1 00:00:00,920 --> 00:00:07,790 Ask questions like why would someone target me or what's the point of a hacker taking over my PC or 2 00:00:07,790 --> 00:00:09,000 my account. 3 00:00:09,330 --> 00:00:11,260 All these are good questions. 4 00:00:11,270 --> 00:00:18,440 The thing you have to realize is is no longer a human being that is actually attacking you a human being 5 00:00:18,450 --> 00:00:28,790 is written or even now bought automated programs then let loose to hunt down vulnerable software without 6 00:00:28,790 --> 00:00:32,070 human beings need to waste their time at all. 7 00:00:32,140 --> 00:00:39,260 They effectively cast huge nets out over the Internet in order to find what is vulnerable. 8 00:00:39,620 --> 00:00:45,050 Which means you and I probably just as likely targets as anyone else. 9 00:00:45,050 --> 00:00:52,130 You will probably already have been a target if you didn't already know for example your internet router 10 00:00:52,250 --> 00:00:57,550 will more than likely be scanned every day to look for their abilities. 11 00:00:57,680 --> 00:01:02,480 I'm sure you've probably received spam emails and then there phishing attacks potentially where they're 12 00:01:02,480 --> 00:01:09,320 trying to get you to download a virus or go to a site where there's a virus or malware and you've definitely 13 00:01:09,320 --> 00:01:16,030 been to Web sites that have been attacked or attempted to be attacked or have been compromised. 14 00:01:16,100 --> 00:01:22,950 So we're all potentially victims or we're all potentially targets additional to this. 15 00:01:22,970 --> 00:01:28,230 You have someone or some organization that could be specifically targeting you. 16 00:01:28,520 --> 00:01:30,310 And this is more serious in the military. 17 00:01:30,310 --> 00:01:34,130 This is referred to as the advanced persistent threat or a p t. 18 00:01:34,160 --> 00:01:40,130 This could be anything from for example you know an X partner trying to get access to your Facebook 19 00:01:40,520 --> 00:01:45,290 to maybe live in a country where there's some sort of totalitarian government. 20 00:01:45,450 --> 00:01:48,280 And they're trying to look at everything that you do. 21 00:01:48,320 --> 00:01:50,570 The situation will be unique to you. 22 00:01:50,600 --> 00:01:57,290 Most people only need to concern themselves with not getting caught in the large net cast by the many 23 00:01:57,290 --> 00:01:59,040 criminal hacking groups. 24 00:01:59,170 --> 00:02:03,800 You can see in front of me now is a threat intelligence monitored by Knauss. 25 00:02:03,980 --> 00:02:10,160 What they've done is they've deliberately set up vulnerable servers which are known as honeypots to 26 00:02:10,160 --> 00:02:15,860 monitor the behavior of hackers and cyber criminals so they can understand the behavior and the new 27 00:02:15,860 --> 00:02:18,370 things that they're doing and the trends. 28 00:02:18,590 --> 00:02:21,380 And this is just a tiny number of servers. 29 00:02:21,380 --> 00:02:27,860 Imagine if this represented all of the attacks on the Internet why do they bother with all this effort. 30 00:02:27,860 --> 00:02:29,630 It must be worth it to them. 31 00:02:29,690 --> 00:02:34,940 Generally the motive for wanting to access your accounts steal your identity take control of your PC 32 00:02:35,570 --> 00:02:36,640 is money. 33 00:02:36,830 --> 00:02:44,180 The odds edge cases where it relates to political or moralistic motives but mostly it's all about the 34 00:02:44,180 --> 00:02:45,330 almighty dollar. 35 00:02:45,390 --> 00:02:49,910 But you might be thinking how do they turn my PC or account into money. 36 00:02:50,090 --> 00:02:51,010 I'll show you. 37 00:02:51,040 --> 00:02:58,880 CONTOURI McAfee report for 45 billion dollars annually is lost to cybercrime a year that equates to 38 00:02:59,030 --> 00:03:02,370 about 266 billion UK pounds. 39 00:03:02,510 --> 00:03:08,240 So crime does pay an especially for people living in poorer countries where you can see here in front 40 00:03:08,240 --> 00:03:15,790 of you is all of the various ways in which your PC could be useful to a cyber criminal. 41 00:03:15,830 --> 00:03:23,720 Web hosting for example they can use your PC as a web server so your content perform illegal and hacking 42 00:03:23,720 --> 00:03:32,390 activities form email attacks virtual goods they can sell virtual goods for currency reputation hijacking 43 00:03:32,570 --> 00:03:40,210 accounts can be sold again but activities take down Web sites blackmail sites account credentials. 44 00:03:40,220 --> 00:03:43,730 Again these can be sold financial credentials. 45 00:03:43,760 --> 00:03:50,630 Course these can be used to gain money hostage attacks identity theft much of the trading in order to 46 00:03:50,630 --> 00:03:54,680 receive currency is done in a cryptocurrency. 47 00:03:54,680 --> 00:04:01,740 Bitcoin is the most popular at the moment when money can be received in semi-anonymous transfers and 48 00:04:01,790 --> 00:04:02,960 cash outs. 49 00:04:03,320 --> 00:04:08,820 And here's some of the examples of if they get access to your e-mail and is value to them. 50 00:04:08,960 --> 00:04:11,450 So privacy related. 51 00:04:11,480 --> 00:04:17,990 So stealing personal information files retail lots around here they can sell your accounts. 52 00:04:17,990 --> 00:04:19,840 People are interested in buying your accounts. 53 00:04:19,840 --> 00:04:28,280 They are then later used for further compromises further access to other useful things such as financial. 54 00:04:28,330 --> 00:04:31,940 Just straight up transferring money out of accounts. 55 00:04:31,940 --> 00:04:33,460 Buying virtual goods. 56 00:04:33,590 --> 00:04:39,250 Spam harvesting employment etc. etc. etc.. 57 00:04:39,320 --> 00:04:46,220 Your email account is particularly juicy as a target because you can often get access to many or all 58 00:04:46,220 --> 00:04:52,250 of your other accounts through it and explains why we have a very active sub criminal underground on 59 00:04:52,250 --> 00:04:53,640 the Internet. 60 00:04:53,660 --> 00:04:58,350 It goes without saying that we need defenses to protect ourselves against them. 61 00:04:58,610 --> 00:05:06,580 If that is have anything of value to protect while we're on line but this course will guide you through 62 00:05:06,670 --> 00:05:12,730 understanding and reducing your online risk to acceptable levels through easy to apply steps. 63 00:05:12,730 --> 00:05:14,670 So let's get on with it.