Enterprise Computing Preliminary Course Unit 3: Principals Of Cybersecurity

Christopher Kalodikis
19 Apr 202318:48

Summary

TLDRThe video outlines principles of cyber security for enterprise systems containing sensitive user data. It emphasizes the importance of privacy, trust and legal protections. Potential system vulnerabilities are explored, like hacking, phishing, and human error. Recommended security measures are multifaceted: ongoing staff training, risk assessment procedures, physical/technological access controls, backups, antivirus software and more. Ultimately, vigilant cybersecurity is vital for enterprises to avoid crippling financial losses, reputational damage, work disruptions and legal consequences in the event of data breaches by malicious parties.

Takeaways

  • 😀 Privacy, trust and freedom of information are key principles - people's data is sensitive and systems must protect it
  • 🔒 Access rights and permissions for data control who can view sensitive information within an organization
  • 🙈 People must be careful what personal data they upload online to maintain privacy
  • 😖 Social networking provides vulnerabilities for identity theft through account access, fake websites (phishing) and fake WiFi (evil twin)
  • ❗ Confidentiality, integrity, availability and privacy are attributes affected during a cyber breach
  • 📁 Data, people's personal information, organizational processes and technology get exploited in a breach
  • 👮‍♂️ Key cyber crime threats include hacking, phishing, smishing, scamming, bots and employees causing vulnerabilities
  • 🛡 Security awareness and risk management through ongoing staff training and procedures are needed
  • 🔒 Protection methods include isolation, physical/network security, backups and software protections
  • 📜 Cyber breaches have major financial, reputational, disruption, threat and legal impacts for enterprises

Q & A

  • What is cyber security and what does it aim to protect?

    -Cyber security refers to measures and practices put in place to protect data and user accounts on enterprise systems from unauthorized access or hacking. It aims to make systems more secure and identify any vulnerabilities that could allow data breaches.

  • What legislation relates to privacy and data protection?

    -Key legislation includes the Privacy Act 1988 which governs the handling of personal information, and the Freedom of Information Act which gives people the right to access information held about them.

  • How can social networking lead to cyber security vulnerabilities?

    -Social networks can be infiltrated by hackers who can then access user accounts and data. Things like phishing emails can also trick users into handing over login details to hackers.

  • What are some common cyber crime threats?

    -Common threats include hacking, phishing, smishing, AI bots and botnets, and social engineering where employees are tricked into giving away passwords or access.

  • What are some methods used to protect systems and data?

    -Methods include access controls, physical security, backups, encryption, firewalls, multi-factor authentication, antivirus software etc.

  • Why is training important for cyber security?

    -Ongoing staff training builds awareness of threats and vulnerabilities. It teaches employees secure practices to help protect systems.

  • What impacts can a cyber security breach have on a business?

    -Impacts include financial losses, damage to reputation, work disruptions, legal issues, and potentially going out of business.

  • What laws apply to the handling of personal data?

    -Key laws are the Privacy Act 1988 and Freedom of Information Act. These require proper data handling and give people rights to their data.

  • Why must businesses keep up with emerging cyber threats?

    -The threat landscape keeps evolving so by knowing about new attack methods, businesses can prepare defenses to protect themselves.

  • What should someone do if their account is compromised?

    -They should change their password immediately, enable multi-factor authentication if available, notify contacts, and monitor for suspicious activity.

Outlines

00:00

😀Privacy, Trust and Data in Enterprise Systems

This paragraph introduces the key concepts of privacy, trust and freedom of information in enterprise computing systems. It discusses how user data is sensitive and private, requiring security measures for protection. Laws also enable users to access data stored about them to ensure integrity.

05:01

😖Data Access, Storage and Protecting Privacy

This paragraph covers managing access rights and permissions for user data in enterprise systems. It emphasizes limiting data access to only essential personnel to minimize vulnerabilities. Users are also responsible for being mindful of what personal data they upload online.

10:02

😣Social Media Dangers and Cybersecurity Breaches

This paragraph examines vulnerabilities through social media, including account hijacking, phishing schemes, and evil twin wireless access points used for identity theft. It also covers attributes of cybersecurity breaches like confidentiality, integrity and availability of information.

15:02

🔒Securing Enterprise Systems

This final paragraph looks at protection methods for enterprise security like isolation of malware, physical/network access controls, encryption, backups and more. It concludes by stressing the importance of vigilance against emerging cyber threats.

Mindmap

Keywords

💡Privacy

Privacy refers to the concept that personal information about individuals is sensitive and should be kept confidential. As discussed in the video, privacy is a key principle of cybersecurity, as systems store large amounts of user data that needs to be protected. Examples from the script include "privacy being that information about people is private" and "laws in place that support that [privacy]".

💡Data breach

A data breach is an incident where sensitive, confidential or private data has been accessed and retrieved by an unauthorized individual. As stated in the video, data breaches can have massive negative implications for enterprises, including financial losses, reputational damage, work disruptions and legal/regulatory issues. An example quote is "we've got to be aware of these vulnerabilities" that can lead to data breaches.

💡Access controls

Access controls refer to security measures that regulate and restrict access to systems and data based on user identities and permissions. As discussed in the video, not everyone in an enterprise should have access to all data - access should be restricted based on roles and needs, in order to protect privacy. Example quote: "access rights and permissions okay based on users logins within that organization".

💡Encryption

Encryption is the process of encoding data and messages in such a way that only authorized parties can read it. The video mentions encryption as a cybersecurity protection method that scrambles data during transmission, so that intercepted data remains secure. Example quote: "use of encryption for scrambling data during transmission".

💡Antivirus software

Antivirus software refers to programs that detect, block and remove malware, viruses, and other malicious threats from devices and systems. As stated in the video, antivirus software uses updated threat signatures to catch malware, isolate it, and allow admins to delete it before it impacts the wider system.

💡Multi-factor authentication

Multi-factor authentication (MFA) refers to a security process where users are granted access only after successfully presenting multiple verification factors. The video cites MFA as an increasingly used security measure where users have to enter a code sent to their email/phone after logging in with password, for added security.

💡Cyber threats

Cyber threats refer to various malicious attacks and exploits that aim to access, damage, disrupt or steal critical data and systems. The video outlines types of threats like hacking, phishing, smishing, scams and use of bots/AI to infiltrate systems and gain unauthorized access to data.

💡Risk management

Cyber risk management refers to the practice of identifying, assessing and controlling cybersecurity risks. As suggested in video, enterprises need risk management procedures like staff training, impact analysis, protection methods and recovery controls to manage threats.

💡Vulnerability

In cybersecurity context, vulnerabilities refer to weaknesses or gaps in a computer system's security policies, controls or processes that can be exploited by threats to gain unauthorized access. The video emphasizes needing to identity and address vulnerabilities that may allow hackers to breach privacy.

💡Legislation

Cybersecurity legislation refers to laws enacted by governmental bodies to promote security and privacy of critical infrastructure and sensitive user data. As stated, adhering to privacy laws and regulations is vital for enterprises to avoid major compliance and legal issues after a data breach.

Highlights

Privacy, trust and freedom of information are key principles of cyber security

Access rights and permissions restrict data access to authorized users based on their roles

Users must be mindful of what personal data they share online to maintain privacy

Social networking provides vulnerabilities that can lead to identity theft

Understanding cyber security threats like hacking, phishing and scams is key for protection

Ongoing staff training builds awareness on managing vulnerabilities and breaches

Assessing cyber risk and implementing risk management protects systems

Data isolation, physical security and backups help safeguard information

Encryption, firewalls and multi-factor authentication secure access

Antivirus software blocks malware infiltration into systems

Cyber breaches cause financial losses, reputation damage and work disruption

Laws like the Privacy Act 1988 mandate protection of users' data privacy

Knowing current and emerging cyber threats helps prevent attacks

Protecting systems is vital for enterprise survival

We are in an era with many cyber threats requiring ongoing vigilance

Transcripts

play00:00

Enterprise Computing preliminary course

play00:03

unit 3 principles of cyber security so

play00:06

as the name suggests here now we're

play00:08

looking at Enterprise systems in the

play00:10

context of they have lots of information

play00:12

a lot of user accounts signed up to it

play00:14

we need measures in place to protect

play00:17

that data and that's what cyber security

play00:18

is all about and so what we're going to

play00:20

look at this unit is the different

play00:21

principles that can help make our

play00:23

systems more secure but also identify

play00:25

vulnerabilities that might leave our

play00:27

system open to people potentially

play00:29

accessing information and identify them

play00:32

so we can put structures in place in

play00:34

order to protect that data so the first

play00:36

area of this is obviously understand is

play00:38

in privacy and security privacy being

play00:40

that information about people is private

play00:43

it is their information they voluntarily

play00:46

given it up to a system but they don't

play00:48

want everyone seeing it okay and there

play00:50

are laws in place that support that and

play00:52

then the security side of it are the

play00:54

measures we put in place to protect that

play00:56

privacy different types of things such

play00:58

as passwords Biometrics okay okay a

play01:01

two-factor authentication all of that is

play01:03

put in place to keep data private on

play01:05

systems that are online

play01:08

so going through this the first areas

play01:10

that of privacy trust and freedom

play01:12

information so we've said privacy

play01:14

relates to being acknowledging that

play01:17

information related to people is

play01:19

sensitive and we've got to keep that

play01:20

private

play01:22

trust relates to the fact that people

play01:23

trust our system that when they upload

play01:25

their data to our system that things

play01:28

will be in place to protect that data

play01:30

those aforementioned security areas and

play01:32

then we have this notion of freedom

play01:34

information and this is a legislation

play01:35

that's in place that means that

play01:37

basically when someone puts their data

play01:39

on the system they have a right to see

play01:42

data that is about them on a system now

play01:44

it might be directly or indirectly that

play01:47

data has gone into a system such as

play01:48

governments record specific data about

play01:51

people when they sign up for services

play01:52

such as their driver's license and

play01:55

Medicare and even our criminal records

play01:57

data is kept about people on systems

play02:00

freedom information means people have a

play02:02

right to essentially check those systems

play02:05

to ensure that the data's thought about

play02:06

them is correct all right and thus

play02:09

supporting the Integrity of that system

play02:11

that has correct information about the

play02:13

individual but also allowing people to

play02:15

know what information is being stored

play02:17

about them

play02:18

the next area we'll look at is the

play02:20

access storage and permissions related

play02:23

to data on systems just because this

play02:25

data has been uploaded to a specific

play02:27

enterprise system doesn't mean everyone

play02:30

within the Enterprise has that right to

play02:32

view the data and that's why we put in

play02:35

place access rights and permissions okay

play02:38

based on users logins within that

play02:41

organization they would be given

play02:43

specific access rights to different

play02:44

types of data usually pertaining to what

play02:47

is their job within the organization

play02:49

some people would have full rights and

play02:51

can read everything but in reality

play02:53

people only need rights to data that

play02:55

pertain to their day-to-day work which

play02:57

means they're not looking at the

play02:59

personal information of every employee

play03:01

or user that accesses this system and

play03:04

permissions need to be in place because

play03:06

the smaller the circle of people who

play03:08

have access to data the smaller the

play03:10

vulnerabilities because in many cases

play03:12

people are the ones that open up

play03:14

vulnerabilities that hackers get into

play03:16

systems so we need our permissions in

play03:18

place to protect the privacy of the

play03:20

users that have uploaded the information

play03:21

but also reduce the vulnerabilities

play03:24

the next area is people acknowledging

play03:26

they need to maintain their own data

play03:28

privacy be careful what they upload okay

play03:31

if you've put something online you're

play03:33

pretty much saying here look at my

play03:35

information so we need to be responsive

play03:37

to this and understand and mindful that

play03:40

I'm careful in what I put out there

play03:42

online and data that is secure I'm

play03:45

putting it in Secure places where I know

play03:48

where the security is if it has to be in

play03:49

digital form I'm keeping it maybe only

play03:51

stored locally on my system as opposed

play03:53

to online or at an offline system

play03:55

something's in place but I'm conscious

play03:57

that I need to protect my own privacy as

play04:00

well

play04:01

the next area is that of the

play04:03

vulnerabilities okay and specifically

play04:05

through social networking okay and how

play04:08

we are at the mercy sometimes of the

play04:10

social network and if someone's

play04:12

infiltrated that social network we can

play04:15

put ourselves in a dangerous situation

play04:16

where unknowingly we're giving data to a

play04:19

malicious party so it could be through

play04:21

account access when I log in and I enter

play04:23

in my login and password if someone's

play04:25

there and um they're viewing that data

play04:27

they'll get my login details and they

play04:30

can potentially use it and if my

play04:32

passwords are the same across multiple

play04:33

platforms they'll know it

play04:35

if the account is behaving funny or has

play04:38

been compromised that may be confusing

play04:40

and maybe cause me to give data

play04:43

unknowingly to a specific malicious

play04:45

party okay so we're really counting on

play04:48

the actual platform that I'm using that

play04:50

they have Security in place and

play04:52

different platforms have different

play04:53

Securities got to remember these

play04:55

platforms are also internationally based

play04:57

okay so different countries have

play04:59

different rules although they are bound

play05:00

by International laws but they've got

play05:02

different National laws themselves and

play05:04

so that provides a gray area with a

play05:06

degree of security and you've really got

play05:07

to trust the networks you can meet your

play05:09

data to in that they'll take your

play05:10

securities uh seriously a result of this

play05:13

can be if people get your data it can

play05:16

lead to identity theft so if once they

play05:18

get your bank account data is if you

play05:19

write your account details to purchase

play05:22

an item from an unreliable website bang

play05:24

they've got your bank number your uh

play05:26

your name and your CVC they can use that

play05:28

data then to purchase things for their

play05:31

own behalf on other websites using your

play05:33

money okay and that's what happens with

play05:35

identity theft so you've got to only

play05:36

purchase from trusted websites then we

play05:39

have things such as fishing where people

play05:41

send you an email saying their your

play05:43

website your trusted uh platform your

play05:46

social media or your bank but it's

play05:48

taking you to a fake website that

play05:50

emulates the real website and then you

play05:52

put in your real login and password get

play05:54

nowhere but on their end they got your

play05:56

login in password they go to the real

play05:58

site and start using your information

play06:00

and then also we've got something that's

play06:02

risen in the last few years known as an

play06:04

evil twin this is a wireless access

play06:06

point that is legitimate it's set up and

play06:09

it does work for users to connect to but

play06:11

the people that have set it up are

play06:13

monitoring what you're doing and they're

play06:15

registering your logins passwords and uh

play06:18

sensitive information that you're

play06:19

putting in for the purposes of identity

play06:21

theft and gain your data to do malicious

play06:24

things with it so some really cool

play06:27

stuffs out there and we've got to be

play06:28

aware of these vulnerabilities

play06:30

now the next area then is what are the

play06:33

attributes of when a cyber security

play06:34

breach takes place well firstly this

play06:37

confidentially of information has it

play06:39

been retained did they get into

play06:41

information did they see things if they

play06:43

did we need to change things such as our

play06:45

passwords so that the people that know

play06:48

our passwords it's changed now they

play06:50

can't get into our things so we've got

play06:52

to know that and we've got to let our

play06:54

users know that our system's been

play06:55

compromised okay so they can do changes

play06:58

on their end too but ensuring that

play07:00

information is stayed confidential

play07:03

we've also got to check the Integrity of

play07:05

our information on our system did the

play07:07

malicious party that got into our system

play07:09

change any of our information we need to

play07:12

go through it to see if anything's

play07:13

changed because our users on their end

play07:14

who rely on our information may start

play07:16

getting incorrect or offensive data that

play07:19

could be damaging to our Enterprise

play07:22

some people as well when they hack into

play07:24

a system might try to take a system out

play07:26

from functioning so that's when the

play07:28

availability of information gets

play07:30

affected okay there are things such as

play07:32

ddosing where they overwhelm the website

play07:34

causing it to crash okay and that takes

play07:37

information offline so is our

play07:39

information still available to ourselves

play07:40

and to our users and then finally bring

play07:43

it home back to those privacy

play07:45

implications has people's privacy been

play07:47

breached what other measures they need

play07:49

to go through in order to protect their

play07:51

data or change their data so that they

play07:53

stay secure in their own way

play07:55

all right and then into the next area

play07:58

what are things that specifically get

play08:00

exploited the vulnerabilities during a

play08:03

breach our data gets exploited that's

play08:05

stored in our system

play08:06

people's data about themselves gets

play08:09

exploited okay when the data's being

play08:11

accessed in a breach the processes of

play08:13

our organization and how we do tasks get

play08:16

viewed and people know our inner

play08:18

workings of our system so they may need

play08:20

to be changed or modified so that these

play08:22

people can't see that vulnerability

play08:24

again to get into our system and then

play08:26

obviously what technology are we using

play08:27

gets exploited okay our IP addresses and

play08:30

devices okay provide an opening and so

play08:33

modifications may need to be made there

play08:35

okay and obviously updated to prevent

play08:37

further exploitation

play08:39

okay the next area is security awareness

play08:42

okay that we are aware that we need to

play08:44

have security measures in place in order

play08:46

to protect data so the first area is

play08:49

knowing the cyber crime threat so

play08:51

traditional hacking where people try to

play08:52

get into our system uh through um unfair

play08:56

uh authorized means through using IP

play08:58

addresses and different Nets to get

play09:00

through and fake away into our system

play09:03

sometimes hacking can be simple as they

play09:06

know a user's password and they just got

play09:08

in that way so it can even just be an

play09:10

open door and they use it that way bang

play09:11

they're in the system but it's pretty

play09:13

much their unauthorized getting into a

play09:14

system we've already mentioned phishing

play09:16

before where we send out an email and it

play09:19

takes you to a pretend site that looks

play09:21

like your authentic platform that you do

play09:22

actually use and you give information

play09:24

willingly but then that's also evolved

play09:26

into a new thing called smishing which

play09:28

is the same thing but instead of email

play09:29

it's using SMS so they're sending out

play09:31

links through SMS saying oh your account

play09:34

has been compromised click on this link

play09:35

to fix up your details and through SMS

play09:38

they click on it and then once again you

play09:39

give your own details giving away your

play09:41

information

play09:42

this is all a part of scamming there are

play09:44

many types of scamming too as well so

play09:46

it's not always through phishing and

play09:47

smashing could just be there saying

play09:49

something like um these days it's Common

play09:51

People message uh out saying oh mum and

play09:54

dad I need help can you please wire me

play09:56

some money but it's actually not from

play09:58

their kids okay and they've clicked on

play10:00

that link and they've willingly sent

play10:01

money to this unauthorized party

play10:03

thinking that it was their children so

play10:06

there's many different scams out there

play10:07

that are tricking people into believing

play10:10

it's something authentic and then we

play10:12

have the whole AI level the Bots and the

play10:14

botnets trying to get into systems okay

play10:17

and they're Relentless because they're

play10:18

technology okay and obviously mapped

play10:20

with AI trying to get through the

play10:22

vulnerabilities of a system

play10:24

finally as I mentioned a bit before one

play10:26

of the biggest openings to getting to a

play10:28

system can be employees within

play10:30

Enterprise themselves causing

play10:31

vulnerability forgetting to log out of

play10:34

systems putting their passwords into

play10:37

phishing websites or some sort of scam

play10:39

giving away their information okay thus

play10:42

leaving an opening for people to get

play10:44

into a system and hack it in order to

play10:46

conduct cyber crime so they are some of

play10:50

the actual threats to Enterprise systems

play10:53

now on the other side we've got to think

play10:56

of security as an actual type of almost

play10:59

like health and safety where there's a

play11:01

risk management procedure in place so

play11:03

that we can upskill the people within

play11:05

our organization in what to do and have

play11:08

an actual procedure to protect our

play11:10

system so a foundation of this is our

play11:12

staff need to have ongoing training so

play11:14

that they know of potential threats and

play11:17

how they can cause vulnerabilities okay

play11:19

train them in how in cyber security so

play11:22

that they use systems safely and prevent

play11:23

these vulnerabilities

play11:25

okay through training they learn about

play11:27

identifying and managing these

play11:28

vulnerabilities what things can they do

play11:30

so changing their password regularly

play11:32

ensuring they log out of systems not

play11:34

sharing their information that kind of

play11:37

stuff in order to protect the data of

play11:38

the system when a breach takes place how

play11:41

to assess what was the impact what got

play11:44

viewed who do we need to contact what

play11:46

data on our end needs to change

play11:48

and then with that controlling the

play11:51

damage and loss of data reverting to

play11:53

backups modifying things that did get

play11:55

changed letting our users know what

play11:57

happens so we can hopefully keep a

play11:59

decent Public Image even though we did

play12:01

have a security Beach that's a worst

play12:03

case scenario and we don't want to get

play12:04

to that level

play12:06

the next area is that of assessing the

play12:09

Cyber risk and implementing risk

play12:11

management so looking at the internal

play12:14

and external implications So based on

play12:16

the actual system itself has the system

play12:18

been affected internally with its

play12:21

structures functioning and employees of

play12:23

the organization but also those outside

play12:25

parties have our users been impacted has

play12:27

the environment been impacted okay what

play12:29

is the threat landscape out there of

play12:31

what took place and how does it impact

play12:34

our system okay and which leads to the

play12:36

next Point what is the impact of the

play12:38

actual exposure okay has data been

play12:40

leaked are we being held for ransom

play12:42

which is quite common out there these

play12:45

days and they where they might link all

play12:47

our data because they want a payment

play12:48

being made to them okay and then we've

play12:52

got to wave that up in what's the

play12:53

likelihood our system will be exploited

play12:55

and all our data will be out there this

play12:58

is why it is so important we are

play13:00

managing cyber security to have these

play13:01

measures in place these things do happen

play13:03

and it can destroy a business okay if

play13:06

they leak data no one's going to trust

play13:08

that business again it can lead to them

play13:10

going out of business altogether

play13:12

okay within our actual system then we

play13:16

have the actual protection methods how

play13:18

do we protect data with our it first is

play13:20

the notion of isolation when malicious

play13:22

software gets caught by antivirus

play13:23

software it puts it into isolation for

play13:26

the actual administrators to review is

play13:28

this actual software malicious in many

play13:31

cases it might be based on its virus

play13:33

signatures and thus before it even gets

play13:35

to the system we can eliminate it and

play13:37

delete it so it didn't impact on the

play13:39

wider system there

play13:40

physical security within our

play13:42

organization that data is stored within

play13:45

locked rooms okay we have cameras in

play13:48

place and Technology physical components

play13:50

that protect the actual data on our

play13:52

systems other backup locations physical

play13:55

hard drives and network locations and

play13:57

servers for storing data in multiple

play14:00

places in case we do lose data and then

play14:02

we have those network access methods of

play14:04

Biometrics checking people's biology

play14:06

such as their facial recognition scans

play14:09

and thumb prints give them access to a

play14:10

system as well as passwords for the

play14:12

typing in of strings of characters that

play14:14

people use to identify themselves in

play14:16

conjunction with their logins the use of

play14:19

encryption for scrambling data during

play14:20

transmission obviously done prior to

play14:22

transmission so that if it is in

play14:24

transmission gets intercepted it comes

play14:26

up scrambled but the receiver on the

play14:28

other end of the data has the encryption

play14:30

key to revert that symbol scrambled data

play14:33

back into readable form firewalls that

play14:36

check data coming in from various

play14:38

sources and if it's an untrusted sources

play14:40

it will block the entry of that data

play14:41

into the system the use of multi-factor

play14:44

authentication which is very big at the

play14:45

moment which means you log into a system

play14:47

and then once you've logged in as it

play14:49

says multi-factor a secondary alert gets

play14:52

sent out to that user for them to

play14:54

authenticate themselves again which may

play14:56

come through either SMS or through their

play14:58

email a message saying you're trying to

play15:00

log into this system here's a

play15:01

verification code enter this now and

play15:04

then they've used another way to get

play15:06

into the system as well the hence why

play15:07

it's multi-factor they've used their

play15:09

pass login and password and then they've

play15:11

used in the pin prompt that was sent to

play15:13

their email or SMS gaining the access to

play15:15

the system

play15:16

our use of backup to protect data from

play15:19

loss okay that we have multiple servers

play15:21

and offline servers for storing data

play15:24

that way if our main servers go down we

play15:26

can recover the data from our backed up

play15:28

sources to keep the sync the system

play15:30

functioning and as mentioned before the

play15:33

use of antivirus and anti-malware

play15:35

software which keeps up to date with

play15:37

specific virus signatures and common

play15:40

threats out there and then through its

play15:42

catalog is able to intercept them and

play15:44

put them into isolation when that data

play15:46

tries to infiltrate the network

play15:48

the final areas of cyberlore and ethics

play15:51

and with that we obviously are looking

play15:53

at the impact of cyber breaches and I

play15:54

said before it can lead to a company

play15:56

going out of business for these reasons

play15:57

the fact that Financial loss it costs

play16:00

money they could steal money from the

play16:01

organization or hold them to Ransom the

play16:04

reputational damage which is sometimes

play16:05

even worse in that the public know that

play16:08

this business was the victim of a Cyber

play16:10

attack and do I trust my data with this

play16:12

business okay it leads to massive

play16:15

disruptions in work especially in areas

play16:17

where the system's either been taken

play16:19

down or you need to go through all your

play16:21

data and assess the damage level the

play16:23

Cyber threat which takes away from your

play16:25

main business and isolates certain uh

play16:28

data that people need to use as a part

play16:30

of their jobs okay so it brings work to

play16:33

a halt which obviously costs money in

play16:35

the long term as well and the legal and

play16:37

Regulatory ramifications you've got to

play16:40

say uh commit it to the government that

play16:42

we did have a cyber breach and you've

play16:44

got to comply with what measures are are

play16:47

known for Less your users know that you

play16:50

didn't have that cyber breach and

play16:51

telling them the regulations that they

play16:53

should need to follow to ensure that

play16:55

their data is safe or what passwords

play16:56

they may need to change so it says

play16:58

structures that need to be followed in

play17:00

to ensure that all parties are safe not

play17:02

just the Enterprise itself but all users

play17:04

suppliers other organizations are aware

play17:06

that you had a data breach data was

play17:08

potentially leaked and giving them

play17:10

advice on what they need to do to keep

play17:12

their own data safe because it has been

play17:14

infiltrated through your system it's not

play17:16

nice and a business does not want to go

play17:18

through this

play17:19

the next areas of specific laws and

play17:21

legislation laws exist at a state

play17:23

federal and international level and one

play17:25

of the most common laws known as the

play17:26

Privacy Act 1988 okay as well as I

play17:29

mentioned before the Freedom of

play17:30

Information Act Two which obviously

play17:32

highlights how businesses need to take

play17:34

the acquisition and storage of people's

play17:36

data seriously and have these cyber

play17:38

security measures in place to ensure

play17:40

that that data does stay safe but then

play17:42

also knowing too who can view data

play17:44

putting access rights and permissions on

play17:46

the data so it's only being used for

play17:48

specific purposes but people need to

play17:49

access that data all of that is bound by

play17:51

law and we need to follow that and then

play17:54

the final area is a knowledge of current

play17:56

and emerging cyber crime threats okay

play17:59

and we are in an era where this is a

play18:01

booming industry of cyber security

play18:02

because there are so many cyber threats

play18:04

out there okay there have been ones that

play18:06

have infiltrated Banks Health Systems uh

play18:09

gaming platforms and their online stores

play18:11

many have happened in previous years

play18:13

with people's data being exposed so

play18:16

we've learned through seeing what our

play18:18

current ones happening by having a

play18:20

knowledge understanding of current

play18:21

threats hopefully we can put measures in

play18:23

place to protect ourselves against it if

play18:25

we are going to go into that industry

play18:26

and Enterprises can protect themselves

play18:28

so I hope this video has given you

play18:30

understanding of this third unit of the

play18:31

preliminary course of principles of

play18:33

cyber security and really it's so

play18:35

important that we protect our systems

play18:36

and why it is so important because

play18:38

really it could mean the life and death

play18:40

of an Enterprise if they can or cannot

play18:43

protect the data of the users who

play18:45

interact with their systems