1 00:00:00,660 --> 00:00:03,560 Welcome to the module entitled risk management. 2 00:00:03,780 --> 00:00:05,800 Is it worth investing in security. 3 00:00:11,430 --> 00:00:16,230 During this part of the seminar we will first discuss the methods employed by attackers for breaking 4 00:00:16,230 --> 00:00:17,740 into computer systems. 5 00:00:20,050 --> 00:00:26,680 So learn what kind of information about system configuration the attackers can obtain. 6 00:00:26,700 --> 00:00:30,420 We will see how easy it is to gain critical information about the system. 7 00:00:32,630 --> 00:00:37,730 Then we will learn how to assess threat risks and how to manage this risk by choosing the right defense 8 00:00:37,730 --> 00:00:44,970 strategy or one that will prove cost effective security as everything else. 9 00:00:47,030 --> 00:00:49,450 Must be considered from a business perspective. 10 00:00:50,600 --> 00:00:56,130 It's pointless to spend one hundred thousand dollars on the protection of resources worth only ten thousand 11 00:00:57,270 --> 00:00:59,610 in the last part of this module. 12 00:00:59,640 --> 00:01:05,910 We will analyze whether moving data or even whole services to the cloud affects their security. 13 00:01:06,180 --> 00:01:13,290 And if it does to what extent social engineering attacks will be discussed in a separate part of this 14 00:01:13,290 --> 00:01:20,630 module we will have a closer look at the techniques of social engineering or ways of manipulating computer 15 00:01:20,630 --> 00:01:22,890 system users. 16 00:01:22,900 --> 00:01:23,500 Let's start.