- Brain virus: 1986, Alvi brothers, accidentally infected disks too.
- Morris worm: Meant to install on all PCs to count, but accidentally reinstalled infinitely until ran out of memory. Led to creation of CERTs (Computer Emergency Response Teams).
- LoveLetter (aka "I Love You"), already known. Sent to all email contacts & collected passwords. Example of social engineering.
- BEC (Business Email Compromise): Faking / hacking a colleague email.
- Spear phishing: Targeting specific user(s).
- Whaling: Executives only.
- Vishing: Fake voice comms.
- Smishing: Fake SMSs.
- Keep cool
- Be the "pause" in a conversation
- STOP the breach, then investigate it
- Security and risk management: Security goals and objectives, risks, compliance, etc.
- Asset security: Securing physical and digital assets.
- Security architecture & engineering: Optimise data security w/ tools, systems, processes.
- Comms & network security: Securing (and managing) physical networks & wireless comms.
- Identity & access mgmt: Validating identities, roles, etc.
- Security assessment & testing: Audits, testing, analysing data.
- Security operations: Investigations, preventative measures.
- Software development security: Coding securely!
Nice focus on examples now we're more "into the meat". Example is briefly described, then the relevant topic introduced. Nice!
Quizzes during videos help stay engaged, and being able to click transcript to load that part is great.
Different types of activity (reading, video, quiz, flashcards) keep it fresh.