Time
44 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:03
Hello. Welcome to cyber and data security and user awareness. This is Episode one part to threat assessment and trends. Thank you so much for joining me today for continuation of this course
00:21
to make sure you're in the right course. Let's take a look at this pre assessment question.
00:28
What are the four reasons for safeguarding your password?
00:32
The increased use of devices,
00:34
incidents of data breaches have the potential to expose personally identifiable information
00:40
or P I I
00:42
p. I has a high dollar value on the black market.
00:47
Social engineering can be used to obtain your password.
00:50
We're all of the above.
00:56
He's learning objectives for Episode one. Part two is to raise the awareness of cyber threats. Those involved at it preaches and exposed records and become acquainted with case studies.
01:12
You're probably asking yourself why take this course?
01:18
The fact that we're increasingly multi tasking and we're using multiple devices makes us more prone to error, and human error opens the door to identity theft.
01:34
An attention grabbing headline from Experience Ah, global leader in consumer and business credit reporting indicates that nearly 1/2 a 1,000,000,000 consumer records were exposed in 2000 and 18.
01:49
At the same time, a security firm risk by security announced, Oh, that during the same period, 6500 data breaches occurred and more than five billion records were exposed in 2000 and 18 alone.
02:08
A data breach can yield anything any type of data that is stored and that could be phone and email contacts, photos, chat logs, audio recordings, device, location, Internet and calendar data.
02:29
You were probably still thinking to yourself, How do these threats impact me?
02:35
A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
02:44
And this could lead to identity theft of personally identifiable information.
02:50
Another threat could be data misuse or abuse. And that is the extraction and monetization of your P I, ay information or tracking data by large companies with or without our consent. And this continued practice may lead to an invasion of privacy.
03:20
So how much is personally identifiable information
03:24
valued on the black market?
03:28
If you see the chart, you'll notice that for the value of a full identity
03:35
is roughly 1200 to $1300 while at the same time, Visa or MasterCard credentials are about $20.
03:47
The data obtained through data breaches can eventually be sold on this black market in the quarters with the type of information that has been exposed.
04:01
Data breaches typically occur across all sectors of the economy, the business industry, health care, banking, finance, education and military and government. All much in just two examples of data breaches Qui Aurea and My Fitness Powell,
04:20
the user data was compromised due to an unauthorized access of their systems by 1/3 party
04:33
with regards to data misuse. The case studies that we will mention here are the most attention getting incidents involving social media platforms and community based mobile applications like Facebook and Google.
04:54
So as a review, no longer do criminals target desktop computer information for hacking, but also these devices because social media networks and platforms are easy ways to obtain personally identifiable information. And criminals have become very creative and are hacking
05:14
into mobile phones,
05:15
computer Web cans, game consoles, Barbie dolls, baby monitors and educational toys.
05:24
If you look at the example in the slide, you'll see there was a V Tech, a study where, by the photos of the users of the educational toys and play toys were recorded and sold on the market.
05:44
A few case studies will mention or regarding games and toys. Hackers stole the information of proper gaming forms, managing to obtain email addresses, passwords and I P addresses with the PlayStation and Xbox players.
05:59
Also, it was found that Hello, Barbie could have leaked information as well as Hello Kitty and My melody and found Lee adorable Teddy Bear could be connected to the Internet and store a child's name for future interactions.
06:15
Hackers could use information like a child's name and birthday to determine a family's passwords
06:20
as names of birthdays, a common past coast For many people,
06:30
the post assessment question that we will pose at this time is water. The four reasons for safeguarding your password. Increased use of devices, incidents of data breaches have the potential to expose personally identifiable information. P I has a dollar value on the black market,
06:49
and social engineering can be used to obtain your password.
06:55
All of the above.
07:01
In today's brief lecture,
07:03
let's summarize what we've learned. We've discovered trends related to computer use.
07:10
We've raised our awareness of cyber threats and we become acquainted with case studies.
07:21
I look forward to working with you. For our next video, we will discover trends related to mobile device use.
07:30
We will clean up mobile phone storage and we will learn how to my great phone data to the cloud.

Up Next

End User Awareness

This is a introduction series to end user information and cyber security awareness. It's designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home.

Instructed By

Instructor Profile Image
Tonya Mead
Instructor