All language subtitles for 003 Security Quick Win-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,144 --> 00:00:02,204 I want to give you a super easy 2 00:00:02,244 --> 00:00:03,744 quick security win 3 00:00:03,778 --> 00:00:05,198 that you can setup right now. 4 00:00:05,326 --> 00:00:07,486 A small practical exercise 5 00:00:07,599 --> 00:00:09,299 before we dig in to the theory. 6 00:00:09,366 --> 00:00:11,933 So you have an immediate 7 00:00:09,366 --> 00:00:11,933 security capability 8 00:00:11,993 --> 00:00:13,746 to detect malware and hackers 9 00:00:13,824 --> 00:00:15,791 that you can setup in about 10 minutes 10 00:00:15,884 --> 00:00:17,804 and you don't even 11 00:00:15,884 --> 00:00:17,804 have to install anything. 12 00:00:18,003 --> 00:00:20,250 This way if you forget to do 13 00:00:18,003 --> 00:00:20,250 the rest of the course 14 00:00:20,416 --> 00:00:22,243 at least you've got some security 15 00:00:22,270 --> 00:00:23,663 capability out of it. 16 00:00:23,786 --> 00:00:24,813 So here it goes. 17 00:00:24,977 --> 00:00:26,070 Wouldn't it be cool 18 00:00:26,196 --> 00:00:29,656 if we could setup security tripwires 19 00:00:26,196 --> 00:00:29,656 to tell us 20 00:00:29,877 --> 00:00:32,050 if someone or something 21 00:00:32,075 --> 00:00:34,191 was poking around in our files 22 00:00:34,218 --> 00:00:36,751 on our laptop, on our phone, tablet 23 00:00:36,998 --> 00:00:39,058 in our email and our online accounts, 24 00:00:39,085 --> 00:00:40,205 basically everywhere. 25 00:00:40,231 --> 00:00:42,065 Wouldn't it good to have some tripwires 26 00:00:42,304 --> 00:00:44,169 that alerted us when somebody 27 00:00:44,202 --> 00:00:45,989 was doing things we don't want them to do. 28 00:00:46,210 --> 00:00:47,790 Well, we can set those things up. 29 00:00:47,943 --> 00:00:49,377 Let me show you how to set 30 00:00:49,403 --> 00:00:50,963 these security tripwires 31 00:00:51,203 --> 00:00:53,717 using a service called 32 00:00:51,203 --> 00:00:53,717 CanaryTokens 33 00:00:53,789 --> 00:00:55,149 that is make available 34 00:00:55,247 --> 00:00:57,128 just for you guys on this course. 35 00:00:57,380 --> 00:01:00,307 So you can have some quick and easy 36 00:00:57,380 --> 00:01:00,307 security wins. 37 00:01:01,033 --> 00:01:02,406 If you make your way to 38 00:01:02,431 --> 00:01:06,873 www.stationx.net/canarytokens/ 39 00:01:07,022 --> 00:01:08,716 you can follow along with what I am doing 40 00:01:08,741 --> 00:01:11,055 and create your own 41 00:01:08,741 --> 00:01:11,055 tokens at the same time. 42 00:01:11,549 --> 00:01:14,162 Here we have our little canary friend 43 00:01:11,549 --> 00:01:14,162 and his token. 44 00:01:14,356 --> 00:01:16,883 You see a rather obvious red button here 45 00:01:17,086 --> 00:01:18,566 and this is what we need to click on 46 00:01:18,680 --> 00:01:20,293 to take us to the domain 47 00:01:20,333 --> 00:01:22,626 that will provide us with 48 00:01:20,333 --> 00:01:22,626 the tokens. 49 00:01:22,846 --> 00:01:25,620 Here we are. 50 00:01:22,846 --> 00:01:25,620 This is the domain here that will rotate 51 00:01:25,645 --> 00:01:28,026 so don't worry what that is at the moment. 52 00:01:28,771 --> 00:01:31,891 Here we are. This is the main 53 00:01:28,771 --> 00:01:31,891 thing you need to interact with 54 00:01:32,051 --> 00:01:33,091 and I am going to show you 55 00:01:33,305 --> 00:01:35,838 5 different ways of 56 00:01:33,305 --> 00:01:35,838 setting up traps. 57 00:01:35,930 --> 00:01:39,023 These traps are also called 58 00:01:35,930 --> 00:01:39,023 tokens or canary tokens. 59 00:01:39,430 --> 00:01:40,856 We are going to keep is simple 60 00:01:41,117 --> 00:01:42,904 at the early stages of this course. 61 00:01:43,327 --> 00:01:45,767 First thing we need to do is 62 00:01:43,327 --> 00:01:45,767 we need to put in an email address. 63 00:01:45,792 --> 00:01:47,640 Now, this is the email address 64 00:01:47,714 --> 00:01:50,333 which you want to get sent alerts to. 65 00:01:50,690 --> 00:01:53,023 This needs to be an email address 66 00:01:50,690 --> 00:01:53,023 you monitor. 67 00:01:53,183 --> 00:01:54,955 i.e. it's like the email address you have 68 00:01:54,981 --> 00:01:56,339 on your phone or something like that 69 00:01:56,363 --> 00:01:58,352 so you get notified immediately 70 00:01:58,377 --> 00:01:59,553 when there is a security problem. 71 00:01:59,577 --> 00:02:02,257 You don't want to setup secondary 72 00:01:59,577 --> 00:02:02,257 email address that you never look at. 73 00:02:02,295 --> 00:02:03,295 That is pointless. 74 00:02:03,325 --> 00:02:05,025 It has to be an email address 75 00:02:03,325 --> 00:02:05,025 you monitor. 76 00:02:05,065 --> 00:02:06,811 Even if you setup a new 77 00:02:05,065 --> 00:02:06,811 email address 78 00:02:06,918 --> 00:02:08,398 as long as it it the one you monitor. 79 00:02:08,579 --> 00:02:09,866 Let me put in one in here. 80 00:02:12,355 --> 00:02:14,895 That is the email address 81 00:02:12,355 --> 00:02:14,895 I want to get sent alerts to 82 00:02:15,115 --> 00:02:16,595 and than I need to put in here 83 00:02:16,702 --> 00:02:17,955 some sort of comment 84 00:02:18,035 --> 00:02:19,188 that let's me know 85 00:02:19,247 --> 00:02:21,213 which token, which trap, 86 00:02:21,260 --> 00:02:22,287 has been triggered. 87 00:02:22,323 --> 00:02:23,966 I'm gonna put Word 88 00:02:24,004 --> 00:02:27,187 document in password folder on laptop. 89 00:02:27,268 --> 00:02:29,387 That is going to make more 90 00:02:27,268 --> 00:02:29,387 sense in a second. 91 00:02:29,760 --> 00:02:31,013 Ignore all this for now. 92 00:02:31,053 --> 00:02:33,021 Just have it at DNS and HTTPS 93 00:02:33,069 --> 00:02:34,847 and Generate Token. 94 00:02:35,988 --> 00:02:38,392 If we go down here 95 00:02:38,698 --> 00:02:40,389 the first one I want 96 00:02:38,698 --> 00:02:40,389 you to have a look at 97 00:02:40,595 --> 00:02:43,777 is MS Word token or trap. 98 00:02:44,076 --> 00:02:45,370 What this is done is this is 99 00:02:45,402 --> 00:02:48,632 generated a unique Word document 100 00:02:45,402 --> 00:02:48,632 for you 101 00:02:48,866 --> 00:02:51,255 that we can download. 102 00:02:48,866 --> 00:02:51,255 I will give you a demo of it. 103 00:02:51,501 --> 00:02:53,032 Go download that now. 104 00:02:53,992 --> 00:02:55,429 And if you see this here 105 00:02:55,788 --> 00:02:58,264 this is the Word document 106 00:02:55,788 --> 00:02:58,264 that we've just downloaded. 107 00:02:58,669 --> 00:03:00,407 Now, if I click on that 108 00:03:02,586 --> 00:03:04,252 and that just opened up there. 109 00:03:04,396 --> 00:03:06,920 You can see a little timer is going on 110 00:03:04,396 --> 00:03:06,920 there in the background. 111 00:03:08,133 --> 00:03:09,133 You see there. 112 00:03:09,394 --> 00:03:10,672 We've been alerted. 113 00:03:10,977 --> 00:03:14,349 Now, anytime anyone opens 114 00:03:10,977 --> 00:03:14,349 this document 115 00:03:14,461 --> 00:03:15,652 you're gonna get alerted. 116 00:03:15,728 --> 00:03:17,069 It's a little trap. 117 00:03:17,382 --> 00:03:19,990 And this little trap should work 118 00:03:17,382 --> 00:03:19,990 on most operating systems, 119 00:03:20,015 --> 00:03:21,410 most versions of Word. 120 00:03:21,569 --> 00:03:23,934 There is no 100% guarantee 121 00:03:21,569 --> 00:03:23,934 that it's going to work 122 00:03:23,959 --> 00:03:26,355 on every system and 123 00:03:23,959 --> 00:03:26,355 with every version of Word. 124 00:03:26,545 --> 00:03:27,669 So if it doesn't work 125 00:03:26,545 --> 00:03:27,669 for you 126 00:03:27,796 --> 00:03:30,465 than try one of the other tokens 127 00:03:27,796 --> 00:03:30,465 I am going to show you in a second 128 00:03:30,696 --> 00:03:31,863 Let me close that. 129 00:03:31,942 --> 00:03:33,760 I've created another 130 00:03:31,942 --> 00:03:33,760 example here 131 00:03:33,950 --> 00:03:36,331 You can change the file name of this 132 00:03:33,950 --> 00:03:36,331 document, by the way 133 00:03:36,356 --> 00:03:39,402 to anything that you like, making it 134 00:03:36,356 --> 00:03:39,402 enticing for someone to click on. 135 00:03:40,380 --> 00:03:41,902 If I open this one in a second. 136 00:03:44,339 --> 00:03:46,886 Just open this fully. 137 00:03:44,339 --> 00:03:46,886 Now in this one 138 00:03:46,982 --> 00:03:49,847 I've put valuable and juicy 139 00:03:46,982 --> 00:03:49,847 information in it 140 00:03:50,021 --> 00:03:52,807 that hacker or other 141 00:03:50,021 --> 00:03:52,807 type of threat would be 142 00:03:52,832 --> 00:03:54,616 interested in finding. 143 00:03:54,855 --> 00:03:59,339 PayPal, usernames and passwords, 144 00:03:54,855 --> 00:03:59,339 stock trading information 145 00:03:59,477 --> 00:04:02,307 social media accounts, 146 00:03:59,477 --> 00:04:02,307 etc., etc. 147 00:04:02,521 --> 00:04:03,847 Those are the sort of things 148 00:04:03,934 --> 00:04:06,323 that a threat is going 149 00:04:03,934 --> 00:04:06,323 to be searching for 150 00:04:06,482 --> 00:04:08,528 If it's on your laptop, your device, 151 00:04:08,553 --> 00:04:09,971 your phone, within your email 152 00:04:10,054 --> 00:04:12,104 is going to be searching 153 00:04:10,054 --> 00:04:12,104 for key words. 154 00:04:12,933 --> 00:04:14,598 If you want an idea 155 00:04:12,933 --> 00:04:14,598 of the sort of 156 00:04:14,623 --> 00:04:16,584 things that you want to put in 157 00:04:14,623 --> 00:04:16,584 these traps 158 00:04:16,749 --> 00:04:18,640 than I've put some examples here. 159 00:04:18,665 --> 00:04:20,269 You can see personal information, 160 00:04:20,294 --> 00:04:21,697 financial information, 161 00:04:21,750 --> 00:04:23,033 file hosting accounts, 162 00:04:23,173 --> 00:04:24,568 and if we go further 163 00:04:23,173 --> 00:04:24,568 down here 164 00:04:24,731 --> 00:04:27,545 I've provided an example file. 165 00:04:24,731 --> 00:04:27,545 I don't want you to just copy this 166 00:04:27,628 --> 00:04:29,334 but you can use it as just 167 00:04:27,628 --> 00:04:29,334 an example 168 00:04:29,359 --> 00:04:30,961 of the sort of information 169 00:04:30,986 --> 00:04:32,559 You can see social security numbers, 170 00:04:32,870 --> 00:04:34,305 credit card details. 171 00:04:34,366 --> 00:04:36,167 I've put the in the right soft of format. 172 00:04:36,405 --> 00:04:38,246 Bitcoin wallet ID 173 00:04:38,412 --> 00:04:39,364 You get the idea. 174 00:04:40,625 --> 00:04:42,259 So, we can imagine now 175 00:04:42,398 --> 00:04:43,853 hacker was snooping around 176 00:04:43,985 --> 00:04:46,651 in an area we specifically 177 00:04:43,985 --> 00:04:46,651 put aside 178 00:04:46,820 --> 00:04:48,328 just for the hacker to find 179 00:04:48,374 --> 00:04:50,219 and weve put in that 180 00:04:48,374 --> 00:04:50,219 Word document 181 00:04:50,677 --> 00:04:52,298 And he's now clicked on it. 182 00:04:52,571 --> 00:04:55,309 And this is the alert we get, 183 00:04:52,571 --> 00:04:55,309 so we know he's snooping around 184 00:04:55,672 --> 00:04:57,027 And not only do we know 185 00:04:55,672 --> 00:04:57,027 he's snooping around 186 00:04:57,052 --> 00:05:00,374 We know what he's doing 187 00:04:57,052 --> 00:05:00,374 because we setup that comment there 188 00:05:00,579 --> 00:05:01,730 and if we click here 189 00:05:02,413 --> 00:05:04,853 we can look to see 190 00:05:02,413 --> 00:05:04,853 where he's come from. 191 00:05:04,880 --> 00:05:06,626 We can track him down. 192 00:05:08,166 --> 00:05:10,143 and this provides further information 193 00:05:10,170 --> 00:05:11,704 on how he triggered 194 00:05:10,170 --> 00:05:11,704 the alert 195 00:05:11,756 --> 00:05:14,666 but what is important is that 196 00:05:11,756 --> 00:05:14,666 you react to the alert. 197 00:05:14,964 --> 00:05:16,227 And later on in the course 198 00:05:16,307 --> 00:05:17,471 we are gonna talk more 199 00:05:17,519 --> 00:05:19,681 about response and recovery strategies 200 00:05:19,743 --> 00:05:21,979 as you get through the more 201 00:05:19,743 --> 00:05:21,979 advanced sections. 202 00:05:22,503 --> 00:05:23,812 And if we look at the second type 203 00:05:23,839 --> 00:05:25,916 of token we can create 204 00:05:23,839 --> 00:05:25,916 or trap 205 00:05:26,162 --> 00:05:27,948 a PDF, so we can 206 00:05:28,100 --> 00:05:29,998 download this PDF version. 207 00:05:30,255 --> 00:05:33,013 and it work's pretty much exactly the same 208 00:05:30,255 --> 00:05:33,013 as the Word document 209 00:05:33,198 --> 00:05:35,037 We open this PDF document. 210 00:05:36,401 --> 00:05:38,028 And we will get alerted 211 00:05:38,233 --> 00:05:40,217 that someone has opened it. 212 00:05:41,566 --> 00:05:42,968 and BOOM, there we go. 213 00:05:43,702 --> 00:05:45,759 Another alert. 214 00:05:43,702 --> 00:05:45,759 PDF trap. 215 00:05:46,210 --> 00:05:48,331 So I think you're getting the idea now, 216 00:05:46,210 --> 00:05:48,331 so you want to 217 00:05:48,427 --> 00:05:51,475 sprinkle as many of these tokens, 218 00:05:48,427 --> 00:05:51,475 these traps 219 00:05:51,804 --> 00:05:53,851 through you laptop, 220 00:05:51,804 --> 00:05:53,851 your phone, 221 00:05:53,931 --> 00:05:55,740 your tablet, 222 00:05:53,931 --> 00:05:55,740 in your email, 223 00:05:55,967 --> 00:05:57,507 on your online accounts. 224 00:05:57,891 --> 00:05:59,970 So for example, 225 00:05:57,891 --> 00:05:59,970 you can put it in your Dropbox 226 00:06:00,161 --> 00:06:01,939 and maybe the staff at Dropbox 227 00:06:02,086 --> 00:06:03,935 are looking throughout 228 00:06:02,086 --> 00:06:03,935 your documents 229 00:06:04,183 --> 00:06:07,468 they open the Word document, 230 00:06:04,183 --> 00:06:07,468 boom, you know someone is snooping in there. 231 00:06:07,774 --> 00:06:09,790 And as I said, they need to be 232 00:06:07,774 --> 00:06:09,790 interesting 233 00:06:09,815 --> 00:06:11,912 enticing and valuable. 234 00:06:11,960 --> 00:06:14,238 and you can get that soft of information 235 00:06:11,960 --> 00:06:14,238 from here. 236 00:06:14,695 --> 00:06:16,242 Now let me show you 237 00:06:14,695 --> 00:06:16,242 another sneaky 238 00:06:16,267 --> 00:06:18,020 way of setting up a trap. 239 00:06:18,730 --> 00:06:21,452 Fake email of passwords number 1 240 00:06:22,424 --> 00:06:24,233 Oh, by the way, 241 00:06:22,424 --> 00:06:24,233 if you put it on that one 242 00:06:24,554 --> 00:06:26,958 You'll get more information 243 00:06:24,554 --> 00:06:26,958 in the alert 244 00:06:27,085 --> 00:06:28,482 about who the hacker was 245 00:06:28,549 --> 00:06:31,057 with this type of tracking 246 00:06:28,549 --> 00:06:31,057 we are about to setup now. 247 00:06:31,291 --> 00:06:34,109 So, chose that one, 248 00:06:31,291 --> 00:06:34,109 chose generate 249 00:06:35,343 --> 00:06:38,081 and if you pop down here, 250 00:06:35,343 --> 00:06:38,081 we're going to go to web bugs 251 00:06:38,393 --> 00:06:40,218 and we are going to use two 252 00:06:38,393 --> 00:06:40,218 web bugs here 253 00:06:40,754 --> 00:06:43,437 let's just grab that URL 254 00:06:43,566 --> 00:06:45,201 so that is a clickable link 255 00:06:45,258 --> 00:06:48,155 that if a hacker clicks on 256 00:06:45,258 --> 00:06:48,155 you're going to be alerted. 257 00:06:49,286 --> 00:06:51,421 Let's open up an email here 258 00:06:51,828 --> 00:06:54,384 Right, let's just 259 00:06:51,828 --> 00:06:54,384 pop that in there now. 260 00:06:55,197 --> 00:06:57,729 Than we're going to send 261 00:06:55,197 --> 00:06:57,729 this to ourselves. 262 00:06:58,344 --> 00:07:00,209 We could send it from a 263 00:06:58,344 --> 00:07:00,209 different account 264 00:07:00,457 --> 00:07:01,719 but all that matters is that 265 00:07:01,743 --> 00:07:03,640 the two emails address 266 00:07:03,665 --> 00:07:05,513 the account that you wanting 267 00:07:03,665 --> 00:07:05,513 to be monitored 268 00:07:05,541 --> 00:07:07,575 you're wanting to know 269 00:07:05,541 --> 00:07:07,575 if a hacker is in there. 270 00:07:07,912 --> 00:07:10,705 We need to create 271 00:07:07,912 --> 00:07:10,705 an enticing subject. 272 00:07:13,393 --> 00:07:16,027 And than just as an example, 273 00:07:13,393 --> 00:07:16,027 this one 274 00:07:16,665 --> 00:07:18,318 we're going to go here, 275 00:07:16,665 --> 00:07:18,318 I'm gonna copy 276 00:07:18,343 --> 00:07:19,797 all of this stuff here 277 00:07:19,861 --> 00:07:21,073 into this email. 278 00:07:26,256 --> 00:07:28,622 Obviously you are gonna to put 279 00:07:26,256 --> 00:07:28,622 your own sort of information 280 00:07:28,658 --> 00:07:30,924 in here, 281 00:07:28,658 --> 00:07:30,924 things related to you 282 00:07:31,239 --> 00:07:34,255 So you've noticed I have just 283 00:07:31,239 --> 00:07:34,255 taken that link there. 284 00:07:35,199 --> 00:07:36,772 Now I am putting that link 285 00:07:37,442 --> 00:07:38,171 here. 286 00:07:40,860 --> 00:07:42,851 I can actually change this 287 00:07:40,860 --> 00:07:42,851 to anything that I want. 288 00:07:42,876 --> 00:07:43,882 After this 289 00:07:44,120 --> 00:07:44,849 here 290 00:07:45,043 --> 00:07:46,038 you can change this 291 00:07:46,063 --> 00:07:47,099 to what ever I want. 292 00:07:47,127 --> 00:07:48,181 So I can put login 293 00:07:48,728 --> 00:07:50,438 if I want 294 00:07:48,728 --> 00:07:50,438 .html 295 00:07:50,926 --> 00:07:52,348 You can see what I'm doing 296 00:07:50,926 --> 00:07:52,348 I am creating 297 00:07:52,373 --> 00:07:53,943 an enticement here by 298 00:07:54,201 --> 00:07:56,337 Private file store - 299 00:07:54,201 --> 00:07:56,337 Backup of everything 300 00:07:57,018 --> 00:07:58,302 username and password. 301 00:07:58,705 --> 00:07:59,737 So if a person 302 00:07:59,762 --> 00:08:00,942 opens this email 303 00:08:00,967 --> 00:08:01,988 and than clicks on this link 304 00:08:02,183 --> 00:08:03,250 it will trigger the alert. 305 00:08:03,493 --> 00:08:04,619 We're going to do something 306 00:08:04,677 --> 00:08:06,026 even more tricky here 307 00:08:06,675 --> 00:08:09,228 cause we wanna definitely 308 00:08:06,675 --> 00:08:09,228 catch this hacker. 309 00:08:09,631 --> 00:08:10,923 So within Thunderbird 310 00:08:10,948 --> 00:08:12,762 there is a feature by 311 00:08:10,948 --> 00:08:12,762 which you can 312 00:08:12,787 --> 00:08:15,711 insert a link to an image. 313 00:08:15,746 --> 00:08:17,449 Now, we don't want to 314 00:08:15,746 --> 00:08:17,449 attach an image 315 00:08:17,477 --> 00:08:19,808 we want to insert a link to an image 316 00:08:20,038 --> 00:08:21,950 so if we go 317 00:08:20,038 --> 00:08:21,950 Insert and Image 318 00:08:24,040 --> 00:08:25,483 and we unclick this 319 00:08:25,508 --> 00:08:26,926 so we don't want it to attach 320 00:08:27,517 --> 00:08:28,967 we go on there 321 00:08:29,514 --> 00:08:32,608 and than we can put 322 00:08:29,514 --> 00:08:32,608 image.gif 323 00:08:34,395 --> 00:08:35,830 and you see 324 00:08:34,395 --> 00:08:35,830 we are already alerted. 325 00:08:35,866 --> 00:08:37,468 That's how quick 326 00:08:35,866 --> 00:08:37,468 this service is. 327 00:08:38,045 --> 00:08:40,635 and we do not want to use 328 00:08:38,045 --> 00:08:40,635 any alternative text. 329 00:08:40,973 --> 00:08:41,983 Add that there 330 00:08:42,465 --> 00:08:43,518 and you'll see 331 00:08:43,886 --> 00:08:44,982 you can't see that image 332 00:08:45,112 --> 00:08:48,589 cause that is one by 333 00:08:45,112 --> 00:08:48,589 one pixel invisible gif. 334 00:08:48,768 --> 00:08:50,370 Let me show you how 335 00:08:48,768 --> 00:08:50,370 this works. 336 00:08:50,536 --> 00:08:52,347 We're going to send this 337 00:08:50,536 --> 00:08:52,347 to ourselves. 338 00:08:56,275 --> 00:08:58,952 So there we go 339 00:08:56,275 --> 00:08:58,952 that's our little trap there 340 00:08:59,088 --> 00:09:01,649 and we can chose to open it 341 00:08:59,088 --> 00:09:01,649 leave it as an open email 342 00:09:01,742 --> 00:09:03,704 or we can leave it as 343 00:09:01,742 --> 00:09:03,704 unopened email 344 00:09:03,833 --> 00:09:04,915 but no matter what 345 00:09:04,973 --> 00:09:06,503 if someone is in our email 346 00:09:06,530 --> 00:09:07,619 and they are searching for 347 00:09:07,644 --> 00:09:09,460 whatever is that they 348 00:09:07,644 --> 00:09:09,460 wanna be searching for. 349 00:09:09,487 --> 00:09:11,818 Maybe they are interested 350 00:09:09,487 --> 00:09:11,818 in PayPal accounts. 351 00:09:12,177 --> 00:09:13,620 There we go, 352 00:09:12,177 --> 00:09:13,620 that comes up. 353 00:09:13,907 --> 00:09:16,685 If they are searching for bank information, 354 00:09:13,907 --> 00:09:16,685 credit card information, 355 00:09:16,922 --> 00:09:17,925 that's gonna come up 356 00:09:18,321 --> 00:09:19,454 and all they need to do is 357 00:09:19,727 --> 00:09:20,665 just open it 358 00:09:21,387 --> 00:09:22,765 they don't need to click 359 00:09:21,387 --> 00:09:22,765 on a link. 360 00:09:23,420 --> 00:09:24,156 Boom. 361 00:09:24,508 --> 00:09:26,637 Caught the. 362 00:09:24,508 --> 00:09:26,637 Know they are poking around in there. 363 00:09:27,040 --> 00:09:28,757 But let's say that doesn't work 364 00:09:28,782 --> 00:09:30,388 for whatever reason 365 00:09:28,782 --> 00:09:30,388 It should. 366 00:09:31,237 --> 00:09:33,466 Than there are still things like that 367 00:09:31,237 --> 00:09:33,466 to entice them. 368 00:09:33,491 --> 00:09:35,738 Click on that, boom, 369 00:09:33,491 --> 00:09:35,738 caught them again. 370 00:09:36,436 --> 00:09:38,861 Now, in order for us 371 00:09:36,436 --> 00:09:38,861 to insert that image 372 00:09:39,099 --> 00:09:40,967 I went on this 373 00:09:39,099 --> 00:09:40,967 Insert Image 374 00:09:41,247 --> 00:09:43,852 Now, you may not have this 375 00:09:41,247 --> 00:09:43,852 functionality available 376 00:09:43,880 --> 00:09:45,893 in the email client 377 00:09:43,880 --> 00:09:45,893 that you use. 378 00:09:45,986 --> 00:09:47,775 It may not even be available 379 00:09:45,986 --> 00:09:47,775 to do this 380 00:09:48,141 --> 00:09:49,627 but it doesn't matter 381 00:09:49,655 --> 00:09:52,576 you can still download 382 00:09:49,655 --> 00:09:52,576 Thunderbird if you like. 383 00:09:52,601 --> 00:09:53,521 It's free 384 00:09:53,549 --> 00:09:56,269 and just send an email 385 00:09:53,549 --> 00:09:56,269 or emails 386 00:09:56,383 --> 00:09:58,815 using Thunderbird just for this one task 387 00:09:58,843 --> 00:10:00,805 if you cant work out 388 00:09:58,843 --> 00:10:00,805 how to embed 389 00:10:00,830 --> 00:10:03,431 that invisible web bug 390 00:10:00,830 --> 00:10:03,431 into your email. 391 00:10:04,295 --> 00:10:06,393 So, as I said 392 00:10:04,295 --> 00:10:06,393 you want to sprinkle these tokens 393 00:10:06,418 --> 00:10:07,523 thorough you laptop 394 00:10:07,548 --> 00:10:09,219 on your laptop, 395 00:10:07,548 --> 00:10:09,219 phone, tablet 396 00:10:09,244 --> 00:10:10,913 in your email, 397 00:10:09,244 --> 00:10:10,913 in your accounts, 398 00:10:10,938 --> 00:10:12,999 make them enticing 399 00:10:10,938 --> 00:10:12,999 make them valuable 400 00:10:13,024 --> 00:10:14,390 and then when you get an alert 401 00:10:14,498 --> 00:10:15,847 respond to that alert 402 00:10:16,221 --> 00:10:18,941 and respond in a ways I recommend 403 00:10:16,221 --> 00:10:18,941 thought this course. 404 00:10:19,228 --> 00:10:21,774 C hanging your password 405 00:10:19,228 --> 00:10:21,774 and other such sort of things 406 00:10:21,799 --> 00:10:23,773 disconnecting from the network 407 00:10:24,190 --> 00:10:26,802 so there you go, 408 00:10:24,190 --> 00:10:26,802 that is your security quick win. 409 00:10:26,974 --> 00:10:28,979 Go ahead and set those 410 00:10:26,974 --> 00:10:28,979 right now. 411 00:10:29,281 --> 00:10:31,395 You will have, 412 00:10:29,281 --> 00:10:31,395 after you set this up, 413 00:10:31,495 --> 00:10:33,977 better security detection capabilities 414 00:10:34,077 --> 00:10:35,303 than most companies do. 415 00:10:35,454 --> 00:10:36,601 You might not believe that 416 00:10:36,724 --> 00:10:38,246 if you are not in 417 00:10:36,724 --> 00:10:38,246 the security industry 418 00:10:38,273 --> 00:10:40,835 but that is a sad 419 00:10:38,273 --> 00:10:40,835 and true analysis 420 00:10:40,860 --> 00:10:44,181 of the state of most organisations' 421 00:10:40,860 --> 00:10:44,181 detection capabilities. 422 00:10:44,324 --> 00:10:45,608 Just think of Eduard Snowden, 423 00:10:45,633 --> 00:10:48,205 he was poking around in NSA for months 424 00:10:48,268 --> 00:10:49,488 as an insider threat 425 00:10:49,603 --> 00:10:52,229 and nothing like this 426 00:10:49,603 --> 00:10:52,229 alerted the NSA. 427 00:10:52,365 --> 00:10:53,281 Pretty crazy. 428 00:10:53,569 --> 00:10:56,261 Later on in the course 429 00:10:53,569 --> 00:10:56,261 we will discuss canary tokens 430 00:10:56,286 --> 00:10:57,768 at a more advanced level 431 00:10:57,875 --> 00:10:59,902 when you get there 432 00:10:57,875 --> 00:10:59,902 you will understand more about 433 00:10:59,927 --> 00:11:00,948 how they work 434 00:11:01,163 --> 00:11:04,013 and will understand about importance 435 00:11:01,163 --> 00:11:04,013 of detection controls 436 00:11:04,041 --> 00:11:05,210 which these are 437 00:11:05,360 --> 00:11:07,388 vs preventative controls 438 00:11:07,471 --> 00:11:10,155 which are used to stop the hacker from 439 00:11:07,471 --> 00:11:10,155 getting in in the first place. 440 00:11:10,341 --> 00:11:12,282 Preventative controls are very 441 00:11:10,341 --> 00:11:12,282 important. 442 00:11:12,310 --> 00:11:14,107 We use defence in depth approach. 443 00:11:14,132 --> 00:11:15,427 All of which we're 444 00:11:14,132 --> 00:11:15,427 go going into 445 00:11:15,454 --> 00:11:17,229 So, hope that was fun. 446 00:11:17,457 --> 00:11:19,658 So now let's dig into 447 00:11:17,457 --> 00:11:19,658 theory and the basics 448 00:11:19,683 --> 00:11:22,883 and start our journey 449 00:11:19,683 --> 00:11:22,883 into cyber security. 29892

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.