Cyber Threats and Cyber Security

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ก.พ. 2025

ความคิดเห็น • 23

  • @e-managerial4239
    @e-managerial4239 9 ปีที่แล้ว +1

    It was great topic and sharing. thanks.

  • @AnelorGalor
    @AnelorGalor 9 ปีที่แล้ว +1

    Not all the presenters been very well versed in their presentation, it seemed they failed to have a red line to follow.
    I suggest going for Dan Geer or Blackhat presentations for those wishing to hear it better explained.

    • @darylallen2485
      @darylallen2485 6 ปีที่แล้ว

      I haven't watched yet, but knowing this presentation is from the business school and not the school of engineering, your assessment is what I would expect.

  • @shaungrace9745
    @shaungrace9745 7 ปีที่แล้ว

    Application: mouse pointer position is on computer with no link to net. A gate opens for net to check position of pointer then closes. Person presses a secure green button if computer pointer location equals net examination when it opens gate and closes. Tampering of this gate, or fake gate insert alarms security net world as all gates in every device made in 1 place in world and delivered to every company without being hampered/tampered.
    Mouse pointer just one of many. Could be angle of screen on laptop etc
    Maybe a bounce start....

    • @shaungrace9745
      @shaungrace9745 7 ปีที่แล้ว

      Whoops. Forgot to add, this is for secure system and also business can use seperate per device WiFi (complete seperate) to give back up position if someone cheats and can be found!
      Then business can have security business to have another layer of checking so nobody in business can cheat it. Random check also a must. Hacker cannot know what physicality check is being checked as is human choice kinda

  • @shygirlnow2011
    @shygirlnow2011 9 ปีที่แล้ว +1

    Hacker question:
    How are people able to see me in front of my computer when I don't have a web camera? Is there such a term as ghosting? What the heck is it?

    • @scott22v
      @scott22v 7 ปีที่แล้ว +1

      When they "See" you , it's not necessarily a physical picture of you. they see your location ie ipaddress.

  • @ytarthur
    @ytarthur 11 ปีที่แล้ว

    Registered for CISSP CPE

  • @IsaacSerafino
    @IsaacSerafino 6 ปีที่แล้ว

    Beware of believing people just because they're supposed to be experts. Remember that they are the decision-makers in a system that has all kinds of issues for some reason. ;) A couple of specifics: serious targeted attacks are not new, "the Internet" is not really very new any more today (especially in relation to Information Security), "advanced analytics" based IPS are not necessarily a silver bullet, and, technology versus governance shouldn't be at odds; authorities can more effectively promote security by embracing advancements rather than opposing them.

  • @StreetSmartification
    @StreetSmartification 10 ปีที่แล้ว

    As we are watching this video, Apple Cloud has been hacked..go figure!

  • @louiemalim3394
    @louiemalim3394 7 ปีที่แล้ว +1

    WannaCry 2017......just updating thread

  • @nwachukwuable
    @nwachukwuable 10 ปีที่แล้ว +1

    Guys am not good at math, do you think i can do the Cyber Security?

    • @StreetSmartification
      @StreetSmartification 10 ปีที่แล้ว

      You can major in Cyber Security but you will encounter a whole bunch of Mathematics equation like and programming as well. You can give it a shot, but talk to an advisor before you take a plunge in the world of Cyber Security.

    • @ericnewbury4900
      @ericnewbury4900 10 ปีที่แล้ว +4

      You'll be fine if you work hard and have an average amount of intelligence. Don't listen to Bond, you're not going to run into too many 'mathematics equation', o_0. It really depends on what KIND of cyber security you can do, but you don't need to be a mathematician by any means.

    • @n1cklback477
      @n1cklback477 9 ปีที่แล้ว +1

      +Eric Newbury Thanks for this. Reassures me as I embark on a masters in Cyber Security in the UK 👍

    • @ericnewbury4900
      @ericnewbury4900 9 ปีที่แล้ว +4

      You'll be fine. You'll realize pretty quick that most of the domains have to do with access controls, authentication schemes, implementation, business continuity, remediation practices, etc. All of which have absolutely no math aside from that which you need to buy your coffee on your way to work.

    • @n1cklback477
      @n1cklback477 9 ปีที่แล้ว

      +Eric Newbury Haha. All these terms should make sense soon. Thanks for the encouragement. Anything else I should know? What's your experience in Cyber security? 👍

  • @robdajudge
    @robdajudge 6 ปีที่แล้ว

    unprepared vast amount talking without giving any precise information, where are the processes to combat attacks? the methods of attacks?

  • @fernandocortes1187
    @fernandocortes1187 4 ปีที่แล้ว

    41:40 por usee used to hack