Cybersecurity: Crash Course Computer Science #31
Cybersecurity: Crash Course Computer Science #31
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.
Check out Computerphile’s wonderful video on how to choose a password!
Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/products/computer-science-coasters
Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios
Want to know more about Carrie Anne?
https://about.me/carrieannephilbin
The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV
Want to find Crash Course elsewhere on the internet?
Facebook – https://www.facebook.com/YouTubeCrash…
Twitter – http://www.twitter.com/TheCrashCourse
Tumblr – http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids
link in the dooblydoo?
And like jedi and Republic the cyber security are bad guys
Talking Too Fast…
Thank you
Lol I just mentioned brute force hacking in a earlier video were you were describing brute coding XD
Good topic explanation
I cant believe they guessed my pin
Brilliant and easy to understand! Thank you! Even the jokes are funny. XD
Carrie Anne keep it real. No access to ATMs or she’ll take all of it xD
Can you do something in gadgets like The Titan security keys & yubico ect – they seem like a brilliant idea ( unless you allready have )
i like your video because it is my lesson , please explain more with use pictures exemples direct …it is my lesson
Last
i LOVE CARRIE ANN HER REFERENCES ARE SO COOL FROM GAMING TO PETS TO MOVIES EVERYTHING!!!!!!!!!!!!!!
Brb I’mma add all the words from the dictionary to my password.
thanks. Very useful
Interesting
You’re killing me with the "I’d take it ALL" ATM comment. I’m sitting here dying!
Maybe using chinese symbols for the password would be a nice improvement. There are thousands of them, they are shorter then western words and you can’t misspell them. Say something like ‘GoatHeart老王Apricot’
Just love going back from time to time to watch some of this amazing course episodes!
What is the website she is using 2:04?
interesting you explain with direct with pictures … i need lesson computer science
light side?
I work in security and I approve this message. Excellent video!
7:04 and what if an attacker compromises your fingers? 😮
That’s why you use rainbow tables and not brute forcing.
9:52 – If you’re interested in security kernels, look up seL4. It’s a microkernel with formal proofs of implementation correctness and certain security features.
5:09 she looks hella cute
I have a 9 digit ascii Rainbow table. Special characters don’t matter to me… 🤓
Democrats don’t want security!
20176117
1ghz processor needing 10clock cycles per try needs 1/10000s to bruteforce ALL 4digit Pins!
hi
it is good with pictures your video so not only talk expain which makes boring …..i like your video if with use pictures to explain computer science.
This was really well done. Thanks!
Except the Jedi were evil. They let Darth Vader rise
"Cyber Security is like the Jedi Order trying to bring Peace and Justice to the Cyberverse" *Decides to go back to school and study Cyber Security*
You just lifted a riddle to me: Jedis are the protectors of peace and justice, the warriors of light. Whats the only condition in which you’ll ever experience peace and justice? Yup, you got it. Warriors of death, thats what they are. Thats why Anakin was too old, he had already had his taste of life when he was introduced to the order.
“What happens if a hacker compromises your fingerprint data.” Who else thought she was gonna say “what happens if a hacker cuts your finger off.”
Thank you.
She speaks too fast and then she’s British
The hot how to Alta or study my other upset upset
Damn, now I have to change my PIN…
0:18 Legendary bike Favorit.
I am watching this because it support Korean subtitle
a damn now i have to change my pin code
kid John went BAZUKA.. Kid hank is kwl.
the creeper is back
nice program
Computers are not secure on open networks or closed networks so why waste money protecting or pretending they are? Create a fake system with fake information and everything else on paper and let corrupt countrys waste money on fake spies.
1:50 “that shows who your enemy is.” *shows a little girl on her computer*
A formidable foe.