1 00:00:00,270 --> 00:00:05,820 Go to now talk about the current threat landscape this is another way of saying what are the nasty things 2 00:00:05,820 --> 00:00:09,980 that are out there that we should be caring about concerning ourself about. 3 00:00:10,080 --> 00:00:13,610 First the hacker cracker or cyber criminal. 4 00:00:13,910 --> 00:00:19,620 Well you can see behind you is an active I.R.S. channel where everything from credit cards to malware 5 00:00:20,130 --> 00:00:23,100 viruses hacking is a service is sold. 6 00:00:23,100 --> 00:00:28,320 I'll see if you know where it is the power of the Internet not the web but it can be accessed via something 7 00:00:28,320 --> 00:00:30,180 called an IOC client. 8 00:00:30,390 --> 00:00:35,910 Hacker actually originally was a positive term used to describe someone who kept hacking problem until 9 00:00:35,910 --> 00:00:36,720 it was done. 10 00:00:36,900 --> 00:00:44,530 But today Conan's Downing is really someone who's out to cause mischief on the Internet or on your computer. 11 00:00:44,550 --> 00:00:47,580 So that's the way we use it. 12 00:00:47,580 --> 00:00:52,980 There are people that call themselves white hackers meaning they are hacking. 13 00:00:52,980 --> 00:00:59,940 For good example being the work I've done where you are paid to attempt to compromise a target such 14 00:00:59,940 --> 00:01:05,510 as a company and this in the security industry is called ethical hacking or penetration testing. 15 00:01:05,640 --> 00:01:13,050 But what we care about is the black hacker or really you can just simply call them cyber criminals. 16 00:01:13,050 --> 00:01:18,770 They are no longer teenage boys in their mothers basement hacking for fun and recognition. 17 00:01:18,840 --> 00:01:24,140 They are criminals attempting to make money out of you and other people. 18 00:01:24,140 --> 00:01:31,890 You have hacking groups or criminal organizations that range in size from large small. 19 00:01:31,890 --> 00:01:38,880 You have loosely connected hacking groups who convalesce in areas of the dark web and don't really have 20 00:01:38,880 --> 00:01:46,300 strong connections but only connections via the web or some sort of common moral or political agenda. 21 00:01:46,320 --> 00:01:52,890 And you have the lone wolf hacker the seals of these people these hackers very massively The vast majority 22 00:01:52,890 --> 00:01:59,900 of hackers have little skills and or refer to his script kiddies because all they can do is going to 23 00:01:59,920 --> 00:02:01,960 script that someone else has written. 24 00:02:02,140 --> 00:02:08,700 And I guess maybe 95 percent are script kiddies but you should still not underestimate them. 25 00:02:08,700 --> 00:02:15,340 The other five percent are skilled and more dangerous today the skilled hackers sell their tools to 26 00:02:15,340 --> 00:02:16,440 the script kiddies. 27 00:02:16,440 --> 00:02:18,710 And you even have an underground market sell in. 28 00:02:18,780 --> 00:02:23,510 Hacking is a service which is why the script kiddies can be just as dangerous. 29 00:02:23,520 --> 00:02:26,490 You can rent time on a hacking platform. 30 00:02:26,490 --> 00:02:31,960 If these people spend as much time on legitimate businesses then they would probably do very well.