1 00:00:04,980 --> 00:00:11,400 Let us explore the fundamentals of cyber security in this video, we will discuss about the types of 2 00:00:11,400 --> 00:00:15,800 actors who play a major role in various types of attacks in the cyber world. 3 00:00:18,560 --> 00:00:25,880 First is darker before discussing darker, we will discuss the definition of hacking, hacking refers 4 00:00:25,880 --> 00:00:32,090 to activities that seek to compromise digital devices such as computers, smartphones, tablets and 5 00:00:32,090 --> 00:00:33,500 even entire networks. 6 00:00:33,920 --> 00:00:37,220 And with hacking might not always be for malicious purposes. 7 00:00:37,520 --> 00:00:44,150 Nowadays, most references to hacking and hackers characterize them as unlawful activity by cyber criminals 8 00:00:44,810 --> 00:00:51,110 motivated by financial gain, protest, information gathering, spying and even just for fun of the 9 00:00:51,110 --> 00:00:51,620 challenge. 10 00:00:53,150 --> 00:01:00,590 Hackers are the artists, computer addicts, challenge seekers, creators, and sometimes for good destroyer's. 11 00:01:01,850 --> 00:01:07,290 All the online transactions, bill payments and all that stuff are possible because of them. 12 00:01:08,210 --> 00:01:11,780 The media has mixed up the word hackers with cracker's. 13 00:01:12,840 --> 00:01:19,180 Crackers are the ones who do that nuisance, they basically have lack of knowledge in the field and 14 00:01:19,180 --> 00:01:23,370 to present themselves as Hekker to avoid the crack in the computer systems. 15 00:01:24,650 --> 00:01:27,450 Hackers are the smartest guys in the field of computers. 16 00:01:28,100 --> 00:01:32,000 They have more knowledge and information than those who develop a software or system. 17 00:01:32,210 --> 00:01:37,910 Hackers are the visionaries who could see new ways to use computers, creating programs that no one 18 00:01:37,910 --> 00:01:38,930 else could conceive. 19 00:01:39,890 --> 00:01:45,140 They were the pioneers of computer industry, building everything from small applications to operating 20 00:01:45,140 --> 00:01:50,930 systems, like if something is made by a human brain, it can also be hacked by human brain. 21 00:01:52,050 --> 00:01:57,390 Hacking is typically technical in nature, like creating malware, tracing their deposits, malware 22 00:01:57,390 --> 00:02:00,450 in a drive by attack, requiring no user interaction. 23 00:02:01,020 --> 00:02:07,290 But hackers can also use psychological trick users into clicking onto malicious attachment and providing 24 00:02:07,290 --> 00:02:08,130 personal data. 25 00:02:08,640 --> 00:02:11,100 These tactics are referred to as social engineering. 26 00:02:11,520 --> 00:02:13,230 Therefore, time is the key. 27 00:02:13,560 --> 00:02:16,920 Next is the cyber terrorist and cyber terrorism. 28 00:02:18,150 --> 00:02:24,690 Cyber terrorism is the use of Internet based attacks and terrorist activities, including acts of deliberate, 29 00:02:24,870 --> 00:02:30,870 large scale disruption of computer networks, especially of personal computers attached to the Internet 30 00:02:31,020 --> 00:02:38,940 by the means of tools such as computer viruses, cyber terrorism itself, a controversial term, some 31 00:02:38,940 --> 00:02:44,340 other issues, a very narrow definition relating to deployments by the known terrorist organizations 32 00:02:44,490 --> 00:02:50,310 regarding disruption of attacks against information systems for the primary purpose of creating alarm 33 00:02:50,310 --> 00:02:50,940 and panic. 34 00:02:52,000 --> 00:02:57,750 By this narrow definition, it is difficult to identify any instance instances of cyberterrorism. 35 00:02:58,300 --> 00:03:01,210 The term was first coined in 1994. 36 00:03:03,010 --> 00:03:08,890 It differs from traditional tourism because of its ability to gain leverage from person, group or government 37 00:03:08,890 --> 00:03:14,380 of computer information in order to cause physical damage or harm or to blackmail or target. 38 00:03:15,070 --> 00:03:21,730 Nevertheless, just as traditional terrorism, cyber terrorism causes a net loss of property and terror 39 00:03:21,730 --> 00:03:29,500 in people's mind, cyber terrorism also involves worldwide economic chaos and environmental damage back 40 00:03:29,500 --> 00:03:30,640 in critical systems. 41 00:03:32,490 --> 00:03:35,850 Cyber terrorism is the convergence of cyberspace and terrorism. 42 00:03:36,710 --> 00:03:43,100 It refers to unlawful acts or threats against computers, networks and information stored within the. 43 00:03:44,490 --> 00:03:52,380 Areas of cyber terrorism are like fishing, what rolling ransomware scanning next is the hacktivism, 44 00:03:53,280 --> 00:03:56,490 it is derived from combining the words hack and activism. 45 00:03:57,060 --> 00:04:03,240 Hacktivism is the act of hacking or breaking into computer system for politically or socially motivated 46 00:04:03,240 --> 00:04:03,890 purposes. 47 00:04:04,560 --> 00:04:08,580 The individual who performs an act of activism is said to be activist. 48 00:04:09,450 --> 00:04:15,540 Logically, I can say that hacktivism may be described as the falling of uncultured members of the society 49 00:04:15,930 --> 00:04:21,390 who are want to make the environment unclean and who are capable for feeling the fear in the heart of 50 00:04:21,390 --> 00:04:27,780 innocent humanity, common targets for activists in government agencies, multinational corporations 51 00:04:27,840 --> 00:04:31,080 or any other entity perceived as bad or wrong. 52 00:04:31,080 --> 00:04:37,560 But hacktivist group or individual, of course, gaining unauthorized access to any organization's assets 53 00:04:37,710 --> 00:04:42,330 to such activities is a criminal act, no matter what the intention might be. 54 00:04:42,520 --> 00:04:48,750 Activism is part when individuals or groups perception of what they consider to be wrong are unjust 55 00:04:48,750 --> 00:04:52,030 and hence incentivizes them to do something about it. 56 00:04:52,910 --> 00:05:00,000 Motivations include revenge, political or social incentives, ideology, protest, a desire to embarrass 57 00:05:00,000 --> 00:05:05,490 certain organizations or individuals within those organizations, or sometimes sheer vandalism. 58 00:05:06,120 --> 00:05:12,810 In general, hacker groups aim to question, provoke and challenge governments, organizations and companies 59 00:05:12,840 --> 00:05:17,670 who go against their moral position next to the state sponsor attacks. 60 00:05:18,150 --> 00:05:24,380 There is a global chess match between nation states and businesses and various digital organizations. 61 00:05:25,050 --> 00:05:31,110 The result is a state sponsored cyber attacks, which have emerged as one of the prominent threats targeting 62 00:05:31,110 --> 00:05:31,910 companies today. 63 00:05:32,960 --> 00:05:39,260 Backed by the government and funded with the biggest bank rules, state sponsored groups can apply seemingly 64 00:05:39,260 --> 00:05:46,160 limitless resources to achieve their objectives in an age when cybersecurity communities are strapped 65 00:05:46,160 --> 00:05:54,080 by tight budgets and a cybersecurity talent shortage out of 94 cases of cyber attacks reported as financial 66 00:05:54,080 --> 00:05:55,800 crimes since 2007. 67 00:05:56,150 --> 00:06:02,870 The attackers, when 23 of them were believed to be a state sponsor, the majority coming from countries 68 00:06:02,870 --> 00:06:06,320 like Iran, Russia, China and North Korea. 69 00:06:07,830 --> 00:06:14,760 State sponsored actors often have particular objectives aligned with either the political, commercial 70 00:06:14,760 --> 00:06:17,150 or military interests of the country. 71 00:06:18,630 --> 00:06:24,900 Very well, possible state sponsored actors will use standard acting methodology used by other typical 72 00:06:24,900 --> 00:06:27,270 cyber crime actors and penetration testers. 73 00:06:28,800 --> 00:06:34,920 State sponsored actors will really make a lot of noise and cause sufficient disruption to warrant suspicion 74 00:06:35,040 --> 00:06:36,120 or trigger detection. 75 00:06:37,360 --> 00:06:42,820 Their objectives are to remain persistent, to retain oversight of communications or access to sensitive 76 00:06:42,820 --> 00:06:43,160 data. 77 00:06:44,050 --> 00:06:45,340 Next transcript, Killis. 78 00:06:46,430 --> 00:06:51,200 Script kiddies are probably the lowest level of hackers, these hackers. 79 00:06:55,150 --> 00:07:02,290 Next hour, the script kiddies script kids are probably the lowest level of hackers, these hackers 80 00:07:02,530 --> 00:07:05,650 don't create or developed hacking tools by themselves. 81 00:07:06,080 --> 00:07:09,880 They didn't really copy tools and methods from books or the Internet. 82 00:07:10,720 --> 00:07:17,350 As far as I know, names clip critique comes from the idea of younger people who don't know how to grow 83 00:07:17,350 --> 00:07:22,900 the program are just keeping the scripts that other people have already made and tried to hack with 84 00:07:22,900 --> 00:07:23,200 them. 85 00:07:24,490 --> 00:07:28,150 For example, imagine a child gets their first computer. 86 00:07:28,810 --> 00:07:34,990 The child watches a movie about hacking and then downloads a copy of Linux to begin playing with the 87 00:07:34,990 --> 00:07:38,150 various programs while searching for online tutorials. 88 00:07:39,010 --> 00:07:44,230 The most serious threat a script possesses is through the use of social engineering techniques. 89 00:07:45,190 --> 00:07:49,690 A script kiddie lacks the knowledge to create software or exploit vulnerabilities. 90 00:07:50,110 --> 00:07:55,690 To compensate, they often turn to social engineering in order to manipulate the victims into granting 91 00:07:55,690 --> 00:07:57,440 access or sharing information. 92 00:07:58,720 --> 00:08:02,650 Ethical hacking is not the same thing as a scripted script. 93 00:08:02,650 --> 00:08:08,650 Kiddies are essentially just people who think they can hack and only a very small amount of information. 94 00:08:09,250 --> 00:08:12,390 Let us have a quick recap of what we learned in this lecture. 95 00:08:13,060 --> 00:08:20,890 We studied five types of actors hackers, cyber terrorists, terrorism, state sponsored actors and 96 00:08:20,890 --> 00:08:21,730 script kiddies. 97 00:08:23,280 --> 00:08:29,010 In the next lecture, we will explore two types of attacks is to attack, attack, to attack.