YouTube

Got a YouTube account?

New: enable viewer-created translations and captions on your YouTube channel!

English subtitles

← The Internet: Cybersecurity & Crime

Get Embed Code
10 Languages

Showing Revision 1 created 03/17/2016 by Code.org.

  1. The Internet: Cybersecurity and Crime

  2. Hi, my name's Jenny Martin and I'm the
    director of cyber security
  3. investigations at Symantec. Today
    cybercrime causes huge problems for
  4. society personally, financially, and even
    in matters of national security. Just in
  5. the last few years hundreds of millions
    of credit card numbers have been stolen,
  6. tens of millions of Social Security
    numbers and healthcare records were
  7. compromised, even nuclear centrifuges
    that have been hacked, and unmanned
  8. aerial drones have been hijacked. This is
    all done by exploiting vulnerabilities
  9. in hardware and software or more often
    by taking advantage of unintentional
  10. decisions made by the people using the
    software. People committing these cyber
  11. crimes don't a single profile or
    motivation it could be anyone from an
  12. international terrorist to a teenager competing
    for bragging rights. Today the largest
  13. countries not only have a regular army
    but also have a well armed cyber army. In
  14. fact the next World War may not be
    fought with traditional weapons, but with
  15. computers used to shut down national
    water supplies, energy grids, and
  16. transportation systems. Hi my name is Parisa and
    I'm Google Security Princess. I've worked
  17. on a lot of different products
    and a lot of different ways to try and
  18. make our software as secure as possible.
  19. Now let's take a look at how cybercrime
    works under the hood
  20. will learn about software viruses,
    denial-of-service attacks, and phishing
  21. scams. In biology and life, a virus is an
    organism that is spread by coughing,
  22. sneezing, or physical contact.
  23. Viruses work by infecting cells,
    injecting their genetic material, and
  24. using those cells to replicate. They can make people really sick and then spread to other people.
  25. A computer virus works bit similarly. A
    virus is an executable program that gets
  26. installed, usually unintentionally, and harms the user and their computer. It's also
  27. possible for a virus to spread itself to other
    computers. Now how does a virus get on your
  28. computer in the first place? There are a
    couple ways an attacker can infect someone's
  29. computer. They might lure a victim into
    installing a program with deception about the
  30. program's purpose, so for example a lot
    of viruses are disguised as security updates.
  31. It's also possible that the software on your computer has a vulnerability, so an attacker can install itself
  32. without even needing explicit permission.
  33. Once a virus is on your computer it can
    steal or delete any of your files,
  34. control other programs, or even allow
    someone else to remotely control your
  35. computer.
  36. Using computer viruses, hackers can take
    over millions of computers world wide
  37. and then use them as a digital army, otherwise known as a botnet, to attack and take down websites.
  38. This kind of attack is called a
    distributed denial of service.
  39. A denial of service is when hackers
    overwhelm a website with too many
  40. requests. We call it a distributed
    denial-of-service when the attack comes from many
  41. computers all at once.
  42. Most websites are ready to respond to
    millions of requests a day, but if you
  43. hit them with billions or trillions of requests, coming from different places,
  44. the computers are overloaded and stop
    responding. Another trick used by
  45. cybercriminals is to send large amounts of spam
    email in an attempt to trick people
  46. into sharing sensitive personal information.
  47. This is called a phishing scam. A phishing scam is when you get what seems like a
  48. trustworthy email asking you to log
    into your account, but clicking the email
  49. takes you to a fake website.
  50. if you log in anyway you've been
    tricked into giving your password away.
  51. Hackers can then use your login
    credentials to access your real accounts
  52. to steal information or maybe even to
    steal your money. Fortunately there are
  53. many companies, laws, and government
    organizations working to make the
  54. internet safer, but these efforts are
    not enough.
  55. You may think when a computer system
    gets hacked the problem was the security
  56. design or the software. Ninety percent
    of the time the system gets hacked
  57. however, it's not because of the security bug, but because of a simple mistake made by
  58. a human. It turns out there are steps we
    can all take to protect ourselves. Often
  59. your actions not only impact the
    security of your own data and computer, but the
  60. security of everyone at your school,
  61. workplace, and home. With billions or
    trillions of dollars at stake
  62. cybercriminals get smarter each year and
    we all need to keep up.