yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Cybersecurity and crime | Internet 101 | Computer Science | Khan Academy


3m read
·Nov 11, 2024

[Music]

Hi, my name is Jenny Martin and I'm the director of cyber security investigations at Semantic. Today, cyber crime causes huge problems for society, personally, financially, and even in matters of national security. Just in the last few years, hundreds of millions of credit card numbers have been stolen. Tens of millions of social security numbers and healthcare records were compromised. Even nuclear centrifuges have been hacked and unmanned aerial drones have been hijacked. This is all done by exploiting vulnerabilities in hardware and software or, more often, by taking advantage of unintentional decisions made by the people using the [Music] software.

The people committing these cyber crimes don't fit a single profile or motivation. It could be anyone from an international terrorist to a teenager competing for bragging rights. Today, the largest countries not only have a regular army but also have a well-armed cyber army. In fact, the next World War may not be fought with traditional weapons, but with computers used to shut down national water supplies, energy grids, and transportation systems.

Hi, my name is Parisa and I'm Google's security princess. I've worked on a lot of different Google products in a lot of different ways to try and make our software as secure as possible. Now, let's take a look at how cyber crime works under the hood. We'll learn about software viruses, denial of service attacks, and phishing scams.

In biology and life, a virus is an organism that is spread by coughing, sneezing, or physical contact. Viruses work by infecting cells, injecting their genetic material, and using those cells to replicate. They can make people really sick and then spread to other people. A computer virus works a bit similarly. A virus is an executable program that gets installed, usually unintentionally, and harms a user and their computer. It's also possible for a virus to spread itself to other computers.

Now, how does a virus get on your computer in the first place? There are a couple of ways an attacker can infect someone's computer. They might lure a victim into installing a program with deception about the program's purpose. So, for example, a lot of viruses are disguised as security updates. It's also possible that the software on your computer has a vulnerability, so an attacker can install itself without even needing explicit permission.

Once a virus is on your computer, it can steal or delete any of your files, control other programs, or even allow someone else to remotely control your computer. Using computer viruses, hackers can take over millions of computers worldwide and then use them as a digital army, otherwise known as a botnet, to attack and take down websites. This kind of attack is called a distributed denial of service. A denial of service is when hackers overwhelm a website with too many requests. We call it a distributed denial of service when the attack comes from many computers all at once.

Most websites are ready to respond to millions of requests a day, but if you hit them with billions or trillions of requests coming from different places, the computers are overloaded and stop responding. Another trick used by cyber criminals is to send large amounts of spam email in an attempt to trick people into sharing sensitive personal information. This is called a phishing scam. A phishing scam is when you get what seems like a trustworthy email asking you to log into your account, but clicking the email takes you to a fake website.

If you log in anyway, you've been tricked into giving your password away. Hackers can then use your login credentials to access your real accounts to steal information or maybe even to steal your money. Fortunately, there are many companies, laws, and government organizations working to make the internet safer, but these efforts are not enough. You may think when a computer system gets hacked, the problem was the security design or the software.

Ninety percent of the time, a system gets hacked; however, it's not because of a security bug, but because of a simple mistake made by a human. It turns out there are steps we can all take to protect ourselves. Often, your actions not only impact the security of your own data and computer, but the security of everyone at your school, workplace, and home. With billions or trillions of dollars at stake, cyber criminals get smarter each year and we all need to keep [Music] up.

More Articles

View All
Lunar eclipses | The Earth-sun-moon system | Middle school Earth and space science | Khan Academy
Have you ever seen the full moon appear to change from this to this to this all in a couple hours? If so, you’ve witnessed a lunar eclipse. The word eclipse comes from a Greek word meaning “to leave.” For centuries, people have marveled that a full moon …
The 5 Investing Strategies to make the MOST Money
What’s up, you guys? It’s Graham here. So I think it’s pretty obvious if you invest your money, you want to make as much money back as you possibly can. Because there’s so many different ways to invest, I want to focus on the most important points that ar…
10 BAD@SS Online Games!
[Music] It’s fun to dress up your elf princess. But if you’re looking for an online game that’ll put some hair on your chest, let’s take a look at 10 incredibly badass online games. First, Mechanical Commando, a top-down shooter that asks, why would you …
Simple redox reactions | Chemistry | Khan Academy
You have probably heard about this word: oxidation, oxidizing, or antioxidants, and stuff like that. But what exactly does it mean, and what can you do knowing about it? Well, let’s find out. Oxidation has the word oxygen in it; you can see that, right? …
Photographing America’s Wounded Soldiers in Iraq | Nat Geo Live
In 2004, I got a call from LIFE magazine. They said we have this incredible assignment for you. It’s to photograph the wounded coming out of Fallujah. When we flew in, this is one of the first scenes I saw. This is on my birthday in 2004, and it was durin…
Are Helicopters Gyroscopes? - Smarter Every Day 48
Hey, it’s me, Destin. Welcome to Smarter Every Day. So, you know you’re in trouble when you have to break out the tinker toys to explain a concept. What are you gonna build? (son) Tinker toy ducks, scrod and rolls over your ham. [??] Good idea. What are …