1 00:00:00,880 --> 00:00:03,100 Humans are social beings. 2 00:00:03,100 --> 00:00:08,190 This has always been our characteristic feature something that makes humans stand out. 3 00:00:08,260 --> 00:00:13,190 And for every society there have always been groups of people who break social rules and flout them 4 00:00:13,190 --> 00:00:14,610 for their own purposes. 5 00:00:16,430 --> 00:00:24,290 Think of the Wild West or the Prohibition era the same scenario as seen in the world of computer systems. 6 00:00:24,340 --> 00:00:28,990 It would be really naive to think that the Internet would somehow be exempt from the same criminal mechanisms 7 00:00:28,990 --> 00:00:31,300 that can be witnessed everywhere else. 8 00:00:32,270 --> 00:00:35,660 Crooks and outlaws existed from the beginning of history. 9 00:00:35,690 --> 00:00:36,700 They simply disappear. 10 00:00:36,700 --> 00:00:40,530 Now unfortunately this is not the case. 11 00:00:41,590 --> 00:00:46,280 They seem to have found a niche for themselves just like the rum runners of the prohibition and exploit 12 00:00:46,280 --> 00:00:47,870 it without remorse. 13 00:00:48,890 --> 00:00:49,790 What's even worse. 14 00:00:49,790 --> 00:00:56,000 They're becoming more and more effective and this is the main reason why the security of computer systems 15 00:00:56,000 --> 00:00:57,230 is lately in decline. 16 00:00:57,230 --> 00:01:03,590 Instead of improving Eighty five percent is an important number. 17 00:01:03,790 --> 00:01:08,500 This is the percentage of attacks which are vectored in ways that render your typical protection measures 18 00:01:08,560 --> 00:01:14,740 such as anti-virus scanners software upgrades for both operating systems and in solid applications or 19 00:01:14,740 --> 00:01:17,500 constantly enabled firewalls essentially useless 20 00:01:20,210 --> 00:01:24,890 these attacks are performed either internally locally or through social engineering. 21 00:01:25,750 --> 00:01:31,600 Tricks and techniques that manipulate people in both cases these attacks cannot be stopped by the protection 22 00:01:31,600 --> 00:01:32,030 measures. 23 00:01:32,050 --> 00:01:36,970 I've just listed 85 is also an important number for other reasons. 24 00:01:38,260 --> 00:01:44,120 The mentioned security measures firewalls updates and scanners are all important. 25 00:01:44,220 --> 00:01:47,310 They should be enabled and supported on all systems. 26 00:01:47,310 --> 00:01:50,080 It's not true that they bring no real results. 27 00:01:50,220 --> 00:01:54,320 At the very least you can pretend you're protected. 28 00:01:54,450 --> 00:01:56,310 Don't make yourself an easy target. 29 00:01:56,340 --> 00:02:01,350 Not having these protections is like leaving your car running with your keys in it in an unknown district. 30 00:02:02,230 --> 00:02:05,140 At least close the door. 31 00:02:05,230 --> 00:02:09,610 The risk of theft is still high but at least you've done something to secure your resources. 32 00:02:11,640 --> 00:02:17,770 And don't get me wrong I don't want you to get rid of your anti-virus scanner. 33 00:02:17,780 --> 00:02:22,020 On the contrary leave it enabled and update it often even every day. 34 00:02:23,400 --> 00:02:27,990 The problem is that when cyber criminals decide that you have some valuable resources or your system 35 00:02:27,990 --> 00:02:30,540 is for some other reason worth attacking. 36 00:02:30,750 --> 00:02:37,950 This scanner will fill 85 percent of the time the first module of course which I invite you to take 37 00:02:38,060 --> 00:02:44,960 will tell you above all which popular computer system security beliefs are actually myths myths that 38 00:02:44,960 --> 00:02:55,240 originated or laziness custom's or from applying outdated information to new phenomena. 39 00:02:55,250 --> 00:03:00,590 It will also comment on security issues that stem from the rise of organized crime in cyberspace. 40 00:03:01,750 --> 00:03:06,640 Remember that there are companies set up in some countries which recruit programmers to create malicious 41 00:03:06,640 --> 00:03:14,710 code running viruses has become a day job for some from 9 to 5. 42 00:03:14,710 --> 00:03:21,970 These people sit in their cubicles and write code that you wouldn't want to come across in your systems. 43 00:03:21,990 --> 00:03:24,860 The module was to talk about cyber war and terrorism. 44 00:03:24,900 --> 00:03:31,840 Two issues that have already become reality we've already been able to witness some instances of cyber 45 00:03:31,840 --> 00:03:39,310 war another of our topics will be the consumerization of I-T and how it affects security. 46 00:03:40,210 --> 00:03:43,800 Risks and threats will also be covered in this first module. 47 00:03:43,920 --> 00:03:48,200 We'll try to classify their types and discover why they affect virtually everyone. 48 00:03:49,550 --> 00:03:53,930 Unfortunately if you think that you wouldn't be the target of attacks because your business is small 49 00:03:53,930 --> 00:03:56,390 scale you only have six computers. 50 00:03:56,420 --> 00:04:01,610 Your monthly turnover is not big and you produce no new technologies so there's really nothing to be 51 00:04:01,610 --> 00:04:02,580 stolen. 52 00:04:02,600 --> 00:04:05,650 Think again. 53 00:04:05,800 --> 00:04:09,300 The real situation doesn't look so bright. 54 00:04:09,310 --> 00:04:14,470 The last issue will be covered in the point titled The final goal of attacks which explores the motives 55 00:04:14,470 --> 00:04:17,230 which current cyber criminals might have to attack you. 56 00:04:19,940 --> 00:04:20,920 See you in the training.