1 00:00:01,450 --> 00:00:08,030 Despite major Security outlays and legislative proposals to reduce cybercrime we the lawful computer 2 00:00:08,030 --> 00:00:12,690 users are losing the war against cybercrime. 3 00:00:12,740 --> 00:00:18,870 Why Well for starters the statistics are against us. 4 00:00:19,040 --> 00:00:23,960 If you consider that there are 2 billion computer systems that have an internet connection and rather 5 00:00:23,960 --> 00:00:29,080 optimistically assume that 99 percent of them are secured against basic threats and types of attacks. 6 00:00:30,490 --> 00:00:33,950 It still means that 20 million attacks per month will be successful. 7 00:00:36,190 --> 00:00:41,770 This translates into 240 million computers to get infected with malicious software each year. 8 00:00:42,800 --> 00:00:45,380 And remember we're being very optimistic here. 9 00:00:46,460 --> 00:00:50,210 The numbers by and large are simply against us in this fight. 10 00:00:51,000 --> 00:00:54,210 Why don't we take a look at the past to get a better picture of all this. 11 00:00:55,460 --> 00:00:59,220 Let's start with prehistory. 12 00:00:59,320 --> 00:01:03,010 The Stone Age of computer systems is the 90s during this era. 13 00:01:03,010 --> 00:01:08,290 We had Robert Morris who became famous largely as the creator of the first widely spreading computer 14 00:01:08,290 --> 00:01:16,280 worm the worm exploited software bugs in Unix services in sendmail and among others in RSA. 15 00:01:16,300 --> 00:01:24,490 And our Exec the worm also attempted to crack passwords anyway. 16 00:01:24,540 --> 00:01:27,890 Morse himself claimed that he created the worm and released it on the net. 17 00:01:27,930 --> 00:01:30,500 The Internet of those days to measure its size. 18 00:01:32,630 --> 00:01:37,520 Each infected machine responded to the attackers So Morris was able to determine the number of infected 19 00:01:37,520 --> 00:01:44,030 computers to prevent the same machine from being infected multiple times. 20 00:01:44,030 --> 00:01:51,140 The worm used the mechanism that asked whether the computer already had a copy of the worm if it responded 21 00:01:51,150 --> 00:01:56,520 yes the computer would not be re-infected which means that a progeny process of the worm would not be 22 00:01:56,520 --> 00:02:03,100 launched this mechanism could have been easily subverted to stop the epidemic. 23 00:02:05,090 --> 00:02:08,830 It would have been enough to run without analyzing the functioning of the virus. 24 00:02:08,870 --> 00:02:10,550 A program that responded with yes. 25 00:02:10,580 --> 00:02:18,120 When asked whether the computer was infected or wouldn't it realizing that this could stop his attack. 26 00:02:18,190 --> 00:02:23,410 Robert Morris decided that one in seven infected computers would be re-infected regardless of their 27 00:02:23,410 --> 00:02:24,090 answer. 28 00:02:25,010 --> 00:02:31,770 Morse apparently did not imagine what would be the scale of mass spreading viruses. 29 00:02:31,810 --> 00:02:37,870 About 10 percent of Unix systems attached to the Internet roughly several thousand computers were infected 30 00:02:37,870 --> 00:02:44,560 with the worm and so the first attempt to gauge the size of the Internet in the 90s ended up as the 31 00:02:44,560 --> 00:02:46,910 first global denial of service attack. 32 00:02:49,880 --> 00:02:55,220 Robert Morris or someone who claimed to be Morriss then sent out an e-mail which poked fun at a common 33 00:02:55,220 --> 00:02:57,390 media belief. 34 00:02:57,520 --> 00:03:02,110 Or should I use the word paranoia which pictured cyber criminals. 35 00:03:02,330 --> 00:03:07,710 And I don't call them hackers for reasons I'll explain later as people who as you can see could turn 36 00:03:07,710 --> 00:03:15,060 your computer into a bomb and detonate it remotely killing you and your family. 37 00:03:15,270 --> 00:03:20,160 Robert Morris dutifully alerted his readers of a new type of virus which was worse than anything yet 38 00:03:20,160 --> 00:03:21,280 found on the Internet. 39 00:03:23,180 --> 00:03:29,000 A virus that distributed itself through power lines of 60 hertz by changing serial port pin outs and 40 00:03:29,000 --> 00:03:31,490 reversing the direction in which disks spin 41 00:03:35,300 --> 00:03:40,030 those among you who are a bit older may remember that computers used serial ports in the past. 42 00:03:41,090 --> 00:03:44,970 There are also silly hints on fighting the virus first. 43 00:03:45,150 --> 00:03:47,190 Don't attach your computer to a powerline 44 00:03:51,000 --> 00:03:52,200 don't use batteries either. 45 00:03:52,200 --> 00:03:54,530 Batteries are rumored to be infected as well. 46 00:03:57,050 --> 00:04:03,550 Don't copy any files don't read any messages including the one you're reading now. 47 00:04:03,550 --> 00:04:06,340 Don't use serial ports don't use modems 48 00:04:09,090 --> 00:04:11,300 modems or another relic of the past. 49 00:04:11,400 --> 00:04:18,600 They were used to connect your device to the Internet don't use keyboards screens or printers 50 00:04:21,390 --> 00:04:24,930 don't use electricity and heating. 51 00:04:24,990 --> 00:04:30,780 You might say that an exaggerated media reaction triggered an exaggerated response from well let's call 52 00:04:30,780 --> 00:04:35,960 it the computer systems security experts movement. 53 00:04:36,060 --> 00:04:41,340 Time has shown however that this exaggerated reaction was unfortunately not so absurd after all.