0:00:07.961,0:00:09.567 - Hi. My name's Jenny Martin 0:00:09.567,0:00:11.195 and I'm the Director of Cybersecurity 0:00:11.195,0:00:13.633 Investigations at Symantec. 0:00:13.633,0:00:16.211 Today cybercrime causes huge problems 0:00:16.211,0:00:17.381 for society. 0:00:17.381,0:00:19.804 Personally, financially, and even 0:00:19.804,0:00:22.178 in matters of national security. 0:00:22.178,0:00:23.857 Just in the last few years, 0:00:23.857,0:00:25.754 hundreds of millions[br]of credit card numbers 0:00:25.754,0:00:27.031 have been stolen. 0:00:27.031,0:00:29.213 Tens of millions of[br]social security numbers 0:00:29.213,0:00:31.881 and health care records were compromised. 0:00:31.881,0:00:34.769 Even nuclear centrifuges have been hacked 0:00:34.769,0:00:37.920 and unmanned aerial[br]drones have been hijacked. 0:00:37.920,0:00:40.646 This is all done by[br]exploiting vulnerabilities 0:00:40.646,0:00:42.588 in hardware and software. 0:00:42.588,0:00:44.422 Or more often by taking advantage of 0:00:44.422,0:00:46.565 unintentional decisions made by the people 0:00:46.565,0:00:48.649 using the software. 0:00:51.764,0:00:53.766 The people committing these cybercrimes 0:00:53.766,0:00:56.542 don't fit a single profile or motivation. 0:00:56.542,0:00:59.236 It could be anyone from an[br]international terrorist, 0:00:59.236,0:01:02.254 to a teenager competing[br]for bragging rights. 0:01:02.524,0:01:04.495 Today, the largest countries not only 0:01:04.495,0:01:06.469 have a regular army, but also have 0:01:06.469,0:01:08.918 a well-armed cyber army. 0:01:08.918,0:01:10.676 In fact, the next world war may not 0:01:10.676,0:01:12.248 be fought with traditional weapons 0:01:12.248,0:01:14.096 but with computers, used to shut down 0:01:14.096,0:01:17.141 national water supplies, energy grids, 0:01:17.141,0:01:20.011 and transportation systems. 0:01:20.770,0:01:22.100 - Hi. My name is Parisa 0:01:22.100,0:01:24.684 and I'm Google's Security Princess. 0:01:24.684,0:01:27.247 I've worked on a lot of[br]different Google products 0:01:27.247,0:01:31.044 in a lot of different ways[br]to try and make our software 0:01:31.044,0:01:33.427 as secure as possible. 0:01:33.758,0:01:35.406 Now let's take a look at how cybercrime 0:01:35.406,0:01:37.055 works under the hood. 0:01:37.055,0:01:39.121 We'll learn about software viruses, 0:01:39.121,0:01:42.790 denial-of-service attacks,[br]and phishing scams. 0:01:42.790,0:01:45.328 In biology in life, a virus is an organism 0:01:45.328,0:01:47.374 that is spread by coughing, sneezing, 0:01:47.374,0:01:49.076 or physical contact. 0:01:49.076,0:01:51.298 Viruses work by infecting cells, 0:01:51.298,0:01:53.192 injecting their genetic material 0:01:53.192,0:01:55.142 and using those cells to replicate. 0:01:55.142,0:01:56.725 They can make people really sick 0:01:56.725,0:01:59.038 and then spread to other people. 0:01:59.159,0:02:02.085 A computer virus works a bit similarly. 0:02:02.085,0:02:03.966 A virus is an executable program 0:02:03.966,0:02:07.064 that gets installed,[br]usually unintentionally, 0:02:07.064,0:02:09.678 and harms a user and their computer. 0:02:09.678,0:02:12.050 It's also possible for[br]a virus to spread itself 0:02:12.050,0:02:14.177 to other computers. 0:02:14.977,0:02:16.527 Now how does a virus get on your computer 0:02:16.527,0:02:17.970 in the first place? 0:02:17.970,0:02:19.197 There are couple ways an attacker 0:02:19.197,0:02:21.221 can infect someone's computer. 0:02:21.221,0:02:23.559 They might lure a victim[br]into installing a program 0:02:23.559,0:02:26.256 with deception about[br]the program's purpose. 0:02:26.256,0:02:28.725 So for example, a lot[br]of viruses are disguised 0:02:28.725,0:02:30.894 as security updates. 0:02:31.050,0:02:33.269 It's also possible that the[br]software on your computer 0:02:33.269,0:02:34.588 has a vulnerability. 0:02:34.588,0:02:36.542 So an attacker can install itself 0:02:36.542,0:02:39.509 without even needing explicit permission. 0:02:39.623,0:02:41.604 Once a virus in on your computer 0:02:41.604,0:02:44.227 it can steal or delete any of your files, 0:02:44.227,0:02:46.961 control other programs,[br]or even allow someone else 0:02:46.961,0:02:50.305 to remotely control your computer. 0:02:52.119,0:02:54.424 Using computer viruses,[br]hackers can take over 0:02:54.424,0:02:56.557 millions of computers worldwide. 0:02:56.557,0:02:58.368 And then use them as a digital army, 0:02:58.368,0:03:00.033 otherwise known as a botnet, 0:03:00.033,0:03:03.028 to attack and take down websites. 0:03:03.028,0:03:04.428 This kind of attack is called 0:03:04.428,0:03:07.140 a distributed denial-of-service. 0:03:07.140,0:03:08.962 A denial-of-service is when hackers 0:03:08.962,0:03:11.668 overwhelm a website[br]with too many requests. 0:03:11.668,0:03:13.665 We call it a distributed denial-of-service 0:03:13.665,0:03:15.509 when the attack comes from many computers 0:03:15.509,0:03:17.343 all at once. 0:03:18.308,0:03:19.875 Most websites are ready to respond 0:03:19.875,0:03:21.582 to millions of requests a day, 0:03:21.582,0:03:23.716 but if you hit them with[br]billions or trillions 0:03:23.716,0:03:26.067 of requests coming from different places, 0:03:26.067,0:03:29.379 the computers are overloaded[br]and stop responding. 0:03:30.472,0:03:32.346 - Another trick used by cybercriminals 0:03:32.346,0:03:34.724 is to send large amounts of spam email 0:03:34.724,0:03:36.419 in an attempt to trick people 0:03:36.419,0:03:39.624 into sharing sensitive[br]personal information. 0:03:39.624,0:03:42.526 This is called a phishing scam. 0:03:42.526,0:03:44.029 A phishing scam is when you get 0:03:44.029,0:03:46.380 what seems like a trustworthy email 0:03:46.380,0:03:48.633 asking you to login to your account, 0:03:48.633,0:03:51.966 but clicking the email[br]takes you to a fake website. 0:03:51.966,0:03:54.328 If you login anyway, you've been tricked 0:03:54.328,0:03:56.772 into giving your password away. 0:03:56.772,0:03:58.826 Hackers can then use[br]your login credentials 0:03:58.826,0:04:00.614 to access your real accounts 0:04:00.614,0:04:02.764 to steal information, or maybe even 0:04:02.764,0:04:04.799 to steal your money. 0:04:04.799,0:04:06.534 Fortunately there are many companies, 0:04:06.534,0:04:09.158 laws, and government organizations 0:04:09.158,0:04:11.341 working to make the internet safer. 0:04:11.341,0:04:14.214 But these efforts are not enough. 0:04:15.109,0:04:17.285 You may think when a[br]computer system gets hacked, 0:04:17.285,0:04:19.212 the problem was the security design, 0:04:19.212,0:04:20.930 or the software. 0:04:20.930,0:04:23.368 90% of the time a system[br]gets hacked however, 0:04:23.368,0:04:25.103 it's not because of a security bug, 0:04:25.103,0:04:29.144 but because of a simple[br]mistake made by a human. 0:04:31.379,0:04:33.197 - It turns out there are[br]steps we can all take 0:04:33.197,0:04:34.629 to protect ourselves. 0:04:34.629,0:04:36.508 Often, your actions not only impact 0:04:36.508,0:04:38.819 the security of your[br]own data and computer, 0:04:38.819,0:04:40.465 but the security of everyone 0:04:40.465,0:04:43.406 at your school, workplace, and home. 0:04:43.526,0:04:46.435 With billions or trillions[br]of dollars at stake, 0:04:46.435,0:04:48.468 cybercriminals get smarter each year, 0:04:48.468,0:04:51.198 and we all need to keep up.