Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
00:00,860 --> 00:01,820
Hello, students,
00:01,850 --> 00:05,540
Myself is Parminder Singh from prep classes,
00:05,660 --> 00:13,070
Our today's topic is cyber security, best practices, trends, technologies and myths,
00:14,060 --> 00:20,660
After going through this course, the students will understand about the cybersecurity best practices,
00:20,690 --> 00:31,070
They will understand that there is need to adopt the best practices such as know to click on each and
00:31,070 --> 00:34,980
every email which may come into their inbox,
00:35,000 --> 00:41,030
They may opt for two factor authentication in case of online accounts,
00:41,300 --> 00:45,770
They should also take the necessary steps to,
00:46,690 --> 00:55,990
Prevent the viruses from attacking their computer, such as they may use latest software,
00:57,350 --> 01:03,690
And they should only purchase branded softwares to be installed in their computers,
01:03,710 --> 01:07,340
They should get the firewalls installed,
01:07,760 --> 01:14,330
The students will also understand that cyber security is very important not only for the individuals
01:14,330 --> 01:16,540
but also for organizations,
01:16,610 --> 01:27,380
It is not that the organizations only need cybersecurity and small level organizations or the local
01:27,380 --> 01:30,560
person or a local ordinary person does not require cybersecurity,
01:30,590 --> 01:38,840
Cybersecurity is important for all the individuals and all the organizations because the cyber criminals
01:38,840 --> 01:47,000
understand that the common person or an ordinary shopkeeper does not spend much or give importance to
01:47,000 --> 01:47,940
cybersecurity,
01:47,960 --> 01:49,370
So they,
01:50,470 --> 01:56,800
So about 50% of the targets of the cyber criminals are ordinary individuals and,
01:58,310 --> 02:00,110
Small level organizations,
02:00,110 --> 02:07,520
So cybersecurity is very important to protect our personnel as well as business data and to ensure the
02:07,520 --> 02:08,810
business continuity,
02:10,330 --> 02:17,110
The students will also understand that these cyber threats are of various types, such as they there
02:17,110 --> 02:24,730
may be man in the middle attack, there may be phishing or social engineering attacks or such type of
02:24,730 --> 02:26,650
other attacks may be there,
02:26,770 --> 02:36,820
The consequences of cyber attacks are various, such as the organization or the individual may suffer
02:36,820 --> 02:38,020
financial loss,
02:38,700 --> 02:42,420
The business continuity of the organization is affected,
02:42,810 --> 02:51,480
Or there is also loss of customers because the brand value of the organization is adversely affected
02:51,480 --> 02:52,770
due to cyber attacks,
02:52,950 --> 02:57,210
Because the customers believe that the organization does not spend much,
02:58,230 --> 02:58,890
In,
03:01,000 --> 03:03,190
Does not invest much in cyber security,
03:04,170 --> 03:13,140
This course also puts emphasis on certain dangerous cybersecurity myths, which we should not believe,
03:13,170 --> 03:15,480
The myths may be that the,
03:16,320 --> 03:20,250
Danger to our computer system is only from the outsiders,
03:20,280 --> 03:30,180
There are also insider threats such as which emanate from our employees, partners or third party persons
03:30,180 --> 03:32,520
who may be working for the organizations,
03:33,560 --> 03:40,610
There is also a myth regarding the various other options that we should always,
03:41,530 --> 03:43,450
That once we have installed,
03:44,360 --> 03:48,460
Cybersecurity and antivirus,
03:48,470 --> 03:53,960
We have purchased antivirus or anti-malware software and installed the same computer we need not worry,
03:53,990 --> 04:02,030
This is not so because there may be some phishing attacks or if you click on some,
04:04,300 --> 04:13,180
If you do not opt for best practices with regard to cybersecurity, you may fall trap into the cyber
04:13,180 --> 04:13,810
attacks,
04:15,150 --> 04:19,980
So there are many other myths in relation to cyber security,
04:20,010 --> 04:21,570
We should come up,
04:21,570 --> 04:25,080
We should leave that aside so that we,
04:26,090 --> 04:28,160
Can reduce the chances of,
04:29,020 --> 04:30,880
Cyber cyber attacks,
04:31,300 --> 04:39,850
Then we will the students will also understand that this cyber criminals launched attacks for money,
04:39,880 --> 04:44,560
They may also launch attack for getting revenge from someone,
04:44,770 --> 04:53,650
They there is cyber attack say for fun or some cyber criminals want they want to be recognized in the
04:53,650 --> 04:55,210
world of cyber criminals,
04:56,710 --> 05:02,290
There is also possibility that some state nations also carry out cyber attacks,
05:02,320 --> 05:03,760
On the other countries,
05:05,230 --> 05:05,770
This,
05:07,230 --> 05:15,720
Course, will also throw light on the emerging trends such as the targeted ransomware attacks are on
05:15,720 --> 05:16,740
the rise,
05:16,830 --> 05:26,730
Remote working is there, which is also causing a lot of problem with regard to cyber security of the
05:27,060 --> 05:30,780
remote work computers which are working remotely,
05:31,840 --> 05:39,430
Now, the more and more organizations are using the services of cloud for storing their data,
05:40,530 --> 05:43,020
There is problem with regard to cloud security,
05:44,090 --> 05:46,160
Then there is increase in the number of,
05:47,080 --> 05:48,910
Internet of Things devices,
05:49,680 --> 05:55,830
Which is also opening another door for the hackers,
05:58,910 --> 06:01,520
But then other such trends are also,
06:02,660 --> 06:03,200
Going on,
06:03,200 --> 06:05,060
Mobile is the latest target,
06:06,070 --> 06:14,620
Because normally we purchase antivirus or anti-malware software for our computers, but we do not take
06:14,620 --> 06:17,320
into consideration the security of the mobile phones,
06:18,080 --> 06:20,720
So the cyber criminals are laying more,
06:21,830 --> 06:28,820
Emphasis or the mobiles are the latest target because we mostly do most of our work on our computers
06:29,060 --> 06:35,060
or on our mobile phones for storing our personal information, for carrying out our business data,
06:35,060 --> 06:40,130
or for carrying out our business transactions online, such as online banking,
06:40,960 --> 06:46,900
The students will also understand that cyber security covers many areas such as network security, Web
06:46,900 --> 06:50,500
security, wireless network security, mobile security,
06:50,590 --> 06:53,980
Cyber Security also covers incident response plan,
06:55,150 --> 07:00,430
The incident response plan should be in place before the incident occurs,
07:00,940 --> 07:08,500
The organization have to devise an incident response team who is responsible for carrying out the incident
07:08,500 --> 07:09,640
response process,
07:09,940 --> 07:17,080
The students will learn What is the incident response process we have discussed,
07:17,230 --> 07:22,720
We will discuss in this course incident response plan process in detail,
07:23,670 --> 07:31,650
Within this process will be in general and the same the incident response process can vary as per the,
07:33,100 --> 07:35,980
Circumstances and the needs of the organization,
07:36,010 --> 07:43,240
The students will also understand that the organizations may have to comply with cybersecurity regulations
07:43,240 --> 07:44,710
and standards,
07:49,210 --> 07:50,580
Thanks for watching,
07:50,590 --> 07:57,220
If you like our course, please spare some time to give a star rating to our course,
7997
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.