1 00:00:00,820 --> 00:00:07,840 Welcome to our course focusing on current cyber threats this module will raise key points regarding 2 00:00:07,840 --> 00:00:14,740 who our enemy really is and will help you discover weaknesses in your computer system protection. 3 00:00:14,770 --> 00:00:17,440 How do you typically behave security wise. 4 00:00:17,440 --> 00:00:20,860 What are the behavior patterns of system administrators and users. 5 00:00:22,970 --> 00:00:26,160 What does the consumerization of I.T. mean. 6 00:00:26,210 --> 00:00:27,220 What is apt. 7 00:00:28,410 --> 00:00:34,010 A term with military origins coined as a response to a shift in the computer system security landscape. 8 00:00:35,190 --> 00:00:36,240 Let's get started. 9 00:00:38,150 --> 00:00:45,640 The first module will focus on the concepts of cyber war the consumerization of I.T. and apt. 10 00:00:45,830 --> 00:00:51,910 The key aspects that have driven change as far as system security is concerned. 11 00:00:51,940 --> 00:00:54,790 Why is this loosely technical subject so important. 12 00:00:56,580 --> 00:01:01,720 It's because computer systems follow their own rules and our ability to work with them is not innate 13 00:01:01,780 --> 00:01:03,100 and has to be learned. 14 00:01:04,830 --> 00:01:09,710 As you know the systems we know today have all been developed in the past 20 or 30 years. 15 00:01:11,520 --> 00:01:14,270 Most of us have not been able to use them while growing up. 16 00:01:15,920 --> 00:01:22,280 This is an ability which has to be taught and learned and it just so happens that we haven't yet had 17 00:01:22,280 --> 00:01:26,780 a good teacher what's the result of this fallback. 18 00:01:26,790 --> 00:01:31,320 We're all perfectly aware of the rules that have to be followed to be safe and secure outside home or 19 00:01:31,320 --> 00:01:34,540 at work. 20 00:01:34,570 --> 00:01:37,650 We follow them intuitively and at the same time. 21 00:01:37,690 --> 00:01:42,700 When it comes to virtual security or computer systems security we draw a blank regarding the same set 22 00:01:42,700 --> 00:01:45,090 of rules. 23 00:01:45,090 --> 00:01:50,010 Your goal is to discover and teach yourself and the users of your system's crucial aspects of computer 24 00:01:50,010 --> 00:01:53,660 security awareness. 25 00:01:53,670 --> 00:01:58,890 This is all the more important as unlike in real life breaking computer security rules won't cause an 26 00:01:58,890 --> 00:02:02,310 immediate reaction. 27 00:02:02,390 --> 00:02:05,420 If you run a red light you will surely be noticed. 28 00:02:05,450 --> 00:02:07,960 This behavior is dangerous to both you and others. 29 00:02:08,060 --> 00:02:09,980 So action will come instantly. 30 00:02:12,040 --> 00:02:17,560 But if you do something equally silly in a virtual environment in a computer system the reaction will 31 00:02:17,560 --> 00:02:21,450 either be invisible or at least be delayed. 32 00:02:21,490 --> 00:02:26,620 It's harder to notice the cause and effect relationship between let's say visiting a suspicious website 33 00:02:26,680 --> 00:02:32,700 and your computer is starting to work slower this relationship is real though and will be the subject 34 00:02:32,700 --> 00:02:33,720 of this course. 35 00:02:35,200 --> 00:02:42,090 There's also another aspect that explains why less technical modules are vital for this training. 36 00:02:42,140 --> 00:02:47,660 It's because users the majority of people who work with computers like students employes and so on. 37 00:02:47,680 --> 00:02:50,650 Use computers as a tool to accomplish simple goals. 38 00:02:53,560 --> 00:02:59,490 It's never a goal in itself to become a computer expert. 39 00:02:59,500 --> 00:03:04,420 In other words getting to know computer systems mechanisms is only seen as important when it can be 40 00:03:04,420 --> 00:03:12,180 applied to everyday life at work or for entertainment security awareness is rarely a factor here. 41 00:03:12,280 --> 00:03:17,050 And this means that even the younger users who grew up with computers and computer networks still have 42 00:03:17,050 --> 00:03:20,010 the same rules to catch up on. 43 00:03:20,040 --> 00:03:21,980 They still have to learn security rules 44 00:03:24,740 --> 00:03:27,820 Unfortunately aside from us the good guys. 45 00:03:27,830 --> 00:03:32,490 There are other people in the virtual environment or the ecosystem as well. 46 00:03:33,570 --> 00:03:37,710 There are people who are there for their own gain and their agenda can be counter-productive with our 47 00:03:37,710 --> 00:03:45,480 own this business or the cyber crime scene is growing rapidly. 48 00:03:45,560 --> 00:03:49,480 Of course cyber criminals have been with us ever since computers were developed. 49 00:03:51,000 --> 00:03:57,420 We'll take a look at that later recently from the past five to eight years there's been quite a significant 50 00:03:57,420 --> 00:04:02,790 change in how these cyber criminals operate. 51 00:04:02,800 --> 00:04:03,580 Simply put. 52 00:04:03,580 --> 00:04:09,000 To be truly secure in all environments whether it's the real or virtual world you have to first know 53 00:04:09,000 --> 00:04:10,610 it's basic security rules. 54 00:04:13,160 --> 00:04:18,730 As of now you're not fully aware of them and you need to increase your knowledge. 55 00:04:18,730 --> 00:04:23,140 There are however other people out there that are extremely savvy with computer security 56 00:04:25,620 --> 00:04:30,330 people who have tons of experience or have studied for years or simply make good use of the knowledge 57 00:04:30,330 --> 00:04:33,430 found on the Internet. 58 00:04:33,510 --> 00:04:38,190 They can attempt to exploit for their own purposes our ignorance and carelessness and the fact that 59 00:04:38,190 --> 00:04:44,960 we're breaking basic security rules and the problem is they're often successful in these attempts.