1 00:00:10,230 --> 00:00:12,570 Let's begin with cyber security. 2 00:00:13,620 --> 00:00:20,160 In this module of fundamentals of cyber security, we will see what is the definition of security. 3 00:00:20,760 --> 00:00:28,050 We will also see the importance of cyber security and why do we need security in our day to day life. 4 00:00:28,560 --> 00:00:30,100 So let us begin. 5 00:00:31,140 --> 00:00:33,490 So why do we need security? 6 00:00:33,780 --> 00:00:36,330 But before that, what is security? 7 00:00:37,720 --> 00:00:41,920 In today's world, security has become a challenging task. 8 00:00:42,670 --> 00:00:51,060 Security mostly refers to the protection from hostile forces, but it has a wide range of other cancers. 9 00:00:52,030 --> 00:00:59,350 Every individual is concerned about his privacy due to the rapid growth in the information technology 10 00:00:59,350 --> 00:01:03,400 industry, the need for security is also increasing. 11 00:01:04,840 --> 00:01:12,190 Security also refers to the measures that are taken to protect a place or to ensure that only people 12 00:01:12,190 --> 00:01:15,820 with permission can enter it or access it. 13 00:01:17,070 --> 00:01:20,550 So what do you like your friends to have access to your mobile? 14 00:01:21,570 --> 00:01:23,500 The clear answer is no. 15 00:01:23,850 --> 00:01:29,610 And that is what you have set a password to your mobile, which is just known to you. 16 00:01:31,000 --> 00:01:38,500 Also, do you want your data to be protected against security attacks and here the obvious answer is 17 00:01:38,500 --> 00:01:38,950 yes. 18 00:01:40,000 --> 00:01:48,190 You don't want a stranger or an intruder to have access to data or he or she might targeting. 19 00:01:50,940 --> 00:01:54,900 The next question is, do we really need cyber security? 20 00:01:55,740 --> 00:01:59,580 OK, so let's face it, we live in a digital world. 21 00:02:00,500 --> 00:02:08,450 Our work lives, personal lives and finances have all begin gravitating towards the world of Internet, 22 00:02:09,020 --> 00:02:11,840 mobile computing and electronic media. 23 00:02:12,950 --> 00:02:17,890 Wide use of the Internet has increased the cyber crimes exponentially. 24 00:02:19,050 --> 00:02:27,720 Unfortunately, this widespread use makes us more vulnerable than ever to malicious attacks, invasions 25 00:02:27,720 --> 00:02:31,760 of privacy, fraud and other such complications. 26 00:02:33,060 --> 00:02:40,220 And that is why cyber security is such a vital part of secure and well-ordered digital world. 27 00:02:41,440 --> 00:02:49,300 Risk based security, a cyber security firm revealed that shocking seven point nine billion records 28 00:02:49,660 --> 00:02:51,790 have been exposed by data breaches. 29 00:02:52,570 --> 00:02:56,210 Well, your record could be one of them, right? 30 00:02:56,240 --> 00:02:57,480 Have you ever thought of that? 31 00:02:58,120 --> 00:03:03,460 And that is why we need cyber security to keep confidential data secure. 32 00:03:05,030 --> 00:03:13,010 Cybersecurity ventures, another cybersecurity firm, predicted that in 2017, the damages would hit 33 00:03:13,160 --> 00:03:20,390 six trillion dollars by 2021 and 10 trillion dollars by 2030. 34 00:03:21,170 --> 00:03:23,000 Isn't that a massive amount? 35 00:03:24,100 --> 00:03:32,260 Right, the main aim or the main motive of these attacks is to affect financial sectors and health care 36 00:03:32,260 --> 00:03:32,840 sectors. 37 00:03:34,360 --> 00:03:37,870 Now let us see the different types of computer security. 38 00:03:39,140 --> 00:03:46,670 There are various types, numerous types of security force being the network security, it is the practice 39 00:03:47,030 --> 00:03:53,650 of securing a computer network from intruders with the targeted attackers or opportunistic malicious 40 00:03:54,710 --> 00:03:55,940 network engineers. 41 00:03:56,390 --> 00:04:00,120 Network administrators look into this security part. 42 00:04:01,190 --> 00:04:03,380 Next comes information security. 43 00:04:04,290 --> 00:04:11,880 It protects the integrity and privacy of your data, your messages, your videos, your photos and ET. 44 00:04:13,730 --> 00:04:21,560 The most important is the application security, if the application is not secure, how would it prevent 45 00:04:21,800 --> 00:04:23,360 the loss of information? 46 00:04:24,110 --> 00:04:32,870 So application security focuses on keeping software devices free of threats before an application is 47 00:04:32,870 --> 00:04:36,770 deployed onto the Internet or in Plaistow or in App Store. 48 00:04:37,190 --> 00:04:41,210 It first has to pass the application security check. 49 00:04:42,620 --> 00:04:45,920 Then comes a disaster recovery and business continuity. 50 00:04:47,050 --> 00:04:55,060 It defines how an organization should react or respond to a cybersecurity incident or any event that 51 00:04:55,060 --> 00:04:56,810 causes the loss of operations. 52 00:04:57,790 --> 00:05:04,630 They say that experience is the best teacher and this is get to disaster recovery team. 53 00:05:05,200 --> 00:05:08,800 They always learn from the past cybersecurity attacks. 54 00:05:10,750 --> 00:05:13,210 So let us have a quick recap. 55 00:05:14,470 --> 00:05:19,720 We saw the definition of security, then we saw why do we need security? 56 00:05:20,560 --> 00:05:24,880 And we discussed how security is affecting the economy of countries. 57 00:05:25,540 --> 00:05:31,960 And they finally concluded our section with different types of computer security in the next lecture 58 00:05:32,430 --> 00:05:39,850 will see the exact definition of cyber security by various different organizations and standards.