1 00:00:00,180 --> 00:00:07,320 Now we will discuss zero day exploit, I think it is a cyber attack that occurs on the same day when 2 00:00:07,320 --> 00:00:09,590 a witness is discovered in US software. 3 00:00:09,990 --> 00:00:15,340 At that point, it's exploded before effects become available from its creator. 4 00:00:15,900 --> 00:00:22,170 Initially, when a user discovers that there is a security risk in a program, they can report it to 5 00:00:22,170 --> 00:00:23,250 the software company. 6 00:00:23,460 --> 00:00:27,120 Their creator develop a security patch to fix the flaw. 7 00:00:27,450 --> 00:00:32,490 This same user may also take to the Internet and warn about the flaw. 8 00:00:33,030 --> 00:00:38,800 Usually, the program creators are quick enough to create a fix that improves programmed protection. 9 00:00:39,000 --> 00:00:44,990 However, sometimes hackers hear about the flaw first and they are quick enough to exploit it. 10 00:00:45,390 --> 00:00:51,630 When this happens, there is little protection against an attack because the software flaw is so. 11 00:00:51,630 --> 00:00:59,970 New organizations at risk from such exploit can employ several means of detection, including using 12 00:00:59,970 --> 00:01:07,680 virtual local area networks land to protect transmitting data by making use of a firewall and using 13 00:01:07,680 --> 00:01:11,880 a secure Wi-Fi system to protect against wireless malware attacks. 14 00:01:12,540 --> 00:01:19,380 Individuals also can minimize the risk while keeping that operating system and software up to date or 15 00:01:19,380 --> 00:01:26,340 by using website with SSL, which means security socket layer, which secure information being sent 16 00:01:26,340 --> 00:01:28,170 between the user and the site.