All language subtitles for 02. General definitions

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 0 1 00:00:01,050 --> 00:00:05,640 Welcome to the general definition section. In this section, we'll go over some of the most common terms 1 2 00:00:05,640 --> 00:00:06,570 used in cyber security. 2 3 00:00:06,960 --> 00:00:07,780 So let's dive in. 3 4 00:00:09,240 --> 00:00:12,540 First off, we have infosec or information security. 4 5 00:00:13,200 --> 00:00:15,490 InfoSec is the practice of protecting information. 5 6 00:00:16,020 --> 00:00:21,690 This usually involves protecting or at least reducing the risk of unauthorized access, disclosure, 6 7 00:00:21,720 --> 00:00:26,970 modification, corruption or deletion of information. To make it more concrete 7 8 00:00:27,000 --> 00:00:29,540 let's think of a few examples where infosec would be needed. 8 9 00:00:30,210 --> 00:00:33,660 First off, think of an application that contains your medical records. 9 10 00:00:34,380 --> 00:00:40,080 Only you and your doctor should be able to see those medical records, so your data should be protected 10 11 00:00:40,080 --> 00:00:41,400 against unauthorized access. 11 12 00:00:41,940 --> 00:00:47,770 Another example would be your private messages and emails. We would definitely not want them to be leaked 12 13 00:00:47,820 --> 00:00:48,960 publicly on the Internet. 13 14 00:00:49,680 --> 00:00:51,930 And finally, think of your bank account. 14 15 00:00:52,260 --> 00:00:56,810 That account should be protected against modification, corruption or deletion. 15 16 00:00:57,840 --> 00:01:02,400 You wouldn't want to wake up with less money in your account or without an account altogether. 16 17 00:01:03,470 --> 00:01:09,700 Next, we have cyber security, also known as computer security or information technology security. 17 18 00:01:10,370 --> 00:01:16,230 Cybersecurity is part of infosec and is the practice of protecting I.T. systems against digital attacks. 18 19 00:01:16,910 --> 00:01:22,880 It basically means protecting computers, servers, mobile devices, electronic systems, networks and 19 20 00:01:22,880 --> 00:01:24,320 data from malicious attacks. 20 21 00:01:24,770 --> 00:01:30,740 These attacks can have as purpose the theft or damage of electronic data, such as personal data as 21 22 00:01:30,740 --> 00:01:32,600 well as software and hardware. 22 23 00:01:33,000 --> 00:01:39,200 Other common purposes are to disrupt and/or misdirect the services provided by I.T. systems. 23 24 00:01:39,650 --> 00:01:43,910 For example, attackers can target the bank and make online banking unavailable. 24 25 00:01:44,000 --> 00:01:49,310 Or, in another scenario, an attacker would misdirect us to a malicious website where we would be tricked 25 26 00:01:49,310 --> 00:01:53,780 into giving our credit details to hackers. In the previous slide 26 27 00:01:53,810 --> 00:01:59,960 we learned that cybersecurity means protecting components such as data, software, and hardware that 27 28 00:01:59,960 --> 00:02:02,270 support information related activities. 28 29 00:02:02,660 --> 00:02:05,630 In infosec, such a component is called an asset. 29 30 00:02:06,230 --> 00:02:10,430 Assets can be devices such as a PC, a server or a smartphone. 30 31 00:02:10,970 --> 00:02:17,000 Assets can also be software, for example, a website, an online shop, an online banking app, a car 31 32 00:02:17,000 --> 00:02:22,460 infotainment system, an operating system such as Windows, Linux, or MacOS, or just a regular application. 32 33 00:02:23,300 --> 00:02:29,270 Finally, assets can also be information such as a database with customer information, emails, personal 33 34 00:02:29,270 --> 00:02:30,370 messages and so on. 34 35 00:02:31,160 --> 00:02:34,880 Now that we learn what an asset is, let's have a look at vulnerability. 35 36 00:02:35,450 --> 00:02:38,000 A vulnerability is a weakness in an asset. 36 37 00:02:38,660 --> 00:02:43,580 Usually, an attacker uses one or more vulnerabilities to commit their attack. 37 38 00:02:44,000 --> 00:02:50,960 Some common vulnerability examples are using outdated software and libraries, bugs, and miss configurations 38 39 00:02:50,960 --> 00:02:52,020 of I.T. systems. 39 40 00:02:52,910 --> 00:02:55,550 Next, term is threat. In computer security 40 41 00:02:55,760 --> 00:03:01,160 a threat is the potential negative action or event caused by exploiting a vulnerability. 41 42 00:03:01,820 --> 00:03:04,490 Threats can be intentional or unintentional. 42 43 00:03:05,480 --> 00:03:12,350 A few examples of intentional threats are malware, phishing, hackers, or even an employee that is 43 44 00:03:12,350 --> 00:03:15,440 angry with the company. For unintentional threats 44 45 00:03:15,470 --> 00:03:21,500 some examples would be natural events such as an earthquake, a flood, or a hurricane, or a technical 45 46 00:03:21,500 --> 00:03:24,130 failure such as a hardware or software failure. 46 47 00:03:25,200 --> 00:03:32,010 Another term commonly used is attack. An attack is a deliberate assault on an I.T. system with malicious 47 48 00:03:32,010 --> 00:03:36,420 purpose. You might see some similarities between a threat and an attack. 48 49 00:03:36,450 --> 00:03:37,410 So let's compare them. 49 50 00:03:38,610 --> 00:03:43,920 An attack is a deliberate action against the target with the intention of doing harm, while a threat 50 51 00:03:43,920 --> 00:03:46,320 is the potential for the occurrence of an attack. 51 52 00:03:47,250 --> 00:03:50,910 Since an attack is a deliberate action, it's always intentional, 52 53 00:03:51,060 --> 00:03:54,360 while a threat can be intentional or unintentional. 53 54 00:03:55,170 --> 00:04:00,180 Last but not least, an attack is an attempt to cause damage, while a threat has the potential to cause 54 55 00:04:00,180 --> 00:04:00,600 damage. 55 56 00:04:01,970 --> 00:04:07,550 The final term that we'll discuss in this section is IT risk. IT risk is the potential that a given 56 57 00:04:07,550 --> 00:04:11,130 threat will exploit vulnerabilities of an asset and cause harm. 57 58 00:04:12,020 --> 00:04:18,440 The risk is basically a combination of impact and likelihood. To better understand the risk, 58 59 00:04:18,740 --> 00:04:22,240 let's have a look at an IT risk matrix. On the horizontal axis 59 60 00:04:22,250 --> 00:04:28,550 we have the impact which goes from negligible, on the left side, to severe, on the right side. 60 61 00:04:29,540 --> 00:04:35,930 On the vertical axis, we have likelihood, going from very unlikely at the bottom, to very lightly at 61 62 00:04:35,930 --> 00:04:36,320 the top. 62 63 00:04:37,250 --> 00:04:41,250 Let's take two scenarios to better understand risk. In the first scenario. 63 64 00:04:41,270 --> 00:04:44,450 we have a website which is hosted on multiple data centers, 64 65 00:04:44,870 --> 00:04:50,420 and for one of the data centers, there is a very small chance that an earthquake can happen in that 65 66 00:04:50,420 --> 00:04:50,690 area. 66 67 00:04:50,840 --> 00:04:54,080 Because of that, the likelihood of the threat is very unlikely. 67 68 00:04:54,110 --> 00:04:58,700 And since the website is hosted on multiple data centers, the impact is negligible. 68 69 00:04:59,210 --> 00:05:02,840 Even if one of the datacenter goes down, the website will still work. 69 70 00:05:03,560 --> 00:05:06,050 Based on the information, the risk is very low. 70 71 00:05:07,610 --> 00:05:13,130 For the second scenario, let's think of an online shop, due to a bug, when you log in on the online shop, you 71 72 00:05:13,130 --> 00:05:16,910 have the rights of an admin and you can access data from other customers. 72 73 00:05:17,970 --> 00:05:23,760 In this case, likelihood is very likely because all users have admin rights and the impact is severe, 73 74 00:05:23,760 --> 00:05:27,390 because everyone can access data of other customers. 74 75 00:05:27,960 --> 00:05:34,040 This results in a critical risk. Now that we have knowledge of the terms used in cybersecurity, 75 76 00:05:34,380 --> 00:05:36,750 let's use what we learned in a couple of examples. 76 77 00:05:37,560 --> 00:05:42,750 In the first scenario, we have an online shop which contains private information such as contact details 77 78 00:05:42,750 --> 00:05:48,540 of customers. Besides that we have Alice, the owner of the online shop who uses insecure credentials, 78 79 00:05:48,630 --> 00:05:51,270 such as admin, admin for username and password. 79 80 00:05:52,110 --> 00:05:58,200 And finally, we have Eve, the hacker, who tries to obtain private information using combinations of commonly 80 81 00:05:58,200 --> 00:06:02,660 known credentials. Let's map the terms used to date to this scenario. 81 82 00:06:03,510 --> 00:06:06,420 First, we have the online shop, which is an asset. 82 83 00:06:07,710 --> 00:06:11,980 The database containing the details of the customers can also be considered an asset. 83 84 00:06:13,120 --> 00:06:18,940 Then we have the vulnerability, which in this case is the use of insecure credentials. 84 85 00:06:20,100 --> 00:06:26,520 Next, the threat, which in this case is information disclosure by exploiting the vulnerability and 85 86 00:06:26,520 --> 00:06:32,430 then, we have the attack, which in this case is Eve's attempt to log in as administrator using common, 86 87 00:06:32,430 --> 00:06:34,200 insecure credential combinations. 87 88 00:06:34,830 --> 00:06:36,480 Finally, we have the risk. 88 89 00:06:37,400 --> 00:06:43,090 As we discussed, risk is a combination of likelihood and impact. In this case, the likelihood is likely, 89 90 00:06:43,100 --> 00:06:47,870 since this is a simple attack, and the impact is severe, because private information would be leaked to 90 91 00:06:47,870 --> 00:06:48,600 Eve, the hacker. 91 92 00:06:49,400 --> 00:06:51,170 This results in a critical risk. 92 93 00:06:52,620 --> 00:06:58,080 In our second scenario, we again have an online shop which contains private information such as contact 93 94 00:06:58,080 --> 00:06:59,300 details of customers. 94 95 00:06:59,310 --> 00:07:02,910 In this case, the online shop is hosted on an unpatched server. 95 96 00:07:03,730 --> 00:07:07,830 Besides that, we have Bob, a regular user, just buying stuff online. 96 97 00:07:08,900 --> 00:07:14,570 On the other side, we have again, if the hacker who tries to obtain confidential information using 97 98 00:07:14,570 --> 00:07:16,490 vulnerabilities from the unpatched server. 98 99 00:07:17,450 --> 00:07:23,690 This may seem a bit abstract, so let's see a more concrete example. Let me introduce Heartbleed. 99 100 00:07:24,770 --> 00:07:28,030 Heartbleed was a bug in the open SSL library, in the Heartbeat implementation. 100 101 00:07:28,640 --> 00:07:34,200 The Heartbeat is used to check that the connection between the server and the client is still active. 101 102 00:07:34,250 --> 00:07:35,510 Due to improper input validation, 102 103 00:07:35,750 --> 00:07:39,480 this bug could result in leaking confidential information from the server. 103 104 00:07:40,310 --> 00:07:46,070 The bug was first introduced in 2012 but was only detected in April 2014. 104 105 00:07:46,370 --> 00:07:51,650 As of July 2019, over 90000 devices who are still vulnerable to Heartbleed. 105 106 00:07:53,170 --> 00:07:59,500 To better understand this, we have here an oversimplified example of how hard it works and how hard 106 107 00:07:59,630 --> 00:08:00,090 it works. 107 108 00:08:01,460 --> 00:08:06,170 From time to time, the client wants to check that the connection with the server is still open and 108 109 00:08:06,170 --> 00:08:11,750 will send the message to the server and wait for a reply. On the left, we have the normal usage in which 109 110 00:08:11,750 --> 00:08:15,200 the client would say something like: "Hey, server, are you still there? 110 111 00:08:15,710 --> 00:08:18,170 Send me this three letter word back if you are there." 111 112 00:08:18,470 --> 00:08:24,680 And then it would give a three-letter word such as "Cat", then the server would reply with the message "Cat". 112 113 00:08:24,680 --> 00:08:28,330 Now, the client knows that the connection with the server is still open. 113 114 00:08:29,720 --> 00:08:35,740 On the right, we have the malicious usage using the Heartbleed bug. Similarly to the normal usage, 114 115 00:08:35,960 --> 00:08:38,660 the malicious client would send a message to the server. 115 116 00:08:39,380 --> 00:08:42,950 The client would say something like: "Hey, server, are still there? 116 117 00:08:43,250 --> 00:08:46,910 Send me this 128 letter word back if you are there." 117 118 00:08:47,330 --> 00:08:52,670 And then it would just send a three letter word such as "Cat". Due to improper input validation 118 119 00:08:52,880 --> 00:08:58,880 the server would send back the three letter word, followed by 128 letters filled with whatever else 119 120 00:08:58,910 --> 00:09:00,020 is after that word 120 121 00:09:00,020 --> 00:09:05,090 in the memory of the server. The malicious client could get an answer such as cat, followed by some 121 122 00:09:05,090 --> 00:09:10,580 secret key stored on the server, or confidential information about users such as their credentials, or 122 123 00:09:10,580 --> 00:09:11,540 personal details. 123 124 00:09:13,150 --> 00:09:17,370 Now that we have a concrete example with Heartbleed, we will update the second scenario. 124 125 00:09:17,950 --> 00:09:22,750 So we have an online shop which is using OpenSSL version 1.0.1 125 126 00:09:22,750 --> 00:09:26,610 This version of Open SSL is vulnerable to Heartbleed. 126 127 00:09:27,370 --> 00:09:32,890 As we discussed previously, the online shop contains private information such as details of customers. 127 128 00:09:33,520 --> 00:09:38,170 Besides that, on the left side, we have Bob, a regular user, just buying stuff online. 128 129 00:09:38,770 --> 00:09:44,470 And on the right side, we have Eve, the hacker, who tries to obtain confidential information by exploiting 129 130 00:09:44,470 --> 00:09:45,010 Heartbleed. 130 131 00:09:45,580 --> 00:09:48,580 Once again, let's map the terms learned today to the scenario. 131 132 00:09:49,480 --> 00:09:55,370 First, we have the online shop, which is an asset. The database containing the details of the customer 132 133 00:09:55,430 --> 00:09:56,330 is also an asset. 133 134 00:09:57,070 --> 00:09:57,760 Next, let's see 134 135 00:09:57,760 --> 00:10:02,380 the vulnerability. In this case, is the usage of OpenSSL version 1.0.1 135 136 00:10:02,380 --> 00:10:02,820 . 136 137 00:10:03,340 --> 00:10:08,800 Then, we have the threat, which is again, information disclosure, by exploiting the vulnerability, in 137 138 00:10:08,800 --> 00:10:09,850 this case, Heartbleed. 138 139 00:10:11,060 --> 00:10:16,550 Now, let's have a look at the attack, which in this case is Eve's attempt to obtain confidential information 139 140 00:10:16,550 --> 00:10:18,450 using Heartbleed. 140 141 00:10:18,800 --> 00:10:20,060 Finally, we'll have a look at the risk. 141 142 00:10:20,510 --> 00:10:22,620 Again, we will have a look first 142 143 00:10:22,620 --> 00:10:24,390 at the likelihood, then the impact. 143 144 00:10:24,410 --> 00:10:26,240 Finally, we will calculate the risk. 144 145 00:10:27,230 --> 00:10:32,720 In this case, the likelihood is likely, since this is a relatively simple attack and the impact is severe, 145 146 00:10:32,720 --> 00:10:37,550 because private information would be leaked to Eve, the hacker. Because of this, we have a critical risk. 146 147 00:10:39,020 --> 00:10:46,190 To recap, in this section, we learned the definitions of infosec, cybersecurity, asset, vulnerability, 147 148 00:10:46,610 --> 00:10:51,410 threat, attack, IT risk, and how to map these terms to scenarios. 148 149 00:10:52,190 --> 00:10:53,780 With that, we conclude this section. 149 150 00:10:53,930 --> 00:10:56,390 If you have any questions, don't hesitate to ask us. 150 151 00:10:56,510 --> 00:10:58,100 See you soon in the next section. 16880

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.