Return to Video

The Internet: Cybersecurity & Crime

  • 0:02 - 0:07
    The Internet: Cybersecurity and Crime
  • 0:07 - 0:11
    Hi, my name's Jenny Martin and I'm the
    director of cyber security
  • 0:11 - 0:16
    investigations at Symantec. Today
    cybercrime causes huge problems for
  • 0:16 - 0:23
    society personally, financially, and even
    in matters of national security. Just in
  • 0:23 - 0:27
    the last few years hundreds of millions
    of credit card numbers have been stolen,
  • 0:27 - 0:31
    tens of millions of Social Security
    numbers and healthcare records were
  • 0:31 - 0:35
    compromised, even nuclear centrifuges
    that have been hacked, and unmanned
  • 0:35 - 0:40
    aerial drones have been hijacked. This is
    all done by exploiting vulnerabilities
  • 0:40 - 0:45
    in hardware and software or more often
    by taking advantage of unintentional
  • 0:45 - 0:53
    decisions made by the people using the
    software. People committing these cyber
  • 0:53 - 0:58
    crimes don't a single profile or
    motivation it could be anyone from an
  • 0:58 - 1:03
    international terrorist to a teenager competing
    for bragging rights. Today the largest
  • 1:03 - 1:09
    countries not only have a regular army
    but also have a well armed cyber army. In
  • 1:09 - 1:12
    fact the next World War may not be
    fought with traditional weapons, but with
  • 1:12 - 1:17
    computers used to shut down national
    water supplies, energy grids, and
  • 1:17 - 1:25
    transportation systems. Hi my name is Parisa and
    I'm Google Security Princess. I've worked
  • 1:25 - 1:30
    on a lot of different products
    and a lot of different ways to try and
  • 1:30 - 1:34
    make our software as secure as possible.
  • 1:34 - 1:37
    Now let's take a look at how cybercrime
    works under the hood
  • 1:37 - 1:41
    will learn about software viruses,
    denial-of-service attacks, and phishing
  • 1:41 - 1:46
    scams. In biology and life, a virus is an
    organism that is spread by coughing,
  • 1:46 - 1:49
    sneezing, or physical contact.
  • 1:49 - 1:53
    Viruses work by infecting cells,
    injecting their genetic material, and
  • 1:53 - 1:59
    using those cells to replicate. They can make people really sick and then spread to other people.
  • 1:59 - 2:04
    A computer virus works bit similarly. A
    virus is an executable program that gets
  • 2:04 - 2:10
    installed, usually unintentionally, and harms the user and their computer. It's also
  • 2:10 - 2:16
    possible for a virus to spread itself to other
    computers. Now how does a virus get on your
  • 2:16 - 2:20
    computer in the first place? There are a
    couple ways an attacker can infect someone's
  • 2:20 - 2:25
    computer. They might lure a victim into
    installing a program with deception about the
  • 2:25 - 2:29
    program's purpose, so for example a lot
    of viruses are disguised as security updates.
  • 2:29 - 2:36
    It's also possible that the software on your computer has a vulnerability, so an attacker can install itself
  • 2:36 - 2:39
    without even needing explicit permission.
  • 2:39 - 2:44
    Once a virus is on your computer it can
    steal or delete any of your files,
  • 2:44 - 2:48
    control other programs, or even allow
    someone else to remotely control your
  • 2:48 - 2:50
    computer.
  • 2:50 - 2:56
    Using computer viruses, hackers can take
    over millions of computers world wide
  • 2:56 - 3:01
    and then use them as a digital army, otherwise known as a botnet, to attack and take down websites.
  • 3:01 - 3:07
    This kind of attack is called a
    distributed denial of service.
  • 3:07 - 3:10
    A denial of service is when hackers
    overwhelm a website with too many
  • 3:10 - 3:15
    requests. We call it a distributed
    denial-of-service when the attack comes from many
  • 3:15 - 3:17
    computers all at once.
  • 3:17 - 3:22
    Most websites are ready to respond to
    millions of requests a day, but if you
  • 3:22 - 3:25
    hit them with billions or trillions of requests, coming from different places,
  • 3:25 - 3:32
    the computers are overloaded and stop
    responding. Another trick used by
  • 3:32 - 3:36
    cybercriminals is to send large amounts of spam
    email in an attempt to trick people
  • 3:36 - 3:39
    into sharing sensitive personal information.
  • 3:39 - 3:45
    This is called a phishing scam. A phishing scam is when you get what seems like a
  • 3:45 - 3:50
    trustworthy email asking you to log
    into your account, but clicking the email
  • 3:50 - 3:52
    takes you to a fake website.
  • 3:52 - 3:56
    if you log in anyway you've been
    tricked into giving your password away.
  • 3:56 - 4:00
    Hackers can then use your login
    credentials to access your real accounts
  • 4:00 - 4:06
    to steal information or maybe even to
    steal your money. Fortunately there are
  • 4:06 - 4:10
    many companies, laws, and government
    organizations working to make the
  • 4:10 - 4:15
    internet safer, but these efforts are
    not enough.
  • 4:15 - 4:18
    You may think when a computer system
    gets hacked the problem was the security
  • 4:18 - 4:23
    design or the software. Ninety percent
    of the time the system gets hacked
  • 4:23 - 4:27
    however, it's not because of the security bug, but because of a simple mistake made by
  • 4:27 - 4:35
    a human. It turns out there are steps we
    can all take to protect ourselves. Often
  • 4:35 - 4:39
    your actions not only impact the
    security of your own data and computer, but the
  • 4:39 - 4:42
    security of everyone at your school,
  • 4:42 - 4:47
    workplace, and home. With billions or
    trillions of dollars at stake
  • 4:47 - 4:52
    cybercriminals get smarter each year and
    we all need to keep up.
Title:
The Internet: Cybersecurity & Crime
Description:

Parisa Tabriz from Google Jenny Martin from Symantec introduce the most common types of cybercrime including viruses, malware, DDOS attacks and phishing scams. Watch til 4:40 to see the top four tips to avoid getting hacked.

Start learning at http://code.org/

Stay in touch with us!
• on Twitter https://twitter.com/codeorg
• on Facebook https://www.facebook.com/Code.org
• on Instagram https://instagram.com/codeorg
• on Tumblr https://blog.code.org
• on LinkedIn https://www.linkedin.com/company/code-org
• on Google+ https://google.com/+codeorg

more » « less
Video Language:
English
Duration:
05:02

English subtitles

Revisions