Cybersecurity and crime | Internet 101 | Computer Science | Khan Academy

Khan Academy
23 Apr 201905:01

Summary

TLDRJenny Martin from Symantec and Parisa from Google discuss the alarming rise of cybercrime, affecting individuals, businesses, and national security. They explain how cybercriminals exploit software vulnerabilities and human error to steal sensitive information, hijack systems, and launch attacks like distributed denial-of-service. The speakers highlight the importance of individual actions in cybersecurity, emphasizing that most breaches are due to human mistakes rather than technical flaws.

Takeaways

  • πŸ”’ Cybercrime poses significant threats to society, impacting individuals, finances, and national security.
  • πŸ’Έ Millions of sensitive records, including credit card numbers, social security numbers, and health care records, have been compromised in recent years.
  • πŸ›‘οΈ Cyber attacks can target critical infrastructure, such as nuclear centrifuges and unmanned aerial drones.
  • πŸ‘₯ Cybercriminals are diverse, ranging from international terrorists to teenagers seeking notoriety.
  • 🌐 Nations now maintain cyber armies alongside traditional military forces, suggesting a shift towards digital warfare.
  • πŸ’» Computer viruses are malicious programs that infect and spread by exploiting vulnerabilities or deceiving users into installation.
  • πŸ“Š A distributed denial-of-service (DDoS) attack overwhelms websites with excessive traffic from multiple sources, causing them to crash.
  • 🎣 Phishing scams deceive users into revealing sensitive information, like passwords, through fake emails and websites.
  • πŸ” Despite efforts by companies and governments, human error is the leading cause of security breaches, accounting for 90% of incidents.
  • πŸ‘₯ Everyone has a role to play in cybersecurity, as individual actions can affect the security of broader networks and communities.

Q & A

  • What is the role of Jenny Martin at Symantec?

    -Jenny Martin is the Director of Cybersecurity, Investigations at Symantec, where she likely oversees the investigation of cybercrimes and the development of cybersecurity strategies.

  • What are some examples of the impact of cybercrime on society mentioned in the script?

    -The script mentions that cybercrime has led to the theft of hundreds of millions of credit card numbers, the compromise of tens of millions of social security numbers and health care records, and even the hacking of nuclear centrifuges and hijacking of unmanned aerial drones.

  • How do cybercriminals exploit vulnerabilities in software to commit crimes?

    -Cybercriminals exploit vulnerabilities in software by tricking users into installing malicious programs, taking advantage of unintentional decisions made by users, or by exploiting inherent weaknesses in the software without needing explicit permission.

  • What is the significance of having a cyber army in the context of national security?

    -A cyber army signifies a nation's capability to engage in cyber warfare, which could potentially involve shutting down critical infrastructure such as national water supplies, energy grids, and transportation systems, thus posing a significant threat to national security.

  • What is Parisa's role at Google, and how does it relate to cybersecurity?

    -Parisa is referred to as Google's Security Princess, implying that she is involved in enhancing the security of Google's products, likely by working on various projects to ensure the software is as secure as possible against cyber threats.

  • How does a computer virus function, and how is it similar to a biological virus?

    -A computer virus functions by infecting a computer system, often unintentionally, and can replicate itself to other computers. It is similar to a biological virus in that it injects its code into the system and uses the system's resources to replicate, potentially causing harm to the host system.

  • What are some methods attackers use to infect computers with viruses?

    -Attackers may use deception, such as disguising viruses as security updates, or exploit software vulnerabilities to install viruses without explicit user permission.

  • What is a botnet, and how is it used in cybercrime?

    -A botnet is a network of compromised computers controlled by a hacker, often used to launch coordinated attacks such as distributed denial-of-service (DDoS) attacks, where the target is overwhelmed with traffic from multiple sources, causing it to crash.

  • How does a denial-of-service (DoS) attack differ from a distributed denial-of-service (DDoS) attack?

    -A DoS attack involves overwhelming a website with requests from a single source, while a DDoS attack involves overwhelming a website with requests from many computers at once, making it more difficult to defend against.

  • What is a phishing scam, and how do cybercriminals use it to steal personal information?

    -A phishing scam is a tactic where cybercriminals send deceptive emails that appear to be from a trustworthy source, tricking recipients into revealing sensitive information such as login credentials by directing them to fake websites.

  • Why is it important for individuals to take steps to protect themselves from cybercrime?

    -Individual actions are crucial in cybersecurity because they not only protect personal data and computers but also contribute to the overall security of networks and systems at schools, workplaces, and homes. As cybercriminals become more sophisticated, everyone needs to stay vigilant and informed.

Outlines

00:00

πŸ”’ Cybersecurity Threats and Their Impact

Jenny Martin, Director of Cybersecurity at Symantec, discusses the severe consequences of cybercrime, which affect society on multiple levels, including personal, financial, and national security. She highlights the theft of credit card numbers, social security numbers, and health care records, as well as the hacking of nuclear centrifuges and hijacking of drones. These crimes exploit vulnerabilities in hardware and software or take advantage of unintentional user decisions. The perpetrators are diverse, ranging from international terrorists to teenagers. The script also warns that future conflicts might be cyber-based, targeting critical infrastructure like water supplies, energy grids, and transportation systems.

πŸ›‘οΈ Protecting Software from Cyber Threats

Parisa, Google's Security Princess, explains her role in enhancing the security of Google's software. She provides an overview of how cybercrime operates, including the mechanisms of software viruses, denial-of-service attacks, and phishing scams. The analogy between biological viruses and computer viruses is drawn, explaining how the latter infects and spreads through executable programs. The paragraph details how viruses can be installed through deceptive means or software vulnerabilities, and the potential harm they can cause, such as stealing or deleting files, controlling programs, or enabling remote computer access. It also describes how hackers can use infected computers to form a botnet for launching distributed denial-of-service attacks, overwhelming websites with excessive requests. The paragraph concludes with a mention of phishing scams, where hackers trick users into revealing sensitive information through fake emails and websites.

πŸ“§ Phishing Scams and Human Error

The script explains that phishing scams involve sending spam emails to deceive people into revealing personal information, such as passwords, which can then be used to access real accounts for theft. It emphasizes that despite the efforts of companies, laws, and government organizations to secure the internet, these are often insufficient. The paragraph points out that the majority of hacking incidents are not due to software bugs but rather simple human mistakes. It concludes by stressing the importance of individual actions in cybersecurity, as these can affect not only personal security but also the security of broader communities, such as schools and workplaces. The paragraph calls for vigilance as cybercriminals continue to evolve their tactics, and everyone must stay informed and proactive in protecting against cyber threats.

Mindmap

Keywords

πŸ’‘Cybercrime

Cybercrime refers to criminal activities carried out using digital technology or the internet. In the video, cybercrime is presented as a significant threat to society, causing problems on personal, financial, and national security levels. Examples include the theft of credit card numbers, the compromise of social security numbers and health care records, and even attacks on critical infrastructure like nuclear centrifuges and unmanned aerial drones.

πŸ’‘Vulnerabilities

Vulnerabilities are weaknesses in hardware or software that can be exploited by cybercriminals. The script mentions that cybercrime often involves exploiting these vulnerabilities or taking advantage of unintentional decisions made by users. Vulnerabilities can be technical flaws or human errors, and they are key targets for cyberattacks.

πŸ’‘Botnet

A botnet is a network of private computers infected with malware and controlled as a group without the owners' knowledge. In the video, hackers use computer viruses to take over millions of computers, forming a botnet to launch distributed denial-of-service attacks. This term is central to understanding the scale of cyber threats and the coordinated nature of certain cyberattacks.

πŸ’‘Distributed Denial-of-Service (DDoS)

Distributed Denial-of-Service (DDoS) attacks involve overwhelming a target with a flood of internet traffic, rendering it inaccessible. The script explains that this is done by using a botnet to send billions or trillions of requests to a website, causing it to crash. DDoS attacks are a common method used by cybercriminals to disrupt services and are a significant concern for online businesses and organizations.

πŸ’‘Phishing Scams

Phishing scams are attempts to acquire sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. The video describes how cybercriminals send deceptive emails that appear to be from legitimate sources, tricking users into revealing their login credentials on fake websites. Phishing is a prevalent form of cybercrime that relies on social engineering.

πŸ’‘Cyber Army

A cyber army refers to a group of individuals or organizations that engage in cyber warfare or cyber espionage on behalf of a nation. The script suggests that major countries now maintain not only traditional military forces but also cyber armies, indicating a shift towards the use of digital technologies in warfare and the potential for future conflicts to be fought in the digital realm.

πŸ’‘Computer Virus

A computer virus is a type of malicious software that, when executed, replicates by inserting copies of itself into other executable files and is able to perform harmful actions such as stealing or deleting data. The video likens computer viruses to biological viruses, explaining how they can spread and cause damage, and how they can be used to control large networks of infected computers.

πŸ’‘Security Princess

The term 'Security Princess' is used in the video to describe a role at Google focused on enhancing the security of various Google products. This title is indicative of the importance placed on security within tech companies and the creative ways these companies brand their security roles to emphasize their commitment to safety and privacy.

πŸ’‘Human Error

Human error is the act of a human being making a mistake that has an unintended consequence. In the context of the video, it is noted that most system hacks are not due to software bugs but rather due to simple mistakes made by users. This highlights the need for user education and awareness in cybersecurity, as individuals play a critical role in the security of digital systems.

πŸ’‘Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The video features Jenny Martin, who is the Director of Cybersecurity, Investigations at Symantec, emphasizing the importance of this field in combating cybercrime. Cybersecurity professionals work to identify vulnerabilities, develop protective measures, and respond to cyber threats.

πŸ’‘Spam Email

Spam email refers to unsolicited, bulk, or indiscriminately sent messages, often for the purposes of phishing or spreading malware. The video mentions spam as a tool used by cybercriminals to trick people into sharing sensitive information. Spam emails are a common method for initiating phishing scams and are a nuisance to internet users worldwide.

Highlights

Cybercrime is causing significant problems for society, affecting individuals, finances, and national security.

Hundreds of millions of credit card numbers have been stolen in recent years.

Tens of millions of social security numbers and health care records have been compromised.

Critical infrastructure like nuclear centrifuges and unmanned aerial drones have been hacked.

Cybercriminals exploit vulnerabilities in hardware and software or take advantage of user errors.

Cybercriminals have diverse profiles, ranging from international terrorists to teenagers.

Nations now maintain cyber armies alongside traditional military forces.

The next world war might be fought with computers targeting critical national infrastructure.

Parisa, Google's Security Princess, discusses the inner workings of cybercrime.

Computer viruses are executable programs that infect and harm computers, often unintentionally installed.

Viruses can spread to other computers and be used to create botnets for large-scale attacks.

Attackers infect computers through deception or by exploiting software vulnerabilities.

Once installed, a virus can steal, delete files, control programs, or enable remote computer control.

Distributed denial-of-service (DDoS) attacks involve overwhelming websites with excessive requests.

Phishing scams trick people into revealing sensitive information through fake emails and websites.

Many companies, laws, and government organizations are working to improve internet security.

Most system hacks are due to human error rather than security bugs.

Individual actions significantly impact the security of personal data, computers, and broader networks.

As cybercriminals evolve, everyone needs to stay vigilant and protect themselves.

Transcripts

play00:07

- Hi. My name's Jenny Martin

play00:09

and I'm the Director of Cybersecurity

play00:11

Investigations at Symantec.

play00:13

Today cybercrime causes huge problems

play00:16

for society.

play00:17

Personally, financially, and even

play00:19

in matters of national security.

play00:22

Just in the last few years,

play00:23

hundreds of millions of credit card numbers

play00:25

have been stolen.

play00:27

Tens of millions of social security numbers

play00:29

and health care records were compromised.

play00:31

Even nuclear centrifuges have been hacked

play00:34

and unmanned aerial drones have been hijacked.

play00:37

This is all done by exploiting vulnerabilities

play00:40

in hardware and software.

play00:42

Or more often by taking advantage of

play00:44

unintentional decisions made by the people

play00:46

using the software.

play00:51

The people committing these cybercrimes

play00:53

don't fit a single profile or motivation.

play00:56

It could be anyone from an international terrorist,

play00:59

to a teenager competing for bragging rights.

play01:02

Today, the largest countries not only

play01:04

have a regular army, but also have

play01:06

a well-armed cyber army.

play01:08

In fact, the next world war may not

play01:10

be fought with traditional weapons

play01:12

but with computers, used to shut down

play01:14

national water supplies, energy grids,

play01:17

and transportation systems.

play01:20

- Hi. My name is Parisa

play01:22

and I'm Google's Security Princess.

play01:24

I've worked on a lot of different Google products

play01:27

in a lot of different ways to try and make our software

play01:31

as secure as possible.

play01:33

Now let's take a look at how cybercrime

play01:35

works under the hood.

play01:37

We'll learn about software viruses,

play01:39

denial-of-service attacks, and phishing scams.

play01:42

In biology in life, a virus is an organism

play01:45

that is spread by coughing, sneezing,

play01:47

or physical contact.

play01:49

Viruses work by infecting cells,

play01:51

injecting their genetic material

play01:53

and using those cells to replicate.

play01:55

They can make people really sick

play01:56

and then spread to other people.

play01:59

A computer virus works a bit similarly.

play02:02

A virus is an executable program

play02:03

that gets installed, usually unintentionally,

play02:07

and harms a user and their computer.

play02:09

It's also possible for a virus to spread itself

play02:12

to other computers.

play02:14

Now how does a virus get on your computer

play02:16

in the first place?

play02:17

There are couple ways an attacker

play02:19

can infect someone's computer.

play02:21

They might lure a victim into installing a program

play02:23

with deception about the program's purpose.

play02:26

So for example, a lot of viruses are disguised

play02:28

as security updates.

play02:31

It's also possible that the software on your computer

play02:33

has a vulnerability.

play02:34

So an attacker can install itself

play02:36

without even needing explicit permission.

play02:39

Once a virus in on your computer

play02:41

it can steal or delete any of your files,

play02:44

control other programs, or even allow someone else

play02:46

to remotely control your computer.

play02:52

Using computer viruses, hackers can take over

play02:54

millions of computers worldwide.

play02:56

And then use them as a digital army,

play02:58

otherwise known as a botnet,

play03:00

to attack and take down websites.

play03:03

This kind of attack is called

play03:04

a distributed denial-of-service.

play03:07

A denial-of-service is when hackers

play03:08

overwhelm a website with too many requests.

play03:11

We call it a distributed denial-of-service

play03:13

when the attack comes from many computers

play03:15

all at once.

play03:18

Most websites are ready to respond

play03:19

to millions of requests a day,

play03:21

but if you hit them with billions or trillions

play03:23

of requests coming from different places,

play03:26

the computers are overloaded and stop responding.

play03:30

- Another trick used by cybercriminals

play03:32

is to send large amounts of spam email

play03:34

in an attempt to trick people

play03:36

into sharing sensitive personal information.

play03:39

This is called a phishing scam.

play03:42

A phishing scam is when you get

play03:44

what seems like a trustworthy email

play03:46

asking you to login to your account,

play03:48

but clicking the email takes you to a fake website.

play03:51

If you login anyway, you've been tricked

play03:54

into giving your password away.

play03:56

Hackers can then use your login credentials

play03:58

to access your real accounts

play04:00

to steal information, or maybe even

play04:02

to steal your money.

play04:04

Fortunately there are many companies,

play04:06

laws, and government organizations

play04:09

working to make the internet safer.

play04:11

But these efforts are not enough.

play04:15

You may think when a computer system gets hacked,

play04:17

the problem was the security design,

play04:19

or the software.

play04:20

90% of the time a system gets hacked however,

play04:23

it's not because of a security bug,

play04:25

but because of a simple mistake made by a human.

play04:31

- It turns out there are steps we can all take

play04:33

to protect ourselves.

play04:34

Often, your actions not only impact

play04:36

the security of your own data and computer,

play04:38

but the security of everyone

play04:40

at your school, workplace, and home.

play04:43

With billions or trillions of dollars at stake,

play04:46

cybercriminals get smarter each year,

play04:48

and we all need to keep up.

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityHackingPhishingBotnetVirusCyber ArmyData BreachSecurity MeasuresCyber ThreatsOnline Safety