Introduction to Cyber Security

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
47 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:03
>> In this course, what we're going to be covering,
00:03
we're going to start off with just some of the basics,
00:03
for instance, what do we mean
00:03
>> when we say cyber security?
00:03
>> What does that include?
00:03
What's going encompass?
00:03
Well, really you can look at all the processes,
00:03
all the things that we do to protect
00:03
our data and our information.
00:03
But not just that data and information,
00:03
but all the systems and elements
00:03
that go into preserving that information.
00:03
Our computer systems are networks,
00:03
are processes themselves that we put in place.
00:03
Ultimately what we're going to do is we're going to
00:03
come very security minded in
00:03
this course and look how many things that we do can
00:03
really affect the overall security of the organization.
00:03
We'll also talk about the CIA triad,
00:03
confidentiality, integrity and availability.
00:03
We'll talk about what each of those
00:03
mean and how we can protect them.
00:03
Now when we get to the topic down below,
00:03
why do we care?
00:03
I think most people can answer that.
00:03
We look at billions of dollars
00:03
in identity theft, credit card fraud,
00:03
millions and sometimes hundreds and
00:03
millions of dollars in fines for
00:03
organizations that fail to
00:03
properly protect their patients
00:03
or their customer's information,
00:03
>> privacy being violated.
00:03
>> Now is really a point in time like
00:03
>> none other that we've
00:03
>> seen in the realm of information itself,
00:03
having its value and being targeted.
00:03
Got a lot of information that we want to cover.
00:03
Hopefully this is going to help you play
00:03
your part in the world of cyber security.
00:03
When we do talk about where
00:03
do all these threats come from?
00:03
Who is it that's launching these attacks?
00:03
Well, it can really come from a wide range,
00:03
from the very basics
00:03
of younger kids just launching viruses,
00:03
seeing what they can do maybe with
00:03
no real knowledge or intent.
00:03
Sometimes we covered script kiddies all the way up
00:03
to state-sponsored crimes, organized crimes.
00:03
The mafia has really gotten very
00:03
heavily involved with the world of identity theft.
00:03
It's a lot safer and a lot more lucrative
00:03
than perhaps some of the elements that they
00:03
would have been involved with in the past.
00:03
We have seen elements where terrorists are starting
00:03
to use cyber warfare against this.
00:03
Whether it's information that
00:03
they've acquired and release at appropriate times.
00:03
There was quite a bit of intelligence suggesting that
00:03
a foreign nation had affected our voting processes.
00:03
When we think of terrorists,
00:03
we may think of taking out electric grids
00:03
or interfering with navigational systems of planes.
00:03
There are lots of ways that we're going to begin
00:03
to see cyber attacks used against us,
00:03
I think have a much larger scale.
00:03
Insiders, so many times we
00:03
focused our efforts on keeping the bad guys out.
00:03
Well, we sometimes forget to
00:03
protect against internal fraud.
00:03
We want to make sure that we're
00:03
>> putting the right things,
00:03
>> the right mechanisms in place to
00:03
protect ourselves as much as possible.
00:03
Another term that's becoming very popular
00:03
today we talk about hacktivists.
00:03
These are the folks you've probably heard of anonymous.
00:03
There was a group called Lulzsec.
00:03
But basically what they're looking to do is to force
00:03
their political opinions and those that oppose them.
00:03
Essentially, there will maybe denial of service.
00:03
They may hack in and cause a breach of data.
00:03
But again, they're using computer skills in
00:03
order to push their political agenda. You know what?
00:03
Attacks come from all different directions today.
00:03
What we have to do is we have to be very
00:03
forward thinking and we have to
00:03
start taking security seriously
00:03
on all levels of the organization.
00:03
Now again, when we do talk about security,
00:03
what we want to focus on bringing
00:03
to our environment is called the CIA,
00:03
sometimes called the security triad or the CIA triad.
00:03
But ultimately,
00:03
confidentiality, integrity and availability.
00:03
Confidentiality is usually what
00:03
we're most concerned with.
00:03
We think about privacy,
00:03
secrecy, protecting the information of our company.
00:03
A lot of times we're revolving around privacy.
00:03
But we also have to think about integrity,
00:03
making sure that files don't get
00:03
modified or altered in any sort of way.
00:03
Then availability, it can cost your
00:03
>> company thousands or
00:03
>> even hundreds of thousands of dollars
00:03
to be offline for a mere matter of minutes.
00:03
That availability piece has to be there as well.
00:03
Those are the three elements that really come together
00:03
for those of us that are in the security field,
00:03
looking to bring that element into an environment.
Up Next