title
8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka

description
🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN 🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl This Edureka video on "Cybersecurity Threats" will help you understand the types of cyber attacks that commonly plague businesses and how to tackle them and prevent them. Below are the topics covered in this tutorial: 1. 8 Most Common Cyber Threats 2. What the particular threat is 3. How the threat works 4. How to protect yourself 🔵CyberSecurity Certification Training : https://www.edureka.co/cybersecurity-certification-training Cybersecurity Training Playlist: https://bit.ly/2NqcTQV Subscribe to our channel to get video updates. Hit the subscribe button above. --------------------------------------------- About Edureka Cyber Security Training Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access. Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses. ------------------------------------------------ Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings. --------------------------------------------------- Objectives of Edureka Cyber Security Course This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on This course focuses mainly on the basics concepts of Cyber Security In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses This course will be your first step towards learning Cyber Security -------------------------------------- Who Should go for this Training? Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below-mentioned profiles:- Networking Professionals Linux Administrators ----------------------------------------------- For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free). Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka

detail
{'title': '8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka', 'heatmap': [{'end': 164.731, 'start': 105.526, 'weight': 0.835}, {'end': 787.49, 'start': 750.921, 'weight': 0.932}, {'end': 890.466, 'start': 870.112, 'weight': 0.706}, {'end': 982.681, 'start': 963.867, 'weight': 0.808}], 'summary': 'Provides an overview of cyber security threats, discussing eight common threats and demonstrating ongoing compromises. it also covers phishing attacks, malware types, prevention methods, password attacks, and ddos attacks with preventive measures.', 'chapters': [{'end': 95.001, 'segs': [{'end': 78.644, 'src': 'embed', 'start': 7.355, 'weight': 0, 'content': [{'end': 10.498, 'text': 'Just as pollution was a side effect of the Industrial Revolution.', 'start': 7.355, 'duration': 3.143}, {'end': 15.582, 'text': 'So are the many security vulnerabilities that come with the increased internet connectivity.', 'start': 10.958, 'duration': 4.624}, {'end': 19.284, 'text': 'cyber attacks are exploitations of those vulnerabilities.', 'start': 15.582, 'duration': 3.702}, {'end': 20.145, 'text': 'for the most part,', 'start': 19.284, 'duration': 0.861}, {'end': 27.211, 'text': 'individuals and businesses have found ways to counter cyber attacks using a variety of security measures and just good old common sense.', 'start': 20.145, 'duration': 7.066}, {'end': 31.979, 'text': "Hi guys, my name is Arya and today's session is all about cyber security threats.", 'start': 27.975, 'duration': 4.004}, {'end': 38.364, 'text': 'We are going to examine eight of the most common cyber security threats that your business could face and the ways to avoid them.', 'start': 32.519, 'duration': 5.845}, {'end': 43.168, 'text': 'So before we actually jump into the session, let me give you how the session will actually work.', 'start': 38.945, 'duration': 4.223}, {'end': 46.151, 'text': 'We are going to discuss the most eight common cyber threats.', 'start': 43.548, 'duration': 2.603}, {'end': 51.055, 'text': "We're going to discuss in particular what they are how the threat works and how to protect yourself.", 'start': 46.611, 'duration': 4.444}, {'end': 55.982, 'text': "Okay, so now let's jump in now cyber attacks are taking place all the time.", 'start': 51.838, 'duration': 4.144}, {'end': 61.227, 'text': 'Even as we speak the security of some organization big or small is being compromised.', 'start': 56.422, 'duration': 4.805}, {'end': 69.575, 'text': 'For example, if you visit the site out here that is threat cloud, you can actually view all the cyber attacks that are actually happening right now.', 'start': 61.888, 'duration': 7.687}, {'end': 72.698, 'text': 'Let me just give you a quick demonstration of how that looks like.', 'start': 69.935, 'duration': 2.763}, {'end': 78.644, 'text': 'Okay, so, as you guys can see out here, these are all the places that are being compromised right now.', 'start': 73.619, 'duration': 5.025}], 'summary': 'Increased internet connectivity leads to many cyber vulnerabilities. businesses can counter attacks with security measures and common sense.', 'duration': 71.289, 'max_score': 7.355, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy47355.jpg'}], 'start': 7.355, 'title': 'Cyber security threats overview', 'summary': 'Discusses the prevalence of cyber attacks, presenting eight common threats and emphasizing the continuous nature of such attacks, with a live demonstration showing ongoing compromises and their origins.', 'chapters': [{'end': 95.001, 'start': 7.355, 'title': 'Cyber security threats overview', 'summary': 'Discusses the prevalence of cyber attacks, presenting eight common threats and emphasizing the continuous nature of such attacks, with a live demonstration showing ongoing compromises and their origins.', 'duration': 87.646, 'highlights': ['The live demonstration of ongoing cyber attacks provides a real-time insight into the prevalence and global nature of these threats, showcasing specific compromised areas and their origins.', 'The session covers eight common cyber security threats, offering insight into their nature, workings, and methods for protection, providing practical knowledge for addressing these vulnerabilities.', 'Cyber attacks are depicted as continuous and universal, emphasizing the constant risk faced by organizations of all sizes, underlining the need for proactive security measures and vigilance.', 'The comparison of cyber security threats to the historical side effects of the Industrial Revolution highlights the pervasive and evolving nature of these vulnerabilities, drawing a parallel to a historical precedent.', 'Individuals and businesses are noted to have developed various security measures and best practices to mitigate cyber attacks, emphasizing the proactive approach taken in countering these threats.']}], 'duration': 87.646, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy47355.jpg', 'highlights': ['The live demonstration of ongoing cyber attacks provides a real-time insight into the prevalence and global nature of these threats, showcasing specific compromised areas and their origins.', 'The session covers eight common cyber security threats, offering insight into their nature, workings, and methods for protection, providing practical knowledge for addressing these vulnerabilities.', 'Cyber attacks are depicted as continuous and universal, emphasizing the constant risk faced by organizations of all sizes, underlining the need for proactive security measures and vigilance.', 'The comparison of cyber security threats to the historical side effects of the Industrial Revolution highlights the pervasive and evolving nature of these vulnerabilities, drawing a parallel to a historical precedent.', 'Individuals and businesses are noted to have developed various security measures and best practices to mitigate cyber attacks, emphasizing the proactive approach taken in countering these threats.']}, {'end': 348.44, 'segs': [{'end': 196.551, 'src': 'heatmap', 'start': 105.526, 'weight': 0, 'content': [{'end': 109.969, 'text': "It's only necessary that we educate ourselves about all the types of cyber threats that we have.", 'start': 105.526, 'duration': 4.443}, {'end': 114.011, 'text': 'So these are the eight cyber threats that we are going to be discussing today.', 'start': 110.489, 'duration': 3.522}, {'end': 116.072, 'text': "Firstly, we're going to start with malware.", 'start': 114.411, 'duration': 1.661}, {'end': 124.928, 'text': 'So malware is an all-encompassing term for a variety of cyber attacks, including Trojans, viruses and worms.', 'start': 116.903, 'duration': 8.025}, {'end': 132.432, 'text': 'malware is simply defined as code with malicious intent that typically steals data or destroys something on the computer.', 'start': 124.928, 'duration': 7.504}, {'end': 137.655, 'text': 'the way malware goes about doing its damage can be helpful in categorizing what kind of malware you are dealing with.', 'start': 132.432, 'duration': 5.223}, {'end': 139.419, 'text': "So let's discuss it.", 'start': 138.357, 'duration': 1.062}, {'end': 141.562, 'text': 'So, first of all, viruses.', 'start': 139.839, 'duration': 1.723}, {'end': 148.351, 'text': 'like their biological namesakes, viruses attach themselves to clean files and infect other clean files, and they can spread uncontrollably,', 'start': 141.562, 'duration': 6.789}, {'end': 151.775, 'text': "damaging a system's core functionality and deleting or corrupting files.", 'start': 148.351, 'duration': 3.424}, {'end': 155.841, 'text': 'They usually appear as executable files that you might have downloaded from the internet.', 'start': 152.256, 'duration': 3.585}, {'end': 157.844, 'text': 'Then there are also Trojans.', 'start': 156.423, 'duration': 1.421}, {'end': 164.731, 'text': 'now this kind of malware disguises itself as legitimate software or is included in legitimate software that can be tampered with.', 'start': 157.844, 'duration': 6.887}, {'end': 170.337, 'text': 'it tends to act discreetly and creates backdoors in your security to let other malware sin.', 'start': 164.731, 'duration': 5.606}, {'end': 171.638, 'text': 'then we have worms.', 'start': 170.337, 'duration': 1.301}, {'end': 177.564, 'text': 'worms infect entire networks of devices, either local or across the internet, by using the networks interfaces.', 'start': 171.638, 'duration': 5.926}, {'end': 181.445, 'text': 'It uses each consecutive infected machine to infect more,', 'start': 178.044, 'duration': 3.401}, {'end': 188.868, 'text': 'and then we have botnets and such where botnets are networks of infected computers that are made to work together under the controller of an attacker.', 'start': 181.445, 'duration': 7.423}, {'end': 196.551, 'text': 'So, basically, you can encounter malware if you have some OS vulnerabilities or if you download some illegitimate software from somewhere,', 'start': 189.189, 'duration': 7.362}], 'summary': 'Educate about 8 cyber threats, including malware, viruses, trojans, and worms.', 'duration': 58.194, 'max_score': 105.526, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4105526.jpg'}, {'end': 250.423, 'src': 'embed', 'start': 213.96, 'weight': 6, 'content': [{'end': 218.863, 'text': 'The best way to prevent malware is to avoid clicking on links or downloading attachments from unknown centers.', 'start': 213.96, 'duration': 4.903}, {'end': 228.828, 'text': 'And this is sometimes done by deploying a robust and updated firewall which prevents the transfer of large data files over the network in a hope to weed out attachments that may contain malware.', 'start': 219.323, 'duration': 9.505}, {'end': 237.214, 'text': "It's also important to make sure your computer's operating system, whether it be Windows, Mac OS Linux, uses the most up-to-date security updates,", 'start': 229.248, 'duration': 7.966}, {'end': 242.418, 'text': 'and software programmers update programs frequently to address any holes or weak points,', 'start': 237.214, 'duration': 5.204}, {'end': 246.801, 'text': "and it's important to install all these updates as well as to decrease your own system weaknesses.", 'start': 242.418, 'duration': 4.383}, {'end': 249.623, 'text': 'So next up on our list of cyber threats.', 'start': 247.341, 'duration': 2.282}, {'end': 250.423, 'text': 'We have fishing.', 'start': 249.743, 'duration': 0.68}], 'summary': 'Prevent malware by avoiding unknown links, using updated firewall, os, and software, and addressing system weaknesses.', 'duration': 36.463, 'max_score': 213.96, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4213960.jpg'}, {'end': 312.254, 'src': 'embed', 'start': 273.494, 'weight': 3, 'content': [{'end': 279.057, 'text': 'now, phishing emails often fall into the same category as spam, but are way more harmful than just a simple ad.', 'start': 273.494, 'duration': 5.563}, {'end': 281.899, 'text': 'So how exactly does phishing work?', 'start': 279.678, 'duration': 2.221}, {'end': 291.36, 'text': 'Well, most people associate phishing with email message that spoof or mimic bank, credit card companies or other businesses like Amazon,', 'start': 282.774, 'duration': 8.586}, {'end': 292.901, 'text': 'eBay and Facebook.', 'start': 291.36, 'duration': 1.541}, {'end': 297.764, 'text': 'these messages look authentic and attempt to get victims to reveal their personal information,', 'start': 292.901, 'duration': 4.863}, {'end': 301.587, 'text': 'but email messages are only one small piece of a phishing scam.', 'start': 297.764, 'duration': 3.823}, {'end': 302.507, 'text': 'from beginning to end.', 'start': 301.587, 'duration': 0.92}, {'end': 304.188, 'text': 'the process involves five steps.', 'start': 302.507, 'duration': 1.681}, {'end': 306.35, 'text': 'The first step is planning.', 'start': 304.709, 'duration': 1.641}, {'end': 312.254, 'text': 'the Fisher must decide which business to Target and determine how to get email addresses for the customers of that business.', 'start': 306.35, 'duration': 5.904}], 'summary': 'Phishing is more harmful than spam, targeting businesses like banks, ebay, and facebook, involving a 5-step process.', 'duration': 38.76, 'max_score': 273.494, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4273494.jpg'}, {'end': 358.387, 'src': 'embed', 'start': 331.807, 'weight': 5, 'content': [{'end': 337.011, 'text': 'After that, the Fisher records the information, the victims enter into the web page or pop-up windows.', 'start': 331.807, 'duration': 5.204}, {'end': 340.253, 'text': 'and in the last step, which is basically identity theft and fraud,', 'start': 337.011, 'duration': 3.242}, {'end': 345.798, 'text': "the fishers use the information they've gathered to make illegal purchases or otherwise commit fraud,", 'start': 340.253, 'duration': 5.545}, {'end': 348.44, 'text': 'and as many as a fourth of the victims never fully recover.', 'start': 345.798, 'duration': 2.642}, {'end': 353.003, 'text': 'So how exactly can you be actually preventing yourself from getting fished?', 'start': 348.94, 'duration': 4.063}, {'end': 358.387, 'text': 'Well, the only thing that you can do is being aware of how phishing emails actually work.', 'start': 353.483, 'duration': 4.904}], 'summary': 'Phishing leads to identity theft and fraud, with a quarter of victims never fully recovering. awareness is key to prevention.', 'duration': 26.58, 'max_score': 331.807, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4331807.jpg'}], 'start': 95.281, 'title': 'Cyber threats and phishing attacks', 'summary': 'Discusses various types of malware such as viruses, trojans, and worms, emphasizing the need to update security systems. it also explains the sophisticated nature of phishing attacks, their association with spam, and the five-step process involved, with a significant portion of victims never fully recovering from the fraud.', 'chapters': [{'end': 250.423, 'start': 95.281, 'title': 'Understanding cyber threats: malware and fishing', 'summary': 'Discusses the different types of malware including viruses, trojans, and worms, and emphasizes on the importance of updating security systems to prevent malware. it also touches on the significance of avoiding suspicious links and attachments to prevent phishing attacks.', 'duration': 155.142, 'highlights': ['Malware is an all-encompassing term for a variety of cyber attacks, including Trojans, viruses and worms, with the spread of such attacks being a significant concern globally.', "Viruses attach themselves to clean files, infecting other clean files and spreading uncontrollably, damaging a system's core functionality and deleting or corrupting files.", 'Trojans disguise themselves as legitimate software, act discreetly, and create backdoors in security to allow other malware in.', 'Worms infect entire networks of devices, either local or across the internet, using each consecutive infected machine to infect more.', 'The best way to prevent malware is to avoid clicking on links or downloading attachments from unknown sources, and deploying a robust and updated firewall.', "It's important to ensure that the computer's operating system uses the most up-to-date security updates and software programmers update programs frequently to address any holes or weak points."]}, {'end': 348.44, 'start': 251.024, 'title': 'Phishing attacks: how they work', 'summary': 'Explains the sophisticated nature of phishing attacks, its association with spam, and the five-step process involved, with as many as a fourth of the victims never fully recovering from the fraud.', 'duration': 97.416, 'highlights': ['Phishing emails have become more sophisticated, making it difficult for users to discern legitimate requests from false ones.', 'Phishing emails are more harmful than spam, as they attempt to get victims to reveal personal information.', 'Phishing involves a five-step process, including planning, setup, execution, recording information, and identity theft and fraud.', 'As many as a fourth of the victims of phishing attacks never fully recover from the fraud.']}], 'duration': 253.159, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy495281.jpg', 'highlights': ['Viruses attach to clean files, infecting others, damaging core functionality.', 'Trojans disguise as legitimate software, create backdoors, allowing other malware.', 'Worms infect entire networks, using consecutive machines to spread.', 'Phishing emails are more harmful than spam, attempting to get personal information.', 'Phishing involves a five-step process: planning, setup, execution, recording, identity theft.', 'As many as a fourth of phishing attack victims never fully recover from the fraud.', 'Malware prevention: avoid clicking on unknown links, deploy updated firewall.', "Ensure computer's OS uses up-to-date security updates and frequent software updates."]}, {'end': 568.139, 'segs': [{'end': 377.55, 'src': 'embed', 'start': 348.94, 'weight': 1, 'content': [{'end': 353.003, 'text': 'So how exactly can you be actually preventing yourself from getting fished?', 'start': 348.94, 'duration': 4.063}, {'end': 358.387, 'text': 'Well, the only thing that you can do is being aware of how phishing emails actually work.', 'start': 353.483, 'duration': 4.904}, {'end': 362.724, 'text': 'So first of all a phishing email has some very specific properties.', 'start': 358.982, 'duration': 3.742}, {'end': 369.087, 'text': 'So, firstly, you will have something like a very generalized way of addressing someone like dear client.', 'start': 363.344, 'duration': 5.743}, {'end': 373.268, 'text': 'then your message will not be actually from a very reputable source.', 'start': 369.087, 'duration': 4.181}, {'end': 377.55, 'text': "So out here as you can see it's written as Amazon on the label.", 'start': 373.809, 'duration': 3.741}], 'summary': "Prevent phishing by being aware of email properties. look for generic addressing and untrustworthy sources, such as 'amazon'.", 'duration': 28.61, 'max_score': 348.94, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4348940.jpg'}, {'end': 436.942, 'src': 'embed', 'start': 391.825, 'weight': 0, 'content': [{'end': 396.887, 'text': 'now this redirects me to www.fakeamazon.com, as you can see out here.', 'start': 391.825, 'duration': 5.062}, {'end': 398.047, 'text': 'So, basically,', 'start': 397.407, 'duration': 0.64}, {'end': 406.97, 'text': 'you know this is actually a phishing email and you should actually report this email to your administrators or anybody else that you think is supposed to be concerned with this.', 'start': 398.047, 'duration': 8.923}, {'end': 414.493, 'text': 'Also, let me give you guys a quick demonstration on how phishing actually works from the perspective of an attacker.', 'start': 407.651, 'duration': 6.842}, {'end': 422.353, 'text': 'So first of all, I have actually created a phishing website for harvesting Facebook credentials.', 'start': 415.169, 'duration': 7.184}, {'end': 436.942, 'text': 'I simply just took the source code of the Facebook login page and pasted it and then made a back-end code in PHP which makes a log file of all the Facebook passwords that get actually entered onto the phishing page.', 'start': 423.314, 'duration': 13.628}], 'summary': 'Demonstration of phishing with fake website for harvesting facebook credentials.', 'duration': 45.117, 'max_score': 391.825, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4391825.jpg'}, {'end': 560.012, 'src': 'embed', 'start': 524.964, 'weight': 4, 'content': [{'end': 527.245, 'text': 'Okay, so once I click login out here,', 'start': 524.964, 'duration': 2.281}, {'end': 536.709, 'text': "all that the back-end code that I've written in PHP out here will do is that it's going to take all the parameters that have entered into this website.", 'start': 527.245, 'duration': 9.464}, {'end': 540.831, 'text': 'That is my email address and the password and just generate a log file about it.', 'start': 536.789, 'duration': 4.042}, {'end': 543.352, 'text': "So let's just hit login and see what happens.", 'start': 541.291, 'duration': 2.061}, {'end': 552.156, 'text': "So as you guys can see I've been redirected to the original Facebook page that is not meant for fishing and on my system out here.", 'start': 544.012, 'duration': 8.144}, {'end': 560.012, 'text': 'I have a log file and this log file will show exactly as you can see a fished out the email address.', 'start': 553.207, 'duration': 6.805}], 'summary': 'Backend php code generates log file with entered email and password for phishing attempt.', 'duration': 35.048, 'max_score': 524.964, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4524964.jpg'}], 'start': 348.94, 'title': 'Phishing prevention and demonstration', 'summary': 'Covers methods to prevent phishing attacks, including identifying phishing email properties and provides a demonstration of creating a phishing website for facebook credentials and a facebook phishing attack, emphasizing the risks involved.', 'chapters': [{'end': 414.493, 'start': 348.94, 'title': 'Preventing phishing attacks', 'summary': "Explains how to prevent phishing attacks by being aware of specific properties of phishing emails, such as generic addressing, untrustworthy sources, and misleading redirect links, and provides a demonstration of how phishing works from an attacker's perspective.", 'duration': 65.553, 'highlights': ['Phishing emails have specific properties: generic addressing, untrustworthy sources, and misleading redirect links.', "Demonstration of how phishing works from the attacker's perspective.", 'Importance of reporting phishing emails to administrators.']}, {'end': 479.325, 'start': 415.169, 'title': 'Phishing website for facebook credentials', 'summary': 'Discusses the creation of a phishing website to harvest facebook credentials, including the use of a back-end php code to log passwords and sending emails to spread awareness, not for illegal activities.', 'duration': 64.156, 'highlights': ['A phishing website was created to harvest Facebook credentials by using the source code of the Facebook login page and a back-end PHP code to log passwords.', 'Emails were sent to spread awareness about compromised Facebook credentials, emphasizing that the method should not be used for illegal activities.']}, {'end': 568.139, 'start': 479.645, 'title': 'Facebook fishing demo', 'summary': 'Discusses a demonstration of a facebook phishing attack, including the process of redirecting to a fake facebook page, entering credentials, and generating a log file, showcasing the risks of phishing attacks.', 'duration': 88.494, 'highlights': ['The process of redirecting to a fake Facebook page and entering fake credentials is demonstrated.', 'The back-end code written in PHP generates a log file with the entered email address and password.', 'The demonstration showcases the effectiveness of the phishing attack in obtaining sensitive information.']}], 'duration': 219.199, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4348940.jpg', 'highlights': ['Demonstration of creating a phishing website for Facebook credentials', 'Phishing emails have specific properties: generic addressing, untrustworthy sources, and misleading links', 'Importance of reporting phishing emails to administrators', 'Process of redirecting to a fake Facebook page and entering fake credentials demonstrated', 'Back-end PHP code generates a log file with entered email address and password']}, {'end': 750.681, 'segs': [{'end': 621.596, 'src': 'embed', 'start': 568.139, 'weight': 0, 'content': [{'end': 575.844, 'text': "you enter an email address and you're entering the email address on a phishing website, and then it just redirects you to the original site.", 'start': 568.139, 'duration': 7.705}, {'end': 578.687, 'text': "But by this time you've already compromised your credentials.", 'start': 576.205, 'duration': 2.482}, {'end': 581.529, 'text': 'So always be careful when dealing with such emails.', 'start': 579.067, 'duration': 2.462}, {'end': 585.548, 'text': 'So now jumping back to our session the next type of cyber attacks.', 'start': 582.586, 'duration': 2.962}, {'end': 587.51, 'text': "We're going to discuss is password attacks.", 'start': 585.568, 'duration': 1.942}, {'end': 595.757, 'text': "So an attempt to obtain or decrypt a user's password for illegal use is exactly what a password attack is.", 'start': 588.751, 'duration': 7.006}, {'end': 601.121, 'text': 'hackers can use cracking programs, dictionary attacks and password sniffers and password attacks.', 'start': 595.757, 'duration': 5.364}, {'end': 604.844, 'text': 'password cracking refers to various measures used to discover computer passwords.', 'start': 601.121, 'duration': 3.723}, {'end': 610.829, 'text': 'This is usually accomplished by recovering passwords from data stored in or transported from a computer system.', 'start': 605.424, 'duration': 5.405}, {'end': 615.053, 'text': 'Password cracking is done by either repeatedly guessing the password,', 'start': 611.471, 'duration': 3.582}, {'end': 621.596, 'text': 'usually through a computer algorithm in which the computer tries numerous combinations until the password is successfully discovered.', 'start': 615.053, 'duration': 6.543}], 'summary': 'Phishing website can compromise email credentials. password attacks use cracking programs, dictionary attacks, and sniffers to obtain or decrypt user passwords.', 'duration': 53.457, 'max_score': 568.139, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4568139.jpg'}, {'end': 673.579, 'src': 'embed', 'start': 641.91, 'weight': 4, 'content': [{'end': 644.092, 'text': 'The first is a brute force attack.', 'start': 641.91, 'duration': 2.182}, {'end': 651.438, 'text': 'a hacker uses a computer program or script to try to log in with possible password combinations, usually starting with the easiest to guess password.', 'start': 644.092, 'duration': 7.346}, {'end': 655.962, 'text': 'So just think if a hacker has a company list he or she can easily guess usernames.', 'start': 651.739, 'duration': 4.223}, {'end': 662.508, 'text': 'If even one of the users has a password 1 2 3, he will quickly be able to get in the next our dictionary attacks.', 'start': 656.463, 'duration': 6.045}, {'end': 668.834, 'text': 'Now a hacker uses a program or script to try to log in by cycling through the combinations of common words.', 'start': 662.888, 'duration': 5.946}, {'end': 673.579, 'text': 'in contrast with brute force attacks, where a large proportion key space is searched systematically,', 'start': 668.834, 'duration': 4.745}], 'summary': 'Brute force attacks use program to guess passwords, while dictionary attacks cycle through common words.', 'duration': 31.669, 'max_score': 641.91, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4641910.jpg'}, {'end': 730.926, 'src': 'embed', 'start': 703.047, 'weight': 1, 'content': [{'end': 708.851, 'text': 'So, at the end of the day, everything the user has typed, including the login IDs and passwords, have been recorded.', 'start': 703.047, 'duration': 5.804}, {'end': 712.834, 'text': 'a key logger attack is different than a brute force or dictionary attack in many ways,', 'start': 708.851, 'duration': 3.983}, {'end': 719.638, 'text': "not the least of which the key logging program used as a malware that must first make it onto the user's device.", 'start': 712.834, 'duration': 6.804}, {'end': 725.102, 'text': "and the key logger attacks are also different because stronger passwords don't provide much protection against them,", 'start': 719.638, 'duration': 5.464}, {'end': 730.926, 'text': 'which is one reason that multi-factor authentication is becoming a must-have for all businesses and organizations.', 'start': 725.102, 'duration': 5.824}], 'summary': 'Key logger attacks record all user input, making multi-factor authentication crucial for protection.', 'duration': 27.879, 'max_score': 703.047, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4703047.jpg'}, {'end': 756.882, 'src': 'embed', 'start': 731.736, 'weight': 3, 'content': [{'end': 742.659, 'text': 'Now, the only way to stop yourself from getting killed in the whole password attack conundrum is by actually practicing the best practices that are being discussed in the whole industry about passwords.', 'start': 731.736, 'duration': 10.923}, {'end': 745.239, 'text': 'So basically you should update your password regularly.', 'start': 742.819, 'duration': 2.42}, {'end': 750.681, 'text': 'You should use alpha numerics in your password and you should never use words that are actually in the dictionary.', 'start': 745.739, 'duration': 4.942}, {'end': 756.882, 'text': "It's always advisable to use garbage words that makes no sense for passwords as they just improves your security.", 'start': 750.921, 'duration': 5.961}], 'summary': 'Practice best password practices: update regularly, use alpha numerics, avoid dictionary words.', 'duration': 25.146, 'max_score': 731.736, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4731736.jpg'}], 'start': 568.139, 'title': 'Password attacks and email phishing', 'summary': 'Discusses the dangers of email phishing, methods involved in password attacks, including cracking programs, dictionary attacks, and password sniffers. it also outlines the malicious reasons for password attacks, common methods used, vulnerabilities, and the importance of best password practices.', 'chapters': [{'end': 621.596, 'start': 568.139, 'title': 'Email phishing and password attacks', 'summary': 'Discusses the dangers of email phishing, where entering credentials on a phishing website can compromise them, and the methods involved in password attacks, including cracking programs, dictionary attacks, and password sniffers.', 'duration': 53.457, 'highlights': ['Email phishing can lead to credential compromise: Entering an email address on a phishing website can redirect to the original site, compromising credentials.', "Password attacks involve various methods: Hackers use cracking programs, dictionary attacks, and password sniffers to obtain or decrypt a user's password for illegal use.", 'Password cracking involves repeated guessing: It is done through a computer algorithm trying numerous combinations until the password is successfully discovered.']}, {'end': 750.681, 'start': 621.596, 'title': 'Password attacks: methods and prevention', 'summary': 'Discusses the malicious reasons for password attacks, including cyber crime such as stealing bank information. it outlines three common methods used for password attacks - brute force attack, dictionary attack, and keylogger attack - highlighting the vulnerabilities and the importance of practicing best password practices.', 'duration': 129.085, 'highlights': ['Keylogger attacks are a significant threat, as they can track and record all user keystrokes, including login IDs and passwords, with stronger passwords providing little protection against them.', 'The chapter emphasizes the importance of practicing best password practices, including regularly updating passwords, using alphanumeric combinations, and avoiding dictionary words.', 'Brute force attacks involve using computer programs or scripts to systematically try possible password combinations, with the hacker starting with the easiest to guess passwords.']}], 'duration': 182.542, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4568139.jpg', 'highlights': ['Email phishing can lead to credential compromise: Entering an email address on a phishing website can redirect to the original site, compromising credentials.', 'Keylogger attacks are a significant threat, as they can track and record all user keystrokes, including login IDs and passwords, with stronger passwords providing little protection against them.', "Password attacks involve various methods: Hackers use cracking programs, dictionary attacks, and password sniffers to obtain or decrypt a user's password for illegal use.", 'The chapter emphasizes the importance of practicing best password practices, including regularly updating passwords, using alphanumeric combinations, and avoiding dictionary words.', 'Brute force attacks involve using computer programs or scripts to systematically try possible password combinations, with the hacker starting with the easiest to guess passwords.', 'Password cracking involves repeated guessing: It is done through a computer algorithm trying numerous combinations until the password is successfully discovered.']}, {'end': 1322.249, 'segs': [{'end': 814.931, 'src': 'heatmap', 'start': 750.921, 'weight': 1, 'content': [{'end': 756.882, 'text': "It's always advisable to use garbage words that makes no sense for passwords as they just improves your security.", 'start': 750.921, 'duration': 5.961}, {'end': 760.843, 'text': "So moving on we're going to discuss DDoS attacks.", 'start': 758.042, 'duration': 2.801}, {'end': 765.701, 'text': 'So what exactly is a DDOS or a DOS attack??', 'start': 762.04, 'duration': 3.661}, {'end': 773.244, 'text': 'Well, first of all, it stands for distributed denial of service, and a DOS attack focuses on disrupting the service to a network,', 'start': 766.342, 'duration': 6.902}, {'end': 774.045, 'text': 'as the name suggests.', 'start': 773.244, 'duration': 0.801}, {'end': 780.887, 'text': 'Attackers send high volume of data of traffic through the network until the network becomes overloaded and can no longer function.', 'start': 774.605, 'duration': 6.282}, {'end': 787.49, 'text': 'So there are a few different ways attackers can achieve DOS attack, but the most common is the distributed denial of service attack.', 'start': 781.428, 'duration': 6.062}, {'end': 793.114, 'text': 'This involves the attacker using multiple computers to send the traffic or data that will overload the system.', 'start': 787.97, 'duration': 5.144}, {'end': 800.72, 'text': 'In many instances, a person may not even realize that his or her computer has been hijacked and is contributing to the DOS attack.', 'start': 793.595, 'duration': 7.125}, {'end': 805.924, 'text': 'Now disrupting services can have serious consequences relating to security and online access.', 'start': 801.26, 'duration': 4.664}, {'end': 814.931, 'text': 'Many instances of large-scale DOS attacks have been implemented as a single sign of protests towards governments or individuals and have led to severe punishment,', 'start': 806.444, 'duration': 8.487}], 'summary': 'Using garbage words for passwords improves security. discusses ddos attacks and their consequences.', 'duration': 40.326, 'max_score': 750.921, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4750921.jpg'}, {'end': 890.466, 'src': 'heatmap', 'start': 833.225, 'weight': 0, 'content': [{'end': 840.13, 'text': 'the best way to prevent an additional breach is to keep your system as secure as possible with regular software updates,', 'start': 833.225, 'duration': 6.905}, {'end': 847.616, 'text': 'online security monitoring and monitoring of your data flow to identify any unusual or threatening spikes in traffic before they become a problem.', 'start': 840.13, 'duration': 7.486}, {'end': 855.356, 'text': 'Dos attacks can also be perpetrated by simply cutting a table or dislodging a plug that connects your website server to the internet.', 'start': 848.266, 'duration': 7.09}, {'end': 859.302, 'text': 'So due diligence in physically monitoring your connections is recommended as well.', 'start': 855.476, 'duration': 3.826}, {'end': 863.628, 'text': 'Okay So next up on our list is man-in-the-middle attacks.', 'start': 860.103, 'duration': 3.525}, {'end': 870.112, 'text': 'So, by impersonating the endpoints in an online information exchange,', 'start': 864.568, 'duration': 5.544}, {'end': 876.957, 'text': 'the man-in-the-middle attack can obtain information from the end user and the entity he or she is communicating with.', 'start': 870.112, 'duration': 6.845}, {'end': 879.499, 'text': 'for example, if you are banking online,', 'start': 876.957, 'duration': 2.542}, {'end': 886.083, 'text': 'the man in the middle would communicate with you by impersonating your bank and communicate with the bank by impersonating you.', 'start': 879.499, 'duration': 6.584}, {'end': 890.466, 'text': 'the man in the middle would then receive all of the information transferred between both parties,', 'start': 886.083, 'duration': 4.383}], 'summary': 'Prevent breaches by securing system, monitoring data flow, and physical connections. beware of man-in-the-middle attacks.', 'duration': 57.241, 'max_score': 833.225, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4833225.jpg'}, {'end': 993.264, 'src': 'heatmap', 'start': 963.867, 'weight': 0.808, 'content': [{'end': 966.828, 'text': 'and you can just browse the internet with perfect comfort.', 'start': 963.867, 'duration': 2.961}, {'end': 970.129, 'text': 'Next up on our list is drive by downloads.', 'start': 967.908, 'duration': 2.221}, {'end': 977.175, 'text': 'So gone are the days where you had to click to accept a download or install a software update in order to become infected.', 'start': 970.928, 'duration': 6.247}, {'end': 982.681, 'text': 'now, just opening a compromised web page could allow dangerous code to install on your device.', 'start': 977.175, 'duration': 5.506}, {'end': 988.26, 'text': 'You just need to visit or drive by a web page without stopping or to click.', 'start': 983.416, 'duration': 4.844}, {'end': 993.264, 'text': 'accept any software at the malicious code can download in the background to your device.', 'start': 988.26, 'duration': 5.004}], 'summary': 'Drive by downloads can infect devices without clicking, just by visiting compromised web pages.', 'duration': 29.397, 'max_score': 963.867, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4963867.jpg'}, {'end': 1017.822, 'src': 'embed', 'start': 993.264, 'weight': 3, 'content': [{'end': 1000.149, 'text': 'a drive by download refers to the unintentional download of a virus or malicious software onto your computer or mobile device.', 'start': 993.264, 'duration': 6.885}, {'end': 1007.635, 'text': 'a drive by download will usually take advantage or exploit a browser or app or operating system that is out of date and has security flaws.', 'start': 1000.149, 'duration': 7.486}, {'end': 1017.822, 'text': 'This initial code that is downloaded is often very small and since his job is often simply to contact another computer where it can pull down the rest of the code onto your smartphone,', 'start': 1008.3, 'duration': 9.522}], 'summary': 'Drive-by downloads exploit outdated software to install malware.', 'duration': 24.558, 'max_score': 993.264, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4993264.jpg'}, {'end': 1105.419, 'src': 'embed', 'start': 1083.047, 'weight': 5, 'content': [{'end': 1091.191, 'text': 'So malvertising is the name we in the security industry give to criminally controlled advertisements which intentionally infect people and businesses.', 'start': 1083.047, 'duration': 8.144}, {'end': 1099.976, 'text': 'These can be any ad on any site, often ones which you use as a part of your everyday internet usage, and it is a growing problem,', 'start': 1091.752, 'duration': 8.224}, {'end': 1105.419, 'text': 'as is evident by a recent US Senate report and the establishment of bodies like trust and ads.', 'start': 1099.976, 'duration': 5.443}], 'summary': 'Malvertising is a growing problem, as evident by recent us senate report and establishment of bodies like trust and ads.', 'duration': 22.372, 'max_score': 1083.047, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy41083047.jpg'}, {'end': 1210.471, 'src': 'embed', 'start': 1185.951, 'weight': 6, 'content': [{'end': 1191.756, 'text': 'So the last kind of cyber attacks we are going to discover today and discuss about is rogue software.', 'start': 1185.951, 'duration': 5.805}, {'end': 1204.866, 'text': 'So rogue security software is a form of malicious software and internet fraud that misleads users into believing that there is a virus on their computer and manipulates them into paying money for a fake malware removal tool.', 'start': 1192.356, 'duration': 12.51}, {'end': 1210.471, 'text': 'It is a form of scare where that manipulates users through fear, and a form of ransomware.', 'start': 1205.607, 'duration': 4.864}], 'summary': 'Rogue software tricks users into paying for fake malware removal tool, a form of ransomware.', 'duration': 24.52, 'max_score': 1185.951, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy41185951.jpg'}], 'start': 750.921, 'title': 'Ddos and cyber threats prevention', 'summary': 'Discusses ddos attacks, their impact, and preventive measures, and covers various cyber threats including prevention measures such as monitoring, encryption, safe browsing practices, and updated security software.', 'chapters': [{'end': 847.616, 'start': 750.921, 'title': 'Ddos attacks and prevention', 'summary': 'Discusses the concept of ddos attacks, including its impact, how it is executed, and preventive measures, emphasizing the importance of security measures and monitoring to mitigate potential risks.', 'duration': 96.695, 'highlights': ['Disrupting services through DDoS attacks can lead to severe consequences, including major jail time, as instances of large-scale attacks have been implemented as protests, posing significant security and online access threats.', 'Distributed Denial of Service (DDOS) attack involves sending high volumes of traffic through the network to overload the system, with attackers using multiple computers to achieve this, leading to service disruptions and potential security risks.', 'Preventive measures against DOS attacks include keeping systems secure with regular software updates and online security monitoring, along with monitoring data flow to identify any unusual or threatening spikes in traffic before they become problematic.']}, {'end': 1322.249, 'start': 848.266, 'title': 'Cyber threats and prevention', 'summary': 'Covers the various cyber threats including dos attacks, man-in-the-middle attacks, drive-by downloads, malvertising, and rogue software, providing prevention measures such as physical monitoring of connections, encrypted wireless access points, safe browsing practices, ad blockers, and updated firewall and antivirus software.', 'duration': 473.983, 'highlights': ["A man-in-the-middle attack can obtain sensitive information by impersonating endpoints in an online exchange, and prevention measures include using encrypted wireless access points and checking the security of connections, such as ensuring the appearance of 'HTTPS' in websites.", 'Drive-by downloads can install dangerous code on devices by exploiting outdated browsers or operating systems, and prevention methods involve avoiding dangerous websites, keeping browsers and operating systems up-to-date, and using comprehensive security software.', 'Malvertising infects users through criminally controlled advertisements, and prevention techniques include using ad blockers, regularly updating software, and exercising caution regarding suspicious advertisements.', 'Rogue security software misleads users into paying for fake malware removal tools and prevention involves using updated firewalls, trusted antivirus software, and maintaining a general level of distrust on the internet.', 'DoS attacks can occur by physically disrupting server connections, and due diligence in physically monitoring connections is recommended, alongside investing in a virtual private network for protection.']}], 'duration': 571.328, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/Dk-ZqQ-bfy4/pics/Dk-ZqQ-bfy4750921.jpg', 'highlights': ['Preventive measures against DOS attacks include regular software updates and online security monitoring.', 'Distributed Denial of Service (DDOS) attack involves sending high volumes of traffic through the network to overload the system.', 'Disrupting services through DDoS attacks can lead to severe consequences, including major jail time.', 'Drive-by downloads can install dangerous code on devices by exploiting outdated browsers or operating systems.', 'A man-in-the-middle attack can obtain sensitive information by impersonating endpoints in an online exchange.', 'Malvertising infects users through criminally controlled advertisements, and prevention techniques include using ad blockers.', 'Rogue security software misleads users into paying for fake malware removal tools and prevention involves using updated firewalls.', 'DoS attacks can occur by physically disrupting server connections, and due diligence in physically monitoring connections is recommended.']}], 'highlights': ['The live demonstration of ongoing cyber attacks provides a real-time insight into the prevalence and global nature of these threats, showcasing specific compromised areas and their origins.', 'The session covers eight common cyber security threats, offering insight into their nature, workings, and methods for protection, providing practical knowledge for addressing these vulnerabilities.', 'Individuals and businesses are noted to have developed various security measures and best practices to mitigate cyber attacks, emphasizing the proactive approach taken in countering these threats.', 'Cyber attacks are depicted as continuous and universal, emphasizing the constant risk faced by organizations of all sizes, underlining the need for proactive security measures and vigilance.', 'The comparison of cyber security threats to the historical side effects of the Industrial Revolution highlights the pervasive and evolving nature of these vulnerabilities, drawing a parallel to a historical precedent.', 'Viruses attach to clean files, infecting others, damaging core functionality.', 'Trojans disguise as legitimate software, create backdoors, allowing other malware.', 'Worms infect entire networks, using consecutive machines to spread.', 'Phishing emails are more harmful than spam, attempting to get personal information.', 'Phishing involves a five-step process: planning, setup, execution, recording, identity theft.', 'As many as a fourth of phishing attack victims never fully recover from the fraud.', 'Malware prevention: avoid clicking on unknown links, deploy updated firewall.', "Ensure computer's OS uses up-to-date security updates and frequent software updates.", 'Demonstration of creating a phishing website for Facebook credentials', 'Phishing emails have specific properties: generic addressing, untrustworthy sources, and misleading links', 'Importance of reporting phishing emails to administrators', 'Process of redirecting to a fake Facebook page and entering fake credentials demonstrated', 'Back-end PHP code generates a log file with entered email address and password', 'Email phishing can lead to credential compromise: Entering an email address on a phishing website can redirect to the original site, compromising credentials.', 'Keylogger attacks are a significant threat, as they can track and record all user keystrokes, including login IDs and passwords, with stronger passwords providing little protection against them.', "Password attacks involve various methods: Hackers use cracking programs, dictionary attacks, and password sniffers to obtain or decrypt a user's password for illegal use.", 'The chapter emphasizes the importance of practicing best password practices, including regularly updating passwords, using alphanumeric combinations, and avoiding dictionary words.', 'Brute force attacks involve using computer programs or scripts to systematically try possible password combinations, with the hacker starting with the easiest to guess passwords.', 'Password cracking involves repeated guessing: It is done through a computer algorithm trying numerous combinations until the password is successfully discovered.', 'Preventive measures against DOS attacks include regular software updates and online security monitoring.', 'Distributed Denial of Service (DDOS) attack involves sending high volumes of traffic through the network to overload the system.', 'Disrupting services through DDoS attacks can lead to severe consequences, including major jail time.', 'Drive-by downloads can install dangerous code on devices by exploiting outdated browsers or operating systems.', 'A man-in-the-middle attack can obtain sensitive information by impersonating endpoints in an online exchange.', 'Malvertising infects users through criminally controlled advertisements, and prevention techniques include using ad blockers.', 'Rogue security software misleads users into paying for fake malware removal tools and prevention involves using updated firewalls.', 'DoS attacks can occur by physically disrupting server connections, and due diligence in physically monitoring connections is recommended.']}