Facets and realities of cyber security threats | Alexandru Catalin Cosoi | TEDxBucharest

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] that's a lot of love good morning my mission today will be to tell you a few stories real stories about cybersecurity which relates to computers and phones and so on but my dream would be that at the end of the day besides acknowledging that you understood the stories and you'll like them I would like to know that you actually took action on the downsides of cybersecurity and the things that happen for instance you already know who I am I've been introduced Thank You Margaret there's also a section on the website so you already know my name and you already knew prior to coming here that I will be presented here but do you think there's a slight chance that I know who you are because people are tweeting hashtag TEDx you join the Facebook event so I know about 500 people joined there I know exactly how they look like I don't have such a good memory but if I would I would brag that I recognized you all and so on so we already have a connection I already know stuff about you and if I would be a person that I would want to do bad things with you in a financial way I would be able to do so so let's get started before we go to the ahead of time section I'd like to see who recognizes that particular car okay okay fair amount which means that you've been practically being conceived around the 80s and you probably have the computer around 90s if I write which will make my job easier because before we got to know the future let's look a bit at the past at the present and then we'll look at the future so during the 70s the 80s and in 90s computer security was a bit different but the ones that had a computer in the 90s we remember the downsides of having your computer inspector - the virus I'm pretty sure the average recipe was reinstall everything from scratch and start over because virus is back then they had a single purpose showing you that you're stupid and showing - the guy that wrote it how smart he is and they were showing you how stupid you are by deleting your files infecting your computer infecting your friends computers and so on and this is not only to consumers to you guys even to companies imagine doing software development working on a project for a month and then this stupid virus comes in and destroys everything and you have to do it all over again and that's why most of the security companies started with in 90s because there was no protection and there were plenty of viruses or malware how we call it also since we're in Romania we were the best victims because Bulgaria Ukraine and Russia were large producers of malware and since the internet was at its beginnings viruses traveled geographically in other terms by floppy disk for those youngsters here it's like that I don't know a perfect design a 3d model of the save icon that's the floppy drive and you used to carry data with that all right wrong way for all the ladies in the house this is what hackers look like and even though it might not seem so from this distance I have a six-pack as well for all the young engineers that do not get too much love this is how they look in the adulthood so don't worry about there's no stress there this is what's happening today we have good hackers and bad hackers or but before actually categorizing them in good and bad let's look at the definition of a hacker a hacker is a very smart and curious person thank you that wants to make a ping that was designed to do something to do something else for instance making a coffee machine doing whiskey or making your smart car baking eggs whatever stupid examples but making something do what its students supposed to do to do something else like making your computer be their computer in their language so there's this hackers smart people around the world and as in the real life in the cyber world you can turn good or bad I've seen hackers making 1.5 million dollars in a week I can't it would take me probably a week to count them as well and I've seen hackers making much less money but without sleeping with the risk of being arrested the next day us the good hackers were showing companies where they have security issues and so the company can fix themselves the bad guys just make a lot of money which if they manage to spend them or not that will be their business but let's look at the ones wrong way again statistically speaking 10% of the guys here right now already had a date with a thing called ransomware don't be shy all right I'll tell you anyway ransomware is a computer virus designed by nowadays the bad guys that once here they infect your computer they encrypt your files everything what's in there and they will ask a amount of money between $400 and $1,000 to get your files back right now you're thinking here right like I'm gonna pay sir let's say you're the vp of marketing in a big company you're rich $400 is peanuts for you tomorrow we have one of the most important board meetings you have to do a summary of the KPI as you have and the projection for the next year so you're googling looking for cute pictures pie charts and then you get this message saying all your files are encrypted you need to pay $400 now five hundred and fifty dollars to get them back so this is speaking there's a 50% chance you will pay and by the studies we did that people actually pay even though some are in the world there'll be some good hackers saying I cracked this you can use this free tool to get your files back your first reaction is to pay and I've seen personally in investigations hackers making 1.5 million dollars in a week these are the modern hackers they're rich as stated they look pretty good let's move on let's go to political hackers this person was hired for different political parties to spy on the other parties so let's say we would look about the recent debate Hillary versus Trump imagine Hillary hiring this guy so she will know in advance every speech that trampled make set up thousands of social media accounts saying that Trump must not be elected I think that's happening and all the kind of stuff so the thing is the downsides although he made a lot of money he is now in jail and you can imagine that there's a lot of people out there trying to get him killed so now he sleeps like it says on the quote with a bullet hood blanket under a bullet was blackened in a bomb-proof room people really want to kill him let's carry on nope you see the Internet as you know it is a very interesting and fun place it's useful you have a lot of information there's a lot of cool stuff you can do there what you don't know it's about the hidden Internet which we call the dark net or the dark web which is like the underground economy for all the hackers for the bad hackers where they do where they sell drugs where they sell weapons pornographic material and this is the transition between the digital world and the real world this is where they actually sell crime services you want to beat somebody there's a price here we just failed they're going to wear a GoPro while they do it and they're going to sell you they send you the movie as an evidence so then you can pay them this is real I'm smiling because I have to smile because I'm going to stage but this is actually real and you can see bombing public person family one two bodyguards and so on now the sick justice of it is that if you want to beat a child pornographer or a rapist you get a 50% discount it's sick but it's sort of a justice in a way all right but remember the shootings that we've seen in Germany and France this year this is where they got some of the weapons you go to this dark web you purchase a weapon it's fully anonymous nobody will know who you are nobody will know how much you spend and you get the weapon delivered home either in a computer case or in a toy and so on things are real now this is Stuxnet Stuxnet was discovered publicly in 2010 and it's probably the first cyber weapon ever discovered its purpose was to explode a nuclear facility in Iran from the physical work from the digital world where we look at things like computers yada yada yada I don't really much understand blowing up a power plant with a computer virus this is the world I live in and trust me it's a very interesting but then again dangerous world and now I've show you the past that showed you the present let's look at the future the Internet of Things or as you look at it things are devices that you have own you right now which connect to the Internet let's make the following exercise I have my business phone my personal phone I have this thing here that I can control computers my gesture which connect to the Internet I have this other thing here that measures my health activity including beats per minute and steps and so on these are all things that are connected to the net and they live in your network and even though you think you know what they're doing sometimes by being in your network and being so close to you people can take control over them according to different statistics there's going to be between 25 and 50 billion such devices in the world by 2020 now let's presume now we're about 8 billion maybe are going to be about 10 billion by 2020 so that's about 5 devices or person and nowadays everybody's trying to launch the product nobody's looking at security and security and most Internet of Things devices right now is a joke and if you don't believe me I have two examples here crabs on security is a blob of a well-known security blogger past month he was attacked by a DDoS attack a DDoS attack means that there's so many computers trying to reach our website that your website can no longer respond or your server can upload can no longer respond and the amount of traffic was about 500-600 gigabytes per second may I call you a server for the first next 10 seconds I'm going to use him as an example so sorry for calling the server this is a hard drive that's about 500 gigabytes so the DDoS attack would be throwing this at his head every second and seeing how long he's going to last that's a DDoS attack the same thing happened this Friday the same botnet which is a which is like millions of infected devices that do the same thing at once managed to wrap put out of service Twitter Spotify and another 6% of the Forbes 500 companies you know what devices were infected yeah I have a lot of thing is my bands this is a security camera right this device was among the millions that put down part of the Internet this Friday this routers and other Internet of Things devices this is the problem and this is the world we're living on now and that's the security things we're going to face in the next years another example how about your fridge sending spam for instance you just put stuff in it and you think everything it's cool and safe and so on but in the meantime your fridge is spamming half the world selling some sort of enlargement pills and somebody's making money through your fridge yeah maybe it's not that important but who here is a parent fair enough do you have baby monitors I'm scaring you already right these are devices connected to the internet that monitor your kids you can picture what the scenario is I don't have to say anything about it anyways that's about it from my talk there is hope us and other people the good hackers you can call me tor are working for solutions looking for solutions we have a solution other people will follow so you don't need to despair what I'm trying to and I'm stop going to start at the beginning one more time I hope at the end of the day you'll realize the world we live in the hidden cyber world and next time you're going to use a stronger password you're going to look at the or your IOT device and they usually ship from China with one two three four five six defiled password it's not a joke they do there's these things called smart locks which you can lock er the doors of house with your phone well the thing is there's been a test on five on such devices four of them can be unlocked by hacker in a very easy way the fifth one was very very secure but you can actually open it with a screwdriver so that's redundantly thank you very much [Applause] [Music] you
Info
Channel: TEDx Talks
Views: 67,475
Rating: undefined out of 5
Keywords: TEDxTalks, English, Romania, Technology, Cyber, Hack
Id: XT4Y16dcVxA
Channel Id: undefined
Length: 16min 36sec (996 seconds)
Published: Wed May 31 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.