This video belongs to the openHPI course Cyberthreats by Malware. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00Welcome to our new openHPI
- 00:04course about Cyber Security and in this course we want to speak
- 00:08about cyber threats by malware
- 00:11and this is an ever growing threat which we can observe when
- 00:16we speak about cyber security.
- 00:19Over the intervening years we have an enormous growth in malware attacks, this is
- 00:28malicious software.
- 00:33So, alone in twenty twenty
- 00:35pushed by the Corona-crisis, malware was targeting various -
- 00:42in particular work from home software solutions.
- 00:46In many cases people start with such work from home as solutions,
- 00:53unprepared, it was during the lockdown, it was decided to
- 01:00let people work from home and so a lot of solutions were
- 01:07vulnerable and by means of cyberattacks, in particular by means of
- 01:12attacks with malware, they could be
- 01:15attacked.
- 01:17So here is a chart which shows the number
- 01:21malware variants attacking the Microsoft 365
- 01:28software, this is the office software, and here we see
- 01:33it's more than three million different malware variants
- 01:38which were designed and which were used to attack systems only
- 01:46to attack the Microsoft
- 01:48365 suite or here is another
- 01:53chart which shows the number of malware variants targeting mobile devices,
- 02:01also more than one million.
- 02:04If we look at the situation, here we have our internet.
- 02:10Internet you remember is a network of networks and in the internet there is a
- 02:16big number of services that are provided to the user. And the user
- 02:23uses services by connecting to the internet
- 02:29by different devices with their computers, with their laptops,
- 02:33with their smartphone or tablets. So they are using hardware.
- 02:39In the hardware there is an operation system which allows
- 02:43to run several types of applications.
- 02:46And the attack by means of malware from the side of attacker is
- 02:53direct as well to the hardware as well to the operating system as to the
- 03:00various applications.
- 03:02And this is also a very important attack vector, the
- 03:08cyber criminals attack immediately the user itself. This is
- 03:14what we call the human factor and human engineering.
- 03:19So malware is a central attack vector in cyberspace.
- 03:26And we have to think and we have to learn about it because such malicious software
- 03:33is a central weapon of cybercriminals.
- 03:41Any device can be targeted by malware.
- 03:45Malware can target the users as well as the providers, the service providers.
- 03:52So home computers could be targeted, smart phones,
- 03:58IoT - Internet of Things devices such as lamps, fridges, servers
- 04:04and websites in the internet.
- 04:07And malware makes it especially easy for the cybercriminals
- 04:12to attack computer systems and users to break into the systems
- 04:17to falsify data, to steal the data
- 04:21to force the user to do something which gives the cyber attackers financial advantage
- 04:29or others. So in this openHPI course, cyberthreats by malware, we
- 04:38want to consider this topic in more detail.
- 04:42So in the first wake now we start and will provide you general information about malware
- 04:50attacks. Why is internet an interesting target for malware attacks,
- 04:56who are the attackers on the internet, how does one get infected by malware -
- 05:02these are topics we discuss in the first week. And then we finish with an excursus
- 05:08on Advanced Persistence Threats. These are the most dangerous and complex
- 05:16attacks which of course use malware components in different situations.
- 05:23And then in the second week we will have a closer look on the
- 05:26different kinds of malware. We will discuss viruses, worms, trojans,
- 05:32we will discuss ransomware and scareware.
- 05:36And this is of course very important - we want to discuss protective measures
- 05:42against malware. And then we also provide excurses on firewalls and anti-virus software
- 05:50to explain how these protection
- 05:57systems are working.
- 06:00My name is Christoph Meinel.
- 06:03I'm the Head of the Hasso Plattner Institute and the Dean.
- 06:07I have the chair of "Internet Technologies and Systems" and have a
- 06:13very powerful research group working on that. And in our chair
- 06:19we are working on security engineering, on cybersecurity - how to protect systems,
- 06:25but we also speak about learning and knowledge engineering, digital education
- 06:30and innovation research. And in this coutrse I am supported by
- 06:35my PhD students - by Daniel Köhler,
- 06:39he is working on security engineering and network security,
- 06:44and by Muhammad Ihsan Sukmana,
- 06:48his topic is cloud computing, secure cloud computing, access control
- 06:54and enterprise storage solutions.
- 06:58So we would be pleased if you
- 07:03cooperate with us, if you come to this course and
- 07:07if you use the discussion forum to interact with the other learners
- 07:12which are interested in this topic cyber threats by malware.
To enable the transcript, please select a language in the video player settings menu.
About this video
Errata:
- 04:39 Instead of cybertreaths, it should have been cyberthreats.