Cyber Threats and Cyber Security

Поделиться
HTML-код
  • Опубликовано: 15 сен 2024

Комментарии • 23

  • @e-managerial4239
    @e-managerial4239 8 лет назад +1

    It was great topic and sharing. thanks.

  • @shygirlnow2011
    @shygirlnow2011 9 лет назад +1

    Hacker question:
    How are people able to see me in front of my computer when I don't have a web camera? Is there such a term as ghosting? What the heck is it?

    • @scott22v
      @scott22v 7 лет назад +1

      When they "See" you , it's not necessarily a physical picture of you. they see your location ie ipaddress.

  • @AnelorGalor
    @AnelorGalor 9 лет назад +1

    Not all the presenters been very well versed in their presentation, it seemed they failed to have a red line to follow.
    I suggest going for Dan Geer or Blackhat presentations for those wishing to hear it better explained.

    • @darylallen2485
      @darylallen2485 5 лет назад

      I haven't watched yet, but knowing this presentation is from the business school and not the school of engineering, your assessment is what I would expect.

  • @shaungrace9745
    @shaungrace9745 6 лет назад

    Application: mouse pointer position is on computer with no link to net. A gate opens for net to check position of pointer then closes. Person presses a secure green button if computer pointer location equals net examination when it opens gate and closes. Tampering of this gate, or fake gate insert alarms security net world as all gates in every device made in 1 place in world and delivered to every company without being hampered/tampered.
    Mouse pointer just one of many. Could be angle of screen on laptop etc
    Maybe a bounce start....

    • @shaungrace9745
      @shaungrace9745 6 лет назад

      Whoops. Forgot to add, this is for secure system and also business can use seperate per device WiFi (complete seperate) to give back up position if someone cheats and can be found!
      Then business can have security business to have another layer of checking so nobody in business can cheat it. Random check also a must. Hacker cannot know what physicality check is being checked as is human choice kinda

  • @ytarthur
    @ytarthur 11 лет назад

    Registered for CISSP CPE

  • @IsaacSerafino
    @IsaacSerafino 6 лет назад

    Beware of believing people just because they're supposed to be experts. Remember that they are the decision-makers in a system that has all kinds of issues for some reason. ;) A couple of specifics: serious targeted attacks are not new, "the Internet" is not really very new any more today (especially in relation to Information Security), "advanced analytics" based IPS are not necessarily a silver bullet, and, technology versus governance shouldn't be at odds; authorities can more effectively promote security by embracing advancements rather than opposing them.

  • @louiemalim3394
    @louiemalim3394 7 лет назад +1

    WannaCry 2017......just updating thread

  • @StreetSmartification
    @StreetSmartification 10 лет назад

    As we are watching this video, Apple Cloud has been hacked..go figure!

  • @nwachukwuable
    @nwachukwuable 10 лет назад +1

    Guys am not good at math, do you think i can do the Cyber Security?

    • @StreetSmartification
      @StreetSmartification 10 лет назад

      You can major in Cyber Security but you will encounter a whole bunch of Mathematics equation like and programming as well. You can give it a shot, but talk to an advisor before you take a plunge in the world of Cyber Security.

    • @ericnewbury4900
      @ericnewbury4900 9 лет назад +4

      You'll be fine if you work hard and have an average amount of intelligence. Don't listen to Bond, you're not going to run into too many 'mathematics equation', o_0. It really depends on what KIND of cyber security you can do, but you don't need to be a mathematician by any means.

    • @n1cklback477
      @n1cklback477 9 лет назад +1

      +Eric Newbury Thanks for this. Reassures me as I embark on a masters in Cyber Security in the UK 👍

    • @ericnewbury4900
      @ericnewbury4900 9 лет назад +4

      You'll be fine. You'll realize pretty quick that most of the domains have to do with access controls, authentication schemes, implementation, business continuity, remediation practices, etc. All of which have absolutely no math aside from that which you need to buy your coffee on your way to work.

    • @n1cklback477
      @n1cklback477 9 лет назад

      +Eric Newbury Haha. All these terms should make sense soon. Thanks for the encouragement. Anything else I should know? What's your experience in Cyber security? 👍

  • @robdajudge
    @robdajudge 6 лет назад

    unprepared vast amount talking without giving any precise information, where are the processes to combat attacks? the methods of attacks?

  • @fernandocortes1187
    @fernandocortes1187 4 года назад

    41:40 por usee used to hack