Cybersecurity: Crash Course Computer Science #31

Pre-order our minimal edition Crash Course: Computer Science Floppy Disk Coasters here!
https://store.dftba.com/products/computer-science-coasters

Cybersecurity is a set of methods to safeguard the secrecy, integrity, and accessibility of computer system systems and data against threats. In todays episode, were going to unload these three objectives and talk through some methods we use like passwords, biometrics, and access advantages to keep our information as safe and secure, but also as accessible as possible. From enormous Denial of Service, or DDos attacks, to malware and brute force password breaking there are a lot of methods for hackers to gain access to your data, so well likewise discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your details safe.

Produced in cooperation with PBS Digital Studios: http://youtube.com/pbsdigitalstudios

Have a look at Computerphiles fantastic video on how to choose a password!

The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV

Desire to find Crash Course somewhere else on the internet?
Facebook – https://www.facebook.com/YouTubeCrash …
Twitter – http://www.twitter.com/TheCrashCourse
Tumblr – http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Would like to know more about Carrie Anne?
https://about.me/carrieannephilbin

Cybersecurity is a set of techniques to protect the secrecy, stability, and accessibility of computer system systems and data versus hazards. In todays episode, were going to unpack these 3 objectives and talk through some methods we utilize like passwords, biometrics, and gain access to privileges to keep our details as secure, however also as accessible as possible. From enormous Denial of Service, or DDos attacks, to malware and brute force password breaking there are a great deal of methods for hackers to access to your data, so well likewise discuss some strategies like creating strong passwords, and utilizing 2-factor authentication, to keep your info safe.

Related Posts

Leave a Reply

Your email address will not be published.