1 00:00:02,930 --> 00:00:09,570 Welcome this module focuses on popular computer system security myths. 2 00:00:09,620 --> 00:00:14,390 Let's start by reaching back in history to get a better picture of the origins of these false assumptions 3 00:00:16,870 --> 00:00:19,090 PCs turned 30 just recently. 4 00:00:20,880 --> 00:00:29,420 The first 32 bit computer was created in 1980 by AT&T and the first IBM PC was created in 1981. 5 00:00:30,900 --> 00:00:32,210 Why do I mention that. 6 00:00:33,580 --> 00:00:37,650 Notice how often we tend to disregard how much has changed in the past 30 years. 7 00:00:38,960 --> 00:00:46,000 From our perspective 30 years is not a long time but for computer systems this is like dog years 8 00:00:48,890 --> 00:00:54,050 another crucial factor that has turned the world of computer systems or the global network the Internet 9 00:00:54,500 --> 00:00:55,180 on its head. 10 00:00:55,190 --> 00:00:59,080 It's the year 1968. 11 00:00:59,170 --> 00:01:02,400 This was when the Internet research began. 12 00:01:02,460 --> 00:01:03,510 How did it all come about. 13 00:01:03,510 --> 00:01:10,730 Anyway the history of the internet starts with Arpanet a network that joined four computers located 14 00:01:10,730 --> 00:01:12,450 in four different universities. 15 00:01:14,210 --> 00:01:20,470 Arpanet was originally designed for the military Why did Americans invest in researching it. 16 00:01:22,870 --> 00:01:26,920 They lost the race to launch the world's first satellite. 17 00:01:26,920 --> 00:01:29,310 This was 1968. 18 00:01:29,350 --> 00:01:35,400 The fact that they lost the space race to the USSR was a major source of concern and brought up a near 19 00:01:35,400 --> 00:01:38,880 panic in military circles. 20 00:01:38,890 --> 00:01:44,650 The Russians appeared to be more innovative and more knowledgeable and they gained a potentially military 21 00:01:44,650 --> 00:01:49,220 advantage over the US should they defend themselves against it. 22 00:01:51,770 --> 00:01:57,860 Intelligence centers needed to be connected but in order to do this a way of transmitting information 23 00:01:57,860 --> 00:01:59,840 had to be developed to connect them. 24 00:02:02,080 --> 00:02:05,750 Arpanet was strictly military in its origin. 25 00:02:05,890 --> 00:02:14,530 It was not created with users in mind and by users I refer to people that use the Internet today. 26 00:02:14,560 --> 00:02:18,910 This has to be emphasized in this stage of the course. 27 00:02:18,930 --> 00:02:25,500 The net we know today was developed in the 90s the World Wide Web was created only 20 years ago and 28 00:02:25,500 --> 00:02:29,290 its appearance completely changed the way global computer networks have been used. 29 00:02:30,860 --> 00:02:35,420 Another factor that contributed to the creation of computer system security myths which will list in 30 00:02:35,420 --> 00:02:42,470 a minute is the fact that most of us use computer systems to a limited extent to achieve specific goals. 31 00:02:43,710 --> 00:02:48,810 This is similar to having a driver's license and knowing how to drive that car but not understanding 32 00:02:48,810 --> 00:02:51,370 what happens inside when we press the gas pedal. 33 00:02:53,860 --> 00:02:56,610 Using computers can look a lot like that for most of us. 34 00:02:58,020 --> 00:03:05,460 We think we know how to use them well especially teenagers who grew up with computers disability however 35 00:03:05,520 --> 00:03:11,100 doesn't translate to knowing the mechanisms that are hidden under the eyes and the mechanisms that are 36 00:03:11,100 --> 00:03:12,960 relevant for us security. 37 00:03:14,720 --> 00:03:19,950 If you don't know something you're reluctant to admit it. 38 00:03:20,050 --> 00:03:25,470 No one wants to own up to the fact that they accomplished computer tests by shooting in the dark or 39 00:03:25,470 --> 00:03:27,080 only know how to click a mouse. 40 00:03:29,050 --> 00:03:33,940 Instead we will often resort to opinions and stereotypes that have been picked up at home or at school. 41 00:03:36,470 --> 00:03:43,900 These opinions are spread because they are repeated by millions of users not because they're true. 42 00:03:43,910 --> 00:03:50,510 The first myth is you can ensure total protection of your computer system that would be something wouldn't 43 00:03:50,510 --> 00:03:50,920 it. 44 00:03:52,290 --> 00:03:55,360 Unfortunately this is merely a myth for several reasons. 45 00:03:56,840 --> 00:04:01,760 If you wanted your system to be secure you would need to bar users from interacting with it. 46 00:04:03,420 --> 00:04:08,780 You can't be sure whether or not the goals and aims of users are in fact malicious. 47 00:04:08,810 --> 00:04:15,460 So the ideal computer in this scenario doesn't accept any input does not have a mouse or any keyboard 48 00:04:16,360 --> 00:04:22,620 or any port that you could use to plug in a smartphone but it's still possible that this computer safe 49 00:04:22,620 --> 00:04:25,210 and secure from users could still pose a threat. 50 00:04:27,660 --> 00:04:32,700 It could for example have software that although tested sometimes brings up errors that could be exploited 51 00:04:32,700 --> 00:04:34,610 to lower the security of the system. 52 00:04:36,890 --> 00:04:39,980 An intrusion or data extraction is a concern here. 53 00:04:41,390 --> 00:04:45,780 This shouldn't ever happen in a fully protected computer system. 54 00:04:45,840 --> 00:04:55,060 The software has to go don't install any programs including operating systems and don't attach any devices 55 00:04:55,060 --> 00:04:56,120 to your computer. 56 00:04:58,630 --> 00:05:01,590 The principle of a secure computer is within reach. 57 00:05:03,400 --> 00:05:05,430 Now it only needs to be physically protected 58 00:05:08,450 --> 00:05:15,230 if it's turned on someone might use it to read data saved on the disks so to secure it physically you 59 00:05:15,230 --> 00:05:20,970 could for example pour cement over it and throw it in the well. 60 00:05:21,020 --> 00:05:28,190 Now you're nearly 100 percent secure though we can't guarantee full certainty your system is useless 61 00:05:29,060 --> 00:05:30,430 but looks secure enough.