Join Steve Maciejewski for an in-depth discussion in this video Changing landscape, part of Cybersecurity Awareness: Security Overview.
- [Instructor] What are today's threats, and how have they evolved? Let's cover some of the history of cyber crimes and cyber threats, and how they have grown in sophistication. In the past you had a few isolated criminals, and the ever popular script kiddie to worry about. They stumbled through the internet, and they were looking for targets of opportunity. What can they see, what can they get? What can they look at? Their typical action was to deface a website, capture the flag kind of activity. But not so for today's criminals and today's threats. Today's perpetrators of cyber crimes are very focused.
They're in it for gain, financial, monetary gain. When you look at it, they have some very complex tools, and they have scripts that have been developed and sold for profit around the world. Welcome to the darknet where everything can be bought and sold, credit cards, social security numbers, health records, crack software, even application and scripts for hacking all for sale. Crimes are no longer perpetrated by the individual looking for something to do. Attacks today are very sophisticated and target for reasons of gain. We have recently experienced a quantum leap forward in the level of technology that can be used in these attacks.
How did that happen?
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Prioritize the various kinds of external cyber threats and their sources.
- Recognize the most severe implications of a cybersecurity breach.
- Review what makes Stuxnet dangerous.
- Identify the focus of groups like Morpho or Wild Neutron.
- Explore the steps of a typical cyber attack.