1 00:00:00,330 --> 00:00:01,560 It was a Taxin. 2 00:00:02,820 --> 00:00:10,500 We saw that Elliott is brought in to stop the US attack, so he discovered that the attack is a vehicle 3 00:00:10,500 --> 00:00:16,110 for more serious attack, which is a crude attack, or would get program activity, sort of malicious 4 00:00:16,110 --> 00:00:19,320 program that hides its presence within the system. 5 00:00:20,370 --> 00:00:25,630 And it grants that cyber criminal privileged access to a computer or network. 6 00:00:25,860 --> 00:00:29,530 So in this case, the attack threatens to infect multiple E. 7 00:00:29,550 --> 00:00:30,320 Corp servers. 8 00:00:30,670 --> 00:00:32,900 Right now, they do us a tech scene. 9 00:00:33,300 --> 00:00:34,620 Is it real or accurate? 10 00:00:34,830 --> 00:00:36,480 Is this hack Boston in real life? 11 00:00:36,750 --> 00:00:45,480 Now, I want to say yes, because the OS or the OS attack actually is a real life and it happens commonly 12 00:00:46,200 --> 00:00:50,820 and it is one of the most dangerous attacks that have been in the cyber world. 13 00:00:51,000 --> 00:00:53,040 So is it accurate to 100 percent? 14 00:00:53,070 --> 00:00:58,740 No, I will not say it is 100 percent accurate because the tools that are used in the show or some of 15 00:00:58,740 --> 00:01:05,040 the techniques are not accurate 100 percent or the commands actually used in the terminal are not really. 16 00:01:06,070 --> 00:01:12,640 Or maybe if they have their own commands for this specific server or their own operating system. 17 00:01:12,670 --> 00:01:13,870 Now, this is another story. 18 00:01:14,200 --> 00:01:14,650 All right. 19 00:01:14,960 --> 00:01:21,910 OK, now here in this scene, in this situation, we will learn what is added to us attack and how added 20 00:01:21,910 --> 00:01:26,020 to US attack works and how to identify any device attack. 21 00:01:26,350 --> 00:01:28,980 What is added to us botnet? 22 00:01:29,140 --> 00:01:30,170 What is the botnet? 23 00:01:30,880 --> 00:01:37,710 So how this next thing controlled and how to protect from becoming part of a botnet? 24 00:01:38,530 --> 00:01:46,230 I mean, your computer, your Iot devices, smart TVs, whatever, and common device attacks, we would 25 00:01:46,240 --> 00:01:46,720 handle it. 26 00:01:47,350 --> 00:01:48,700 They do us attack tools. 27 00:01:48,700 --> 00:01:52,420 We would see the available known as attack tools. 28 00:01:53,420 --> 00:01:59,800 We will see a famous real life video as attacks that happen and the countermeasure for the US attack. 29 00:02:00,220 --> 00:02:00,730 All right.