[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:07.96,0:00:09.57,Default,,0000,0000,0000,,- Hi. My name's Jenny Martin Dialogue: 0,0:00:09.57,0:00:11.20,Default,,0000,0000,0000,,and I'm the Director of Cybersecurity Dialogue: 0,0:00:11.20,0:00:13.63,Default,,0000,0000,0000,,Investigations at Symantec. Dialogue: 0,0:00:13.63,0:00:16.21,Default,,0000,0000,0000,,Today cybercrime causes huge problems Dialogue: 0,0:00:16.21,0:00:17.38,Default,,0000,0000,0000,,for society. Dialogue: 0,0:00:17.38,0:00:19.80,Default,,0000,0000,0000,,Personally, financially, and even Dialogue: 0,0:00:19.80,0:00:22.18,Default,,0000,0000,0000,,in matters of national security. Dialogue: 0,0:00:22.18,0:00:23.86,Default,,0000,0000,0000,,Just in the last few years, Dialogue: 0,0:00:23.86,0:00:25.75,Default,,0000,0000,0000,,hundreds of millions\Nof credit card numbers Dialogue: 0,0:00:25.75,0:00:27.03,Default,,0000,0000,0000,,have been stolen. Dialogue: 0,0:00:27.03,0:00:29.21,Default,,0000,0000,0000,,Tens of millions of\Nsocial security numbers Dialogue: 0,0:00:29.21,0:00:31.88,Default,,0000,0000,0000,,and health care records were compromised. Dialogue: 0,0:00:31.88,0:00:34.77,Default,,0000,0000,0000,,Even nuclear centrifuges have been hacked Dialogue: 0,0:00:34.77,0:00:37.92,Default,,0000,0000,0000,,and unmanned aerial\Ndrones have been hijacked. Dialogue: 0,0:00:37.92,0:00:40.65,Default,,0000,0000,0000,,This is all done by\Nexploiting vulnerabilities Dialogue: 0,0:00:40.65,0:00:42.59,Default,,0000,0000,0000,,in hardware and software. Dialogue: 0,0:00:42.59,0:00:44.42,Default,,0000,0000,0000,,Or more often by taking advantage of Dialogue: 0,0:00:44.42,0:00:46.56,Default,,0000,0000,0000,,unintentional decisions made by the people Dialogue: 0,0:00:46.56,0:00:48.65,Default,,0000,0000,0000,,using the software. Dialogue: 0,0:00:51.76,0:00:53.77,Default,,0000,0000,0000,,The people committing these cybercrimes Dialogue: 0,0:00:53.77,0:00:56.54,Default,,0000,0000,0000,,don't fit a single profile or motivation. Dialogue: 0,0:00:56.54,0:00:59.24,Default,,0000,0000,0000,,It could be anyone from an\Ninternational terrorist, Dialogue: 0,0:00:59.24,0:01:02.25,Default,,0000,0000,0000,,to a teenager competing\Nfor bragging rights. Dialogue: 0,0:01:02.52,0:01:04.50,Default,,0000,0000,0000,,Today, the largest countries not only Dialogue: 0,0:01:04.50,0:01:06.47,Default,,0000,0000,0000,,have a regular army, but also have Dialogue: 0,0:01:06.47,0:01:08.92,Default,,0000,0000,0000,,a well-armed cyber army. Dialogue: 0,0:01:08.92,0:01:10.68,Default,,0000,0000,0000,,In fact, the next world war may not Dialogue: 0,0:01:10.68,0:01:12.25,Default,,0000,0000,0000,,be fought with traditional weapons Dialogue: 0,0:01:12.25,0:01:14.10,Default,,0000,0000,0000,,but with computers, used to shut down Dialogue: 0,0:01:14.10,0:01:17.14,Default,,0000,0000,0000,,national water supplies, energy grids, Dialogue: 0,0:01:17.14,0:01:20.01,Default,,0000,0000,0000,,and transportation systems. Dialogue: 0,0:01:20.77,0:01:22.10,Default,,0000,0000,0000,,- Hi. My name is Parisa Dialogue: 0,0:01:22.10,0:01:24.68,Default,,0000,0000,0000,,and I'm Google's Security Princess. Dialogue: 0,0:01:24.68,0:01:27.25,Default,,0000,0000,0000,,I've worked on a lot of\Ndifferent Google products Dialogue: 0,0:01:27.25,0:01:31.04,Default,,0000,0000,0000,,in a lot of different ways\Nto try and make our software Dialogue: 0,0:01:31.04,0:01:33.43,Default,,0000,0000,0000,,as secure as possible. Dialogue: 0,0:01:33.76,0:01:35.41,Default,,0000,0000,0000,,Now let's take a look at how cybercrime Dialogue: 0,0:01:35.41,0:01:37.06,Default,,0000,0000,0000,,works under the hood. Dialogue: 0,0:01:37.06,0:01:39.12,Default,,0000,0000,0000,,We'll learn about software viruses, Dialogue: 0,0:01:39.12,0:01:42.79,Default,,0000,0000,0000,,denial-of-service attacks,\Nand phishing scams. Dialogue: 0,0:01:42.79,0:01:45.33,Default,,0000,0000,0000,,In biology in life, a virus is an organism Dialogue: 0,0:01:45.33,0:01:47.37,Default,,0000,0000,0000,,that is spread by coughing, sneezing, Dialogue: 0,0:01:47.37,0:01:49.08,Default,,0000,0000,0000,,or physical contact. Dialogue: 0,0:01:49.08,0:01:51.30,Default,,0000,0000,0000,,Viruses work by infecting cells, Dialogue: 0,0:01:51.30,0:01:53.19,Default,,0000,0000,0000,,injecting their genetic material Dialogue: 0,0:01:53.19,0:01:55.14,Default,,0000,0000,0000,,and using those cells to replicate. Dialogue: 0,0:01:55.14,0:01:56.72,Default,,0000,0000,0000,,They can make people really sick Dialogue: 0,0:01:56.72,0:01:59.04,Default,,0000,0000,0000,,and then spread to other people. Dialogue: 0,0:01:59.16,0:02:02.08,Default,,0000,0000,0000,,A computer virus works a bit similarly. Dialogue: 0,0:02:02.08,0:02:03.97,Default,,0000,0000,0000,,A virus is an executable program Dialogue: 0,0:02:03.97,0:02:07.06,Default,,0000,0000,0000,,that gets installed,\Nusually unintentionally, Dialogue: 0,0:02:07.06,0:02:09.68,Default,,0000,0000,0000,,and harms a user and their computer. Dialogue: 0,0:02:09.68,0:02:12.05,Default,,0000,0000,0000,,It's also possible for\Na virus to spread itself Dialogue: 0,0:02:12.05,0:02:14.18,Default,,0000,0000,0000,,to other computers. Dialogue: 0,0:02:14.98,0:02:16.53,Default,,0000,0000,0000,,Now how does a virus get on your computer Dialogue: 0,0:02:16.53,0:02:17.97,Default,,0000,0000,0000,,in the first place? Dialogue: 0,0:02:17.97,0:02:19.20,Default,,0000,0000,0000,,There are couple ways an attacker Dialogue: 0,0:02:19.20,0:02:21.22,Default,,0000,0000,0000,,can infect someone's computer. Dialogue: 0,0:02:21.22,0:02:23.56,Default,,0000,0000,0000,,They might lure a victim\Ninto installing a program Dialogue: 0,0:02:23.56,0:02:26.26,Default,,0000,0000,0000,,with deception about\Nthe program's purpose. Dialogue: 0,0:02:26.26,0:02:28.72,Default,,0000,0000,0000,,So for example, a lot\Nof viruses are disguised Dialogue: 0,0:02:28.72,0:02:30.89,Default,,0000,0000,0000,,as security updates. Dialogue: 0,0:02:31.05,0:02:33.27,Default,,0000,0000,0000,,It's also possible that the\Nsoftware on your computer Dialogue: 0,0:02:33.27,0:02:34.59,Default,,0000,0000,0000,,has a vulnerability. Dialogue: 0,0:02:34.59,0:02:36.54,Default,,0000,0000,0000,,So an attacker can install itself Dialogue: 0,0:02:36.54,0:02:39.51,Default,,0000,0000,0000,,without even needing explicit permission. Dialogue: 0,0:02:39.62,0:02:41.60,Default,,0000,0000,0000,,Once a virus in on your computer Dialogue: 0,0:02:41.60,0:02:44.23,Default,,0000,0000,0000,,it can steal or delete any of your files, Dialogue: 0,0:02:44.23,0:02:46.96,Default,,0000,0000,0000,,control other programs,\Nor even allow someone else Dialogue: 0,0:02:46.96,0:02:50.30,Default,,0000,0000,0000,,to remotely control your computer. Dialogue: 0,0:02:52.12,0:02:54.42,Default,,0000,0000,0000,,Using computer viruses,\Nhackers can take over Dialogue: 0,0:02:54.42,0:02:56.56,Default,,0000,0000,0000,,millions of computers worldwide. Dialogue: 0,0:02:56.56,0:02:58.37,Default,,0000,0000,0000,,And then use them as a digital army, Dialogue: 0,0:02:58.37,0:03:00.03,Default,,0000,0000,0000,,otherwise known as a botnet, Dialogue: 0,0:03:00.03,0:03:03.03,Default,,0000,0000,0000,,to attack and take down websites. Dialogue: 0,0:03:03.03,0:03:04.43,Default,,0000,0000,0000,,This kind of attack is called Dialogue: 0,0:03:04.43,0:03:07.14,Default,,0000,0000,0000,,a distributed denial-of-service. Dialogue: 0,0:03:07.14,0:03:08.96,Default,,0000,0000,0000,,A denial-of-service is when hackers Dialogue: 0,0:03:08.96,0:03:11.67,Default,,0000,0000,0000,,overwhelm a website\Nwith too many requests. Dialogue: 0,0:03:11.67,0:03:13.66,Default,,0000,0000,0000,,We call it a distributed denial-of-service Dialogue: 0,0:03:13.66,0:03:15.51,Default,,0000,0000,0000,,when the attack comes from many computers Dialogue: 0,0:03:15.51,0:03:17.34,Default,,0000,0000,0000,,all at once. Dialogue: 0,0:03:18.31,0:03:19.88,Default,,0000,0000,0000,,Most websites are ready to respond Dialogue: 0,0:03:19.88,0:03:21.58,Default,,0000,0000,0000,,to millions of requests a day, Dialogue: 0,0:03:21.58,0:03:23.72,Default,,0000,0000,0000,,but if you hit them with\Nbillions or trillions Dialogue: 0,0:03:23.72,0:03:26.07,Default,,0000,0000,0000,,of requests coming from different places, Dialogue: 0,0:03:26.07,0:03:29.38,Default,,0000,0000,0000,,the computers are overloaded\Nand stop responding. Dialogue: 0,0:03:30.47,0:03:32.35,Default,,0000,0000,0000,,- Another trick used by cybercriminals Dialogue: 0,0:03:32.35,0:03:34.72,Default,,0000,0000,0000,,is to send large amounts of spam email Dialogue: 0,0:03:34.72,0:03:36.42,Default,,0000,0000,0000,,in an attempt to trick people Dialogue: 0,0:03:36.42,0:03:39.62,Default,,0000,0000,0000,,into sharing sensitive\Npersonal information. Dialogue: 0,0:03:39.62,0:03:42.53,Default,,0000,0000,0000,,This is called a phishing scam. Dialogue: 0,0:03:42.53,0:03:44.03,Default,,0000,0000,0000,,A phishing scam is when you get Dialogue: 0,0:03:44.03,0:03:46.38,Default,,0000,0000,0000,,what seems like a trustworthy email Dialogue: 0,0:03:46.38,0:03:48.63,Default,,0000,0000,0000,,asking you to login to your account, Dialogue: 0,0:03:48.63,0:03:51.97,Default,,0000,0000,0000,,but clicking the email\Ntakes you to a fake website. Dialogue: 0,0:03:51.97,0:03:54.33,Default,,0000,0000,0000,,If you login anyway, you've been tricked Dialogue: 0,0:03:54.33,0:03:56.77,Default,,0000,0000,0000,,into giving your password away. Dialogue: 0,0:03:56.77,0:03:58.83,Default,,0000,0000,0000,,Hackers can then use\Nyour login credentials Dialogue: 0,0:03:58.83,0:04:00.61,Default,,0000,0000,0000,,to access your real accounts Dialogue: 0,0:04:00.61,0:04:02.76,Default,,0000,0000,0000,,to steal information, or maybe even Dialogue: 0,0:04:02.76,0:04:04.80,Default,,0000,0000,0000,,to steal your money. Dialogue: 0,0:04:04.80,0:04:06.53,Default,,0000,0000,0000,,Fortunately there are many companies, Dialogue: 0,0:04:06.53,0:04:09.16,Default,,0000,0000,0000,,laws, and government organizations Dialogue: 0,0:04:09.16,0:04:11.34,Default,,0000,0000,0000,,working to make the internet safer. Dialogue: 0,0:04:11.34,0:04:14.21,Default,,0000,0000,0000,,But these efforts are not enough. Dialogue: 0,0:04:15.11,0:04:17.28,Default,,0000,0000,0000,,You may think when a\Ncomputer system gets hacked, Dialogue: 0,0:04:17.28,0:04:19.21,Default,,0000,0000,0000,,the problem was the security design, Dialogue: 0,0:04:19.21,0:04:20.93,Default,,0000,0000,0000,,or the software. Dialogue: 0,0:04:20.93,0:04:23.37,Default,,0000,0000,0000,,90% of the time a system\Ngets hacked however, Dialogue: 0,0:04:23.37,0:04:25.10,Default,,0000,0000,0000,,it's not because of a security bug, Dialogue: 0,0:04:25.10,0:04:29.14,Default,,0000,0000,0000,,but because of a simple\Nmistake made by a human. Dialogue: 0,0:04:31.38,0:04:33.20,Default,,0000,0000,0000,,- It turns out there are\Nsteps we can all take Dialogue: 0,0:04:33.20,0:04:34.63,Default,,0000,0000,0000,,to protect ourselves. Dialogue: 0,0:04:34.63,0:04:36.51,Default,,0000,0000,0000,,Often, your actions not only impact Dialogue: 0,0:04:36.51,0:04:38.82,Default,,0000,0000,0000,,the security of your\Nown data and computer, Dialogue: 0,0:04:38.82,0:04:40.46,Default,,0000,0000,0000,,but the security of everyone Dialogue: 0,0:04:40.46,0:04:43.41,Default,,0000,0000,0000,,at your school, workplace, and home. Dialogue: 0,0:04:43.53,0:04:46.44,Default,,0000,0000,0000,,With billions or trillions\Nof dollars at stake, Dialogue: 0,0:04:46.44,0:04:48.47,Default,,0000,0000,0000,,cybercriminals get smarter each year, Dialogue: 0,0:04:48.47,0:04:51.20,Default,,0000,0000,0000,,and we all need to keep up.