1 00:00:10,270 --> 00:00:17,290 Let's continue with getting started with cybersecurity in this lecture, you will learn to describe 2 00:00:17,530 --> 00:00:26,620 what is cybersecurity, then you will see the standard definition of cybersecurity and finally, some 3 00:00:27,100 --> 00:00:31,270 eye opening facts related to security and attacks. 4 00:00:32,830 --> 00:00:34,720 So what is cybersecurity? 5 00:00:35,620 --> 00:00:43,360 In the last lecture, we saw the definition of security, according to Kaspersky, cybersecurity, it 6 00:00:43,360 --> 00:00:51,850 is the practice of defending computers, servers, mobile devices, electronic systems and networks 7 00:00:51,850 --> 00:00:53,260 from malicious attacks. 8 00:00:54,490 --> 00:01:01,450 With the introduction of the computer, the need for automated tools for protecting files and other 9 00:01:01,450 --> 00:01:04,530 information stored on the computer became evident. 10 00:01:05,610 --> 00:01:13,170 This is especially the case for a shared system such as timesharing system, and the need is even more 11 00:01:13,170 --> 00:01:17,700 acute for systems that can be accessed or public telephone network. 12 00:01:19,430 --> 00:01:27,300 Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and 13 00:01:27,300 --> 00:01:31,500 data from attacks, damage or unauthorized access. 14 00:01:34,740 --> 00:01:42,990 These are the standard definitions, according to NIST, that is National Institute of Standards and 15 00:01:42,990 --> 00:01:44,910 Technology United States. 16 00:01:45,660 --> 00:01:55,140 They define cyber security as the protection of information systems from unauthorized access use, disclosure, 17 00:01:55,470 --> 00:02:05,040 disruption, modification or destruction in order to provide confidentiality, integrity and availability. 18 00:02:06,060 --> 00:02:13,830 Confidentiality, integrity and availability are the three terms of the information security element. 19 00:02:14,470 --> 00:02:21,040 We will explore these stones in upcoming lectures, according to the government of the United Kingdom. 20 00:02:21,850 --> 00:02:30,780 Cybersecurity is the application of technologies, processes and controls to protect systems, networks, 21 00:02:31,140 --> 00:02:34,260 programs and data from cyber attacks. 22 00:02:35,190 --> 00:02:42,960 If you observe closely to these definitions, you may find out one common thing that is protection of 23 00:02:42,960 --> 00:02:48,300 something from something using computer technology. 24 00:02:49,110 --> 00:02:52,140 And that is nothing but cybersecurity. 25 00:02:55,230 --> 00:03:01,860 Here, here are some things that you shouldn't really understand before actually learning concepts, 26 00:03:03,060 --> 00:03:09,660 68 percent of the business leaders feel their cybersecurity risks are increasing. 27 00:03:10,770 --> 00:03:18,360 Worldwide spending on cybersecurity is forecasted to reach one thirty three point seven billion dollars. 28 00:03:19,950 --> 00:03:28,020 As we have seen in the last lecture about the disk based data breaches, we can see that ninety seven 29 00:03:28,020 --> 00:03:30,090 point nine records were exposed to. 30 00:03:32,060 --> 00:03:39,560 The top malicious attachments are dot, dot, dot, dot, dot, so which means that even if you have 31 00:03:39,590 --> 00:03:44,860 received an e-mail which consist of dot, dot, file, it may be a virus. 32 00:03:45,530 --> 00:03:51,800 So you have to actually have the knowledge before downloading a thing from any random source. 33 00:03:54,780 --> 00:03:56,200 This is more terrifying. 34 00:03:56,880 --> 00:04:04,800 Hackers attack every 39 seconds, which means between our lecture, they must have attacked five times, 35 00:04:05,790 --> 00:04:09,020 which is equivalent to average 2000 times a day. 36 00:04:10,440 --> 00:04:15,730 64 percent of Americans have never checked to see if they're affected by data breach. 37 00:04:16,410 --> 00:04:21,150 I mean, and this is why people need to understand cybersecurity. 38 00:04:22,710 --> 00:04:31,070 In 2018, Under Armour reported that it's my fitness pal was hacked, affecting 150 million users. 39 00:04:31,800 --> 00:04:34,410 Now, not a fitness app is hacked. 40 00:04:34,420 --> 00:04:39,480 They get to know everything about the diseases and again, you know, diseases than if they have any 41 00:04:39,480 --> 00:04:43,950 dietary restrictions, the accounts, the names, passwords, everything. 42 00:04:44,820 --> 00:04:46,440 And this can be devastating. 43 00:04:48,000 --> 00:04:53,850 So in this lecture, we saw what is the definition of cyber security. 44 00:04:54,720 --> 00:04:57,660 We also saw the standard definition of security. 45 00:04:58,230 --> 00:05:01,660 And at the end we saw some interesting facts. 46 00:05:01,680 --> 00:05:10,710 And I hope these facts have opened an eye and it's time to start learning about security in the next 47 00:05:10,710 --> 00:05:11,180 lecture. 48 00:05:11,520 --> 00:05:16,130 We will see then was the first cyber attack carried out in this world. 49 00:05:16,620 --> 00:05:21,480 So let us study the history and applications of cybersecurity.