Default,,0000,0000,0000,,many companies, laws, and government\Norganizations working to make the Dialogue: 0,0:04:09.92,0:04:14.75,Default,,0000,0000,0000,,internet safer, but these efforts are\Nnot enough. Dialogue: 0,0:04:14.75,0:04:18.45,Default,,0000,0000,0000,,You may think when a computer system\Ngets hacked the problem was the security Dialogue: 0,0:04:18.45,0:04:22.86,Default,,0000,0000,0000,,design or the software. Ninety percent\Nof the time the system gets hacked Dialogue: 0,0:04:22.86,0:04:26.98,Default,,0000,0000,0000,,however, it's not because of the security bug, but because of a simple mistake made by Dialogue: 0,0:04:26.98,0:04:35.07,Default,,0000,0000,0000,,a human. It turns out there are steps we\Ncan all take to protect ourselves. Often Dialogue: 0,0:04:35.07,0:04:39.04,Default,,0000,0000,0000,,your actions not only impact the\Nsecurity of your own data and computer, but the Dialogue: 0,0:04:39.04,0:04:41.55,Default,,0000,0000,0000,,security of everyone at your school, Dialogue: 0,0:04:41.55,0:04:46.51,Default,,0000,0000,0000,,workplace, and home. With billions or\Ntrillions of dollars at stake Dialogue: 0,0:04:46.51,0:04:51.59,Default,,0000,0000,0000,,cybercriminals get smarter each year and\Nwe all need to keep up.