The Internet: Cybersecurity & Crime
-
0:02 - 0:07The Internet: Cybersecurity and Crime
-
0:07 - 0:11Hi, my name's Jenny Martin and I'm the
director of cyber security -
0:11 - 0:16investigations at Symantec. Today
cybercrime causes huge problems for -
0:16 - 0:23society personally, financially, and even
in matters of national security. Just in -
0:23 - 0:27the last few years hundreds of millions
of credit card numbers have been stolen, -
0:27 - 0:31tens of millions of Social Security
numbers and healthcare records were -
0:31 - 0:35compromised, even nuclear centrifuges
that have been hacked, and unmanned -
0:35 - 0:40aerial drones have been hijacked. This is
all done by exploiting vulnerabilities -
0:40 - 0:45in hardware and software or more often
by taking advantage of unintentional -
0:45 - 0:53decisions made by the people using the
software. People committing these cyber -
0:53 - 0:58crimes don't a single profile or
motivation it could be anyone from an -
0:58 - 1:03international terrorist to a teenager competing
for bragging rights. Today the largest -
1:03 - 1:09countries not only have a regular army
but also have a well armed cyber army. In -
1:09 - 1:12fact the next World War may not be
fought with traditional weapons, but with -
1:12 - 1:17computers used to shut down national
water supplies, energy grids, and -
1:17 - 1:25transportation systems. Hi my name is Parisa and
I'm Google Security Princess. I've worked -
1:25 - 1:30on a lot of different products
and a lot of different ways to try and -
1:30 - 1:34make our software as secure as possible.
-
1:34 - 1:37Now let's take a look at how cybercrime
works under the hood -
1:37 - 1:41will learn about software viruses,
denial-of-service attacks, and phishing -
1:41 - 1:46scams. In biology and life, a virus is an
organism that is spread by coughing, -
1:46 - 1:49sneezing, or physical contact.
-
1:49 - 1:53Viruses work by infecting cells,
injecting their genetic material, and -
1:53 - 1:59using those cells to replicate. They can make people really sick and then spread to other people.
-
1:59 - 2:04A computer virus works bit similarly. A
virus is an executable program that gets -
2:04 - 2:10installed, usually unintentionally, and harms the user and their computer. It's also
-
2:10 - 2:16possible for a virus to spread itself to other
computers. Now how does a virus get on your -
2:16 - 2:20computer in the first place? There are a
couple ways an attacker can infect someone's -
2:20 - 2:25computer. They might lure a victim into
installing a program with deception about the -
2:25 - 2:29program's purpose, so for example a lot
of viruses are disguised as security updates. -
2:29 - 2:36It's also possible that the software on your computer has a vulnerability, so an attacker can install itself
-
2:36 - 2:39without even needing explicit permission.
-
2:39 - 2:44Once a virus is on your computer it can
steal or delete any of your files, -
2:44 - 2:48control other programs, or even allow
someone else to remotely control your -
2:48 - 2:50computer.
-
2:50 - 2:56Using computer viruses, hackers can take
over millions of computers world wide -
2:56 - 3:01and then use them as a digital army, otherwise known as a botnet, to attack and take down websites.
-
3:01 - 3:07This kind of attack is called a
distributed denial of service. -
3:07 - 3:10A denial of service is when hackers
overwhelm a website with too many -
3:10 - 3:15requests. We call it a distributed
denial-of-service when the attack comes from many -
3:15 - 3:17computers all at once.
-
3:17 - 3:22Most websites are ready to respond to
millions of requests a day, but if you -
3:22 - 3:25hit them with billions or trillions of requests, coming from different places,
-
3:25 - 3:32the computers are overloaded and stop
responding. Another trick used by -
3:32 - 3:36cybercriminals is to send large amounts of spam
email in an attempt to trick people -
3:36 - 3:39into sharing sensitive personal information.
-
3:39 - 3:45This is called a phishing scam. A phishing scam is when you get what seems like a
-
3:45 - 3:50trustworthy email asking you to log
into your account, but clicking the email -
3:50 - 3:52takes you to a fake website.
-
3:52 - 3:56if you log in anyway you've been
tricked into giving your password away. -
3:56 - 4:00Hackers can then use your login
credentials to access your real accounts -
4:00 - 4:06to steal information or maybe even to
steal your money. Fortunately there are -
4:06 - 4:10many companies, laws, and government
organizations working to make the -
4:10 - 4:15internet safer, but these efforts are
not enough. -
4:15 - 4:18You may think when a computer system
gets hacked the problem was the security -
4:18 - 4:23design or the software. Ninety percent
of the time the system gets hacked -
4:23 - 4:27however, it's not because of the security bug, but because of a simple mistake made by
-
4:27 - 4:35a human. It turns out there are steps we
can all take to protect ourselves. Often -
4:35 - 4:39your actions not only impact the
security of your own data and computer, but the -
4:39 - 4:42security of everyone at your school,
-
4:42 - 4:47workplace, and home. With billions or
trillions of dollars at stake -
4:47 - 4:52cybercriminals get smarter each year and
we all need to keep up.
- Title:
- The Internet: Cybersecurity & Crime
- Description:
-
Parisa Tabriz from Google Jenny Martin from Symantec introduce the most common types of cybercrime including viruses, malware, DDOS attacks and phishing scams. Watch til 4:40 to see the top four tips to avoid getting hacked.
Start learning at http://code.org/
Stay in touch with us!
• on Twitter https://twitter.com/codeorg
• on Facebook https://www.facebook.com/Code.org
• on Instagram https://instagram.com/codeorg
• on Tumblr https://blog.code.org
• on LinkedIn https://www.linkedin.com/company/code-org
• on Google+ https://google.com/+codeorg - Video Language:
- English
- Duration:
- 05:02
Code.org edited English subtitles for The Internet: Cybersecurity & Crime |