The Internet: Cybersecurity & Crime


Hi, my name is Jenny Martin and I’m the
director of cybersecurity investigations at Symantec. Today cybercrime causes huge problems for society personally, financially, and even
in matters of national security. Just in the last few years, hundreds of millions of credit card numbers have been stolen, tens of millions of Social Security
numbers and healthcare records were compromised, even nuclear centrifuges
that have been hacked, and unmanned aerial drones have been hijacked. This is all done by exploiting vulnerabilities in hardware and software or more often
by taking advantage of unintentional decisions made by the people using the software. The people committing these cyber crimes
don’t fit a single profile or motivation. It could be anyone from an international terrorist to a teenager competing for bragging rights. Today the largest countries not only have a regular army
but also have a well armed cyber army. In fact, the next World War may not be
fought with traditional weapons, but with computers used to shut down national
water supplies, energy grids, and transportation systems. Hi my name is Parisa and
I’m Google’s Security Princess. I’ve worked on a lot of different Google products
in a lot of different ways to try and make our software as secure as possible. Now let’s take a look at how cybercrime
works under the hood. We’ll learn about software viruses,
denial-of-service attacks, and phishing scams. In biology and life, a virus is an
organism that is spread by coughing, sneezing, or physical contact. Viruses work by infecting cells,
injecting their genetic material, and using those cells to replicate. They can make people really sick and then spread to other people. A computer virus works bit similarly. A
virus is an executable program that gets installed, usually unintentionally,
and harms the user and their computer. It’s also possible for a virus to spread itself to other
computers. Now how does a virus get on your
computer in the first place? There are a couple ways an attacker can
infect someone’s computer. They might lure a victim into
installing a program with deception about the program’s purpose, so for example a lot
of viruses are disguised as security updates. It’s also possible that the software on your computer has a vulnerability, so an attacker can install itself without even needing explicit permission. Once a virus is on your computer it can
steal or delete any of your files, control other programs, or even allow
someone else to remotely control your computer. Using computer viruses, hackers can take
over millions of computers world wide and then use them as a digital army, otherwise known as a botnet, to attack and take down websites. This kind of attack is called a
distributed denial of service. A denial of service is when hackers
overwhelm a website with too many requests. We call it a distributed denial-of-service when the attack comes from many computers all at once. Most websites are ready to respond to
millions of requests a day, but if you hit them with billions or trillions of requests,
coming from different places, the computers are overloaded and stop
responding. Another trick used by cybercriminals is to send large amounts of spam email in an attempt to trick people into sharing sensitive personal information. This is called a phishing scam.
A phishing scam is when you get what seems like a trustworthy email asking you to log
into your account, but clicking the email takes you to a fake website. If you log in anyway, you’ve been
tricked into giving your password away. Hackers can then use your login
credentials to access your real accounts to steal information or maybe even to
steal your money. Fortunately there are many companies, laws, and government
organizations working to make the internet safer, but these
efforts are not enough. You may think when a computer system
gets hacked the problem was the security design or the software. Ninety percent
of the time the system gets hacked however, it’s not because of the security bug, but because of a simple mistake made by a human. It turns out there are steps we
can all take to protect ourselves. Often your actions not only impact the
security of your own data and computer, but the security of everyone at your school, workplace, and home. With billions or
trillions of dollars at stake, cybercriminals get smarter each year and
we all need to keep up.

35 Comments

  1. kevindt12 said:

    ONLY THE US HAS THERE GRIT AND ALL THE OTHER THING ON INTERNET

    August 31, 2015
    Reply
  2. Life said:

    How does a website protect itself against ddos/dos when it is unable to hide it's ip?

    August 31, 2015
    Reply
  3. GCM said:

    cool… but next time be more explicit about governments acting as cyber criminals.

    August 31, 2015
    Reply
  4. Vitor Fernando Reis Pizzuto said:

    Please add subtitles in Portuguese of Brazil.

    December 20, 2015
    Reply
  5. mas bro said:

    I didn't know google security dudes is cute

    June 11, 2016
    Reply
  6. King David RUSINGIZA said:

    Protection and mind wide open are the most powerful weapon which can be used to change the world
    please do not share your privacy to the unknown person on the internet BE AWARE AND BE SAFE

    July 11, 2016
    Reply
  7. DarkShift said:

    Haha, you can't stop people who pay for shitty booters. No way, they use header modification which isn't traceable, trust me I've tried to catch packets and parse them for months and nothing's come up that't given me information leading up to who the initial DDOSER is.

    September 2, 2016
    Reply
  8. Luvai Darwajawala said:

    Loved all Of your Videos Code.org Great Explanation And you made me more curious about this stuff
    Thanks A Tonn

    October 14, 2016
    Reply
  9. Bipin Kumar said:

    thank u persia,,..:) expained with a gesture which explains things better..

    January 11, 2017
    Reply
  10. ATGG said:

    Whith what program are you editting like this?? please!1

    January 13, 2017
    Reply
  11. David Asher said:

    i want more!!!!!! pleas

    March 19, 2017
    Reply
  12. Varun Sanan said:

    Want to learn about cyber crime and security thn watch my video its awesome.. Hope you like it guyzz. 👍

    June 17, 2017
    Reply
  13. No_Zach!! said:

    Hey google do you know about browser viruses and chromium 😏

    August 13, 2017
    Reply
  14. Jessica Giambra said:

    Which course are these videos a part of on Code.org?

    October 4, 2017
    Reply
  15. Rushil Kasetty said:

    It's spelled hijack, not highjack. Still a great video though!

    November 20, 2017
    Reply
  16. savecityofheroes savecityofheroes said:

    there are a lot more then that stay the hell out of Social Media FACEBOOK and TWITTER and so on. Public Forums cohtitan*com linustechtips*com, nextgengta*com, cohrevival*com and they are many more. there job is to take away for freedom of rights and freedom of speech while at the same time use there spy software that can steel your private information suck as I.P address and your phone number and your picture of your face. they can sell all that information to take your I.D information where you live, your banking information everything. do not use online business that use banking paypal and many others. avoid online shopping AMAZON and EBAY and DIRECTRON  these are online scams. cannot call the police its a civil mater. best to hire a attorney and file a law suit against any one fucking with your freedom of rights and freedom of speech and I.D theft these public forums do know your I.D such as your I.P address. that is your address for you to use the internet its a series of numbers looks like this 109.205.76.8 your Internet Service Provider use I.P. address to allow you to get access to the internet. they know your name, your home address, banking account,  where you work everything. also I for to note public forums also know your Windows Serial number every so offen call your ISP and change your I.P address. there is a fee. if your using dial up your IP address change every time long in,. they can still get your windows O.S. serial number and all kinds of private info.  do not use FACEBOOK, TWITTER, and on with it comes to social media. and do not go to public forums cohtitan*com cohrevival*com, linustechtips*com, nextgengta*com and so on.  When you get bannedhey will sell your information tto kick you off the internet. one more thing use many free virus killer, malware killer that is free and free to use.  this is the best protection is  SUPER ANTI SPYWARE http://superantispyware.com/ you can get free one and free to use. use it a lot./ it will kill your spyware crap that is killing your PC.

    May 13, 2018
    Reply
  17. Care Air said:

    The most secure system is an isolated system made by oneself.
    One shouldn’t model after the real-world in this instance. This is something that can be done. Leave the virtual world as a virtual world.
    I think this is a possible alternative.

    May 14, 2018
    Reply
  18. Care Air said:

    Double-edged sword requires double-edged mechanism. Do you want to see that?
    U want a child to be able to world dominate?
    Better think carefully, boys and girls.
    Something that are not to be created must not be created at all.

    May 14, 2018
    Reply
  19. Awsblacknight said:

    Anyone else notice that they spelled hijacked wrong at 0:36?

    May 25, 2018
    Reply
  20. Fikadu dagafa said:

    good

    June 7, 2018
    Reply
  21. Johnedel Mapa said:

    I loved this video HAHAHAHA

    June 20, 2018
    Reply
  22. AronyG Takamuto said:

    Is hack possible when the victim is offline or airplane mode?

    August 29, 2018
    Reply
  23. Fergal Downes said:

    Hey there buddy, extremely good stream that you have here. I subscribed.

    September 1, 2018
    Reply
  24. Axel Schultz said:

    security princess? what a dumb name

    October 2, 2018
    Reply
  25. JierList said:

    'Uhmerica'

    December 12, 2018
    Reply
  26. xInfinite said:

    2:01 Why are the infected people black?

    December 19, 2018
    Reply
  27. Suraj Chauhan ; whats 7843981378 said:

    Can you provide cyber cell number?

    February 24, 2019
    Reply
  28. Colin Gasiewicz said:

    1:47 an organism refers to something that is living a virus is not living.

    February 26, 2019
    Reply
  29. Zhiad Omar said:

    This video is shit

    March 5, 2019
    Reply
  30. Cloud Collection said:

    Wow amazing!!!
    Hey guys watch this video as well
    https://youtu.be/kcdUdElXMKk
    hope everyone likes it

    April 15, 2019
    Reply
  31. AIB Gaming said:

    GOOGLE SECURITY PRINCESS

    April 18, 2019
    Reply
  32. Yan Yan said:

    Hi , I am Alex ovechkin

    April 22, 2019
    Reply
  33. Nick Carducci said:

    i mean a phishing website CAN in the future be unable to show a license given by what would be a better ICANN system, that gives sites a unique identity and maintains their likeness & copyright, something similar to a Secure Sockets Layer https verification of encryption…
    so can we REALLY blame the user for not checking the spelling of the domain in the address bar or poor design/service by ICANN or your browser

    June 16, 2019
    Reply
  34. Nasiha Hossen said:

    Da illuminati help us from da Cyberbullies….. is our lives the lie…..

    July 28, 2019
    Reply
  35. Real Idiot said:

    Are there men working in tech too?

    September 15, 2019
    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *