< Return to Video

The Internet: Cybersecurity and crime

  • 0:08 - 0:10
    - Hi. My name's Jenny Martin
  • 0:10 - 0:11
    and I'm the Director of Cybersecurity
  • 0:11 - 0:14
    Investigations at Symantec.
  • 0:14 - 0:16
    Today cybercrime causes huge problems
  • 0:16 - 0:17
    for society.
  • 0:17 - 0:20
    Personally, financially, and even
  • 0:20 - 0:22
    in matters of national security.
  • 0:22 - 0:24
    Just in the last few years,
  • 0:24 - 0:26
    hundreds of millions
    of credit card numbers
  • 0:26 - 0:27
    have been stolen.
  • 0:27 - 0:29
    Tens of millions of
    social security numbers
  • 0:29 - 0:32
    and health care records were compromised.
  • 0:32 - 0:35
    Even nuclear centrifuges have been hacked
  • 0:35 - 0:38
    and unmanned aerial
    drones have been hijacked.
  • 0:38 - 0:41
    This is all done by
    exploiting vulnerabilities
  • 0:41 - 0:43
    in hardware and software.
  • 0:43 - 0:44
    Or more often by taking advantage of
  • 0:44 - 0:47
    unintentional decisions made by the people
  • 0:47 - 0:49
    using the software.
  • 0:52 - 0:54
    The people committing these cybercrimes
  • 0:54 - 0:57
    don't fit a single profile or motivation.
  • 0:57 - 0:59
    It could be anyone from an
    international terrorist,
  • 0:59 - 1:02
    to a teenager competing
    for bragging rights.
  • 1:03 - 1:04
    Today, the largest countries not only
  • 1:04 - 1:06
    have a regular army, but also have
  • 1:06 - 1:09
    a well-armed cyber army.
  • 1:09 - 1:11
    In fact, the next world war may not
  • 1:11 - 1:12
    be fought with traditional weapons
  • 1:12 - 1:14
    but with computers, used to shut down
  • 1:14 - 1:17
    national water supplies, energy grids,
  • 1:17 - 1:20
    and transportation systems.
  • 1:21 - 1:22
    - Hi. My name is Parisa
  • 1:22 - 1:25
    and I'm Google's Security Princess.
  • 1:25 - 1:27
    I've worked on a lot of
    different Google products
  • 1:27 - 1:31
    in a lot of different ways
    to try and make our software
  • 1:31 - 1:33
    as secure as possible.
  • 1:34 - 1:35
    Now let's take a look at how cybercrime
  • 1:35 - 1:37
    works under the hood.
  • 1:37 - 1:39
    We'll learn about software viruses,
  • 1:39 - 1:43
    denial-of-service attacks,
    and phishing scams.
  • 1:43 - 1:45
    In biology in life, a virus is an organism
  • 1:45 - 1:47
    that is spread by coughing, sneezing,
  • 1:47 - 1:49
    or physical contact.
  • 1:49 - 1:51
    Viruses work by infecting cells,
  • 1:51 - 1:53
    injecting their genetic material
  • 1:53 - 1:55
    and using those cells to replicate.
  • 1:55 - 1:57
    They can make people really sick
  • 1:57 - 1:59
    and then spread to other people.
  • 1:59 - 2:02
    A computer virus works a bit similarly.
  • 2:02 - 2:04
    A virus is an executable program
  • 2:04 - 2:07
    that gets installed,
    usually unintentionally,
  • 2:07 - 2:10
    and harms a user and their computer.
  • 2:10 - 2:12
    It's also possible for
    a virus to spread itself
  • 2:12 - 2:14
    to other computers.
  • 2:15 - 2:17
    Now how does a virus get on your computer
  • 2:17 - 2:18
    in the first place?
  • 2:18 - 2:19
    There are couple ways an attacker
  • 2:19 - 2:21
    can infect someone's computer.
  • 2:21 - 2:24
    They might lure a victim
    into installing a program
  • 2:24 - 2:26
    with deception about
    the program's purpose.
  • 2:26 - 2:29
    So for example, a lot
    of viruses are disguised
  • 2:29 - 2:31
    as security updates.
  • 2:31 - 2:33
    It's also possible that the
    software on your computer
  • 2:33 - 2:35
    has a vulnerability.
  • 2:35 - 2:37
    So an attacker can install itself
  • 2:37 - 2:40
    without even needing explicit permission.
  • 2:40 - 2:42
    Once a virus in on your computer
  • 2:42 - 2:44
    it can steal or delete any of your files,
  • 2:44 - 2:47
    control other programs,
    or even allow someone else
  • 2:47 - 2:50
    to remotely control your computer.
  • 2:52 - 2:54
    Using computer viruses,
    hackers can take over
  • 2:54 - 2:57
    millions of computers worldwide.
  • 2:57 - 2:58
    And then use them as a digital army,
  • 2:58 - 3:00
    otherwise known as a botnet,
  • 3:00 - 3:03
    to attack and take down websites.
  • 3:03 - 3:04
    This kind of attack is called
  • 3:04 - 3:07
    a distributed denial-of-service.
  • 3:07 - 3:09
    A denial-of-service is when hackers
  • 3:09 - 3:12
    overwhelm a website
    with too many requests.
  • 3:12 - 3:14
    We call it a distributed denial-of-service
  • 3:14 - 3:16
    when the attack comes from many computers
  • 3:16 - 3:17
    all at once.
  • 3:18 - 3:20
    Most websites are ready to respond
  • 3:20 - 3:22
    to millions of requests a day,
  • 3:22 - 3:24
    but if you hit them with
    billions or trillions
  • 3:24 - 3:26
    of requests coming from different places,
  • 3:26 - 3:29
    the computers are overloaded
    and stop responding.
  • 3:30 - 3:32
    - Another trick used by cybercriminals
  • 3:32 - 3:35
    is to send large amounts of spam email
  • 3:35 - 3:36
    in an attempt to trick people
  • 3:36 - 3:40
    into sharing sensitive
    personal information.
  • 3:40 - 3:43
    This is called a phishing scam.
  • 3:43 - 3:44
    A phishing scam is when you get
  • 3:44 - 3:46
    what seems like a trustworthy email
  • 3:46 - 3:49
    asking you to login to your account,
  • 3:49 - 3:52
    but clicking the email
    takes you to a fake website.
  • 3:52 - 3:54
    If you login anyway, you've been tricked
  • 3:54 - 3:57
    into giving your password away.
  • 3:57 - 3:59
    Hackers can then use
    your login credentials
  • 3:59 - 4:01
    to access your real accounts
  • 4:01 - 4:03
    to steal information, or maybe even
  • 4:03 - 4:05
    to steal your money.
  • 4:05 - 4:07
    Fortunately there are many companies,
  • 4:07 - 4:09
    laws, and government organizations
  • 4:09 - 4:11
    working to make the internet safer.
  • 4:11 - 4:14
    But these efforts are not enough.
  • 4:15 - 4:17
    You may think when a
    computer system gets hacked,
  • 4:17 - 4:19
    the problem was the security design,
  • 4:19 - 4:21
    or the software.
  • 4:21 - 4:23
    90% of the time a system
    gets hacked however,
  • 4:23 - 4:25
    it's not because of a security bug,
  • 4:25 - 4:29
    but because of a simple
    mistake made by a human.
  • 4:31 - 4:33
    - It turns out there are
    steps we can all take
  • 4:33 - 4:35
    to protect ourselves.
  • 4:35 - 4:37
    Often, your actions not only impact
  • 4:37 - 4:39
    the security of your
    own data and computer,
  • 4:39 - 4:40
    but the security of everyone
  • 4:40 - 4:43
    at your school, workplace, and home.
  • 4:44 - 4:46
    With billions or trillions
    of dollars at stake,
  • 4:46 - 4:48
    cybercriminals get smarter each year,
  • 4:48 - 4:51
    and we all need to keep up.
Title:
The Internet: Cybersecurity and crime
Description:

more » « less
Video Language:
English
Team:
Khan Academy
Duration:
05:02

English subtitles

Revisions