Cyber attacks are a reality for modern businesses. In this video, learn what attacks are and why attackers are motivated to attack in this way.
- [Instructor] When we see hackers described in the media … and fiction, they're often described … as quiet, anarchistic geniuses. … It's the trope of the young person in the hoodie … who can do literally anything with a computer. … The reality is that, while there are some people … enjoying taking software apart just to see how it works, … those types of hobbyist hackers are few and far between. … Now those hobbyists are being financially incentivized … to chase bug bounties instead. … So, when we talk about attackers … in the cybersecurity industry, … we're most often talking about varying degrees … of organized crime. … Those people are running businesses, … those businesses just happen to be illegal. … So, let's have a look at an overview … of what motivates attackers. … In general, they're looking for assets that have high value, … the biggest return on their investment. … Some of that value might come from the persistence … of their exploitation of the IT system. … If they can't be detected, then they have the resources …
- Recognize how business and technology together create a supply chain cybersecurity problem.
- Identify how cybersecurity defines and maintains boundaries.
- Analyze how common cybersecurity practices compare to supply chain security issues.
- Give examples of how cybersecurity is implemented throughout an organization.
- Differentiate between prescriptive-based requirements and goal-based cybersecurity, with an identified supply chain risk.
- Provide evidence for why communicating about cybersecurity between businesses can be daunting.