Це відео відноситься до openHPI курсу Cyberthreats by Malware. Бажаєте побачити більше?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Прокрутити до поточної позиції
- 00:01For being prepared to consider cyberthreats by malware in our
- 00:06openHPI course, we have a closer look to Nowaday's Internet.
- 00:12Here are the smart devises which we can use to connect to the internet,
- 00:17to do the services that are provided in the net.
- 00:21We can use it in home, we can use it in work and in other places. So
- 00:27we can access and use internet application by computers, by laptops, tablets, smartphones,
- 00:34but also by television and game consoles but even more by sockets
- 00:41and lamps, these are the Internet of Things (IoT) applications that become more and more
- 00:48common up to tooth brushes and coffee machines that can interact over the internet.
- 00:58Typically it's organized if we look
- 01:01to our home environment. It is organized in a way that in the middle
- 01:07there is a Wi-Fi router
- 01:11with a modem which connects the home situation with the internet
- 01:18and the Wi-Fi can be used by different devices. So we can connect
- 01:26to the internet, we can connect by our game console or by our computer
- 01:31over wi-fi to the internet, we can do this by our smartphone and all the devices
- 01:36I had mentioned before.
- 01:41The connection of our home situation, of our home wi-fi to the
- 01:46internet is organised in a way that there is a telephone socket
- 01:50or a cable connection
- 01:54which connects us about such a dial-up modem, such a router
- 01:59to a regional ISP. ISP are the Internet Service Provider or a
- 02:07contract partner of such an internet service provider and then
- 02:10the internet service provider
- 02:13takes care for connecting in this case us with the internet
- 02:18and all the other users of the internet.
- 02:22So if we look in a more global situation, then we have many
- 02:29different internet service providers with
- 02:33their circle of networks around which are using this internet provider
- 02:39to connect to the internet and these internet service provider are
- 02:44connected to each other. They are connected
- 02:48to each other and in this way,
- 02:51let's have a look again, and in this way, some
- 02:56network which is connected to this service provider can interact with users
- 03:02that are connected to the internet by that internet service provider.
- 03:08So for the user, the internet looks like a virtual
- 03:14network. A homogeneous network. Although the
- 03:18internet consists of many different small networks, here is another
- 03:25graphic illustration. So we have different devices that
- 03:31are connected to the internet service provider by being connected
- 03:36in a local area network, for example like such a wi-fi network
- 03:41and these networks are connected to the internet service providers,
- 03:45each internet service provider has many customers,
- 03:50many such local
- 03:52area networks that are connected and then the internet service providers
- 03:57are interconnected with each other by the so called backbone, a connection, very
- 04:04fast broadband interconnection so that a machine here which
- 04:09gets connect to the internet by means of that internet service provider
- 04:14can easily interact with an user which is connected
- 04:20to this local area network
- 04:23that is connected to the internet by this internet service provider.
- 04:28So the internet today
- 04:31is used by everyone around the world by means of a personal network
- 04:39or by means of public access points, libraries, airports,
- 04:44companies and others.
- 04:46The internet is everywhere. We can access
- 04:51internet services by means of our computer,
- 04:56by means of our laptop, by means of our mobile phone,
- 04:59even radios and the typical internet of things devices.
- 05:07The use of the internet technology is also
- 05:12very meaningful for private business corporation.
- 05:17They organize their corporation network by means of the -
- 05:23by using the internet communication protocols.
- 05:27These internet inside a private corporation is called intranet.
- 05:34So all attacks that are working over the internet
- 05:40are also working within such intranet because the same technology is used.
- 05:48If we consider mobile applications then they become more and
- 05:52more important in our society, for example each police vehicle
- 05:57is connected to the internet for providing a fast communication,
- 06:02each medical service
- 06:05is connected to the internet
- 06:08and many other things too. So the internet is
- 06:14becoming the basic communication infrastructure
- 06:18for our society. And also internet is changing how we communicate.
- 06:24So typically we write short SMS or short
- 06:29emails. In the past there was letters written and sent. Now we can do
- 06:37this communication within seconds. We can process the information that we
- 06:44provide in a very fast way because
- 06:50when it is transported over the internet, it is in a form that
- 06:53can be electronically processed.
- 06:56And also the globalisation is
- 07:00pushed forward because the internet does work
- 07:05also beyond the boundaries of the national states.
- 07:10So processing international transactions becomes easier
- 07:15and this all characterize the internet situation today but
- 07:23unfortunately there are no standards against cybercrime.
- 07:29And that's the reason, because for cybercrime we need regulation,
- 07:33we need power to force such regulations and
- 07:39we have here a large deficit which needs to be closed
- 07:46over the next decades. We are in this first years of the internet. Internet was invented
- 07:53fifty or sixty years ago. The world wide
- 07:58web which has made the internet popular is about thirty years old.
- 08:03So we are in a very very early phase of the internet and
- 08:08in particular the security inside the internet needs to be
- 08:14improved over the next years.
- 08:17So if we look here again to our internet situation, to the
- 08:23ISPs, with the local area networks, it's a
- 08:27connect to the internet, then the services that are provided
- 08:32by the internet, we as a user in the middle that can access
- 08:37that can use the services over our
- 08:41devices and then there are the attackers.
- 08:45And the attacker really attack all what they can get. They attack the system
- 08:50inside the internet which are connected to the internet, they
- 08:55attack the internet connection, so the intermediate systems
- 09:00that connect the different
- 09:02networks which are interconnected into the internet,
- 09:07they attack the services here that are provided in the internet and
- 09:12they attack the user. The users, the devices of the user and the application
- 09:18the user is using. So the internet nowadays is really
- 09:26an el dorado for cybercriminals and we have to learn how to protect us,
- 09:33how to protect our data.
Щоб увімкнути запис, виберіть мову в меню налаштувань відео.