Cybersecurity: Crash Course Computer Science #31

Cybersecurity: Crash Course Computer Science #31

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.

Check out Computerphile’s wonderful video on how to choose a password!

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/products/computer-science-coasters

Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV

Want to find Crash Course elsewhere on the internet?
Facebook – https://www.facebook.com/YouTubeCrash…
Twitter – http://www.twitter.com/TheCrashCourse
Tumblr – http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

50 Comments

  1. Pew DiePie on February 4, 2020 at 9:28 pm

    link in the dooblydoo?



  2. Jai Parwani on February 4, 2020 at 9:30 pm

    And like jedi and Republic the cyber security are bad guys



  3. CodeLife on February 4, 2020 at 9:30 pm

    Talking Too Fast…



  4. Danial Raza on February 4, 2020 at 9:30 pm

    Thank you



  5. Rik DeBacco on February 4, 2020 at 9:31 pm

    Lol I just mentioned brute force hacking in a earlier video were you were describing brute coding XD



  6. Abdulrahman AlQarni on February 4, 2020 at 9:32 pm

    Good topic explanation



  7. GoatzAreEpic Maokai on February 4, 2020 at 9:32 pm

    I cant believe they guessed my pin



  8. Lili Von Shtupp on February 4, 2020 at 9:32 pm

    Brilliant and easy to understand! Thank you! Even the jokes are funny. XD



  9. Deft iLLuZion on February 4, 2020 at 9:32 pm

    Carrie Anne keep it real. No access to ATMs or she’ll take all of it xD



  10. Peter Stefanovic on February 4, 2020 at 9:33 pm

    Can you do something in gadgets like The Titan security keys & yubico ect – they seem like a brilliant idea ( unless you allready have )



  11. Mince Wati Simatupang on February 4, 2020 at 9:37 pm

    i like your video because it is my lesson , please explain more with use pictures exemples direct …it is my lesson



  12. Pablo Spinola on February 4, 2020 at 9:38 pm

    Last



  13. Black Satoshi on February 4, 2020 at 9:40 pm

    i LOVE CARRIE ANN HER REFERENCES ARE SO COOL FROM GAMING TO PETS TO MOVIES EVERYTHING!!!!!!!!!!!!!!



  14. CUTEPOTATO26 PLAYS & VLOGS on February 4, 2020 at 9:41 pm

    Brb I’mma add all the words from the dictionary to my password.



  15. Geet Bhardwaj on February 4, 2020 at 9:43 pm

    thanks. Very useful



  16. Pureroute on February 4, 2020 at 9:44 pm

    Interesting



  17. Marc Bellucci on February 4, 2020 at 9:44 pm

    You’re killing me with the "I’d take it ALL" ATM comment. I’m sitting here dying!



  18. andarted on February 4, 2020 at 9:45 pm

    Maybe using chinese symbols for the password would be a nice improvement. There are thousands of them, they are shorter then western words and you can’t misspell them. Say something like ‘GoatHeart老王Apricot’



  19. Muhammad Ahmed on February 4, 2020 at 9:45 pm

    Just love going back from time to time to watch some of this amazing course episodes!



  20. Jennifer Wood on February 4, 2020 at 9:46 pm

    What is the website she is using 2:04?



  21. Mince Wati Simatupang on February 4, 2020 at 9:51 pm

    interesting you explain with direct with pictures … i need lesson computer science



  22. Inno Dominic Ramos on February 4, 2020 at 9:51 pm

    light side?



  23. Keith Makan on February 4, 2020 at 9:51 pm

    I work in security and I approve this message. Excellent video!



  24. Kenneth Burchfiel on February 4, 2020 at 9:51 pm

    7:04 and what if an attacker compromises your fingers? 😮



  25. SNKRhead Games on February 4, 2020 at 9:54 pm

    That’s why you use rainbow tables and not brute forcing.



  26. Saeed Baig on February 4, 2020 at 9:54 pm

    9:52 – If you’re interested in security kernels, look up seL4. It’s a microkernel with formal proofs of implementation correctness and certain security features.



  27. Tyler Findlay on February 4, 2020 at 9:58 pm

    5:09 she looks hella cute



  28. SNKRhead Games on February 4, 2020 at 9:58 pm

    I have a 9 digit ascii Rainbow table. Special characters don’t matter to me… 🤓



  29. intbild on February 4, 2020 at 9:59 pm

    Democrats don’t want security!



  30. Mohamed Dessouki on February 4, 2020 at 10:00 pm

    20176117



  31. 이주연 on February 4, 2020 at 10:02 pm

    1ghz processor needing 10clock cycles per try needs 1/10000s to bruteforce ALL 4digit Pins!



  32. James Newcombe on February 4, 2020 at 10:03 pm

    hi



  33. Mince Wati Simatupang on February 4, 2020 at 10:08 pm

    it is good with pictures your video so not only talk expain which makes boring …..i like your video if with use pictures to explain computer science.



  34. R S on February 4, 2020 at 10:08 pm

    This was really well done. Thanks!



  35. Joseph Sachs on February 4, 2020 at 10:09 pm

    Except the Jedi were evil. They let Darth Vader rise



  36. Liam McGregor on February 4, 2020 at 10:11 pm

    "Cyber Security is like the Jedi Order trying to bring Peace and Justice to the Cyberverse" *Decides to go back to school and study Cyber Security*



  37. Fleisch Berg on February 4, 2020 at 10:11 pm

    You just lifted a riddle to me: Jedis are the protectors of peace and justice, the warriors of light. Whats the only condition in which you’ll ever experience peace and justice? Yup, you got it. Warriors of death, thats what they are. Thats why Anakin was too old, he had already had his taste of life when he was introduced to the order.



  38. Brandon Ginkel on February 4, 2020 at 10:12 pm

    “What happens if a hacker compromises your fingerprint data.” Who else thought she was gonna say “what happens if a hacker cuts your finger off.”



  39. Cuddy-2M on February 4, 2020 at 10:15 pm

    Thank you.



  40. wachira david on February 4, 2020 at 10:15 pm

    She speaks too fast and then she’s British



  41. Abe K on February 4, 2020 at 10:16 pm

    The hot how to Alta or study my other upset upset



  42. Luke C on February 4, 2020 at 10:16 pm

    Damn, now I have to change my PIN…



  43. pocketlll on February 4, 2020 at 10:16 pm

    0:18 Legendary bike Favorit.



  44. teemo on February 4, 2020 at 10:17 pm

    I am watching this because it support Korean subtitle



  45. Wayne Kijiner on February 4, 2020 at 10:19 pm

    a damn now i have to change my pin code



  46. Mario Francis Gomez on February 4, 2020 at 10:19 pm

    kid John went BAZUKA.. Kid hank is kwl.



  47. Artem Zagaynov on February 4, 2020 at 10:20 pm

    the creeper is back



  48. Mince Wati Simatupang on February 4, 2020 at 10:23 pm

    nice program



  49. da ne on February 4, 2020 at 10:23 pm

    Computers are not secure on open networks or closed networks so why waste money protecting or pretending they are? Create a fake system with fake information and everything else on paper and let corrupt countrys waste money on fake spies.



  50. Spicy Cat on February 4, 2020 at 10:23 pm

    1:50 “that shows who your enemy is.” *shows a little girl on her computer*

    A formidable foe.