Cybersecurity Video Analysis: Threats, AI, Cloud Security, and Ethics

Verified

Added on  2023/04/06

|6
|1112
|484
Homework Assignment
AI Summary
This assignment analyzes several videos related to computer and system security, drawing insights from Edureka and other sources. The analysis highlights the human element as a major vulnerability in cybersecurity, emphasizing the importance of training, physical isolation, and cryptography. The document details various cyber threats, including malware, phishing, and DDoS attacks, and discusses cloud security concerns, such as data breaches and the need for a balance between security and user experience. The videos also explore the role of machine learning and artificial intelligence in improving cybersecurity, focusing on the potential of AI to detect threats and respond to attacks more effectively. Ethical considerations, such as the role of hacking and the need for regulations, are also discussed. The assignment concludes with a bibliography of the video sources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ONLINE COURSEWORK
ONLINE COURSEWORK
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ONLINE COURSEWORK
After watching different videos related to the computer and system security, the
contents of the Edureka seem helpful. There are some of the videos those are related to the
technology and maintaining the security of the system and computer.
Maintaining the cyber security (22:18)
https://www.youtube.com/watch?v=d30n-YxOHo4
According to this video, the biggest loophole in the computer security is the human
being. It has been seen that in most of time, data is being transformed to the third person who
is unaware or untrained to handle the system. Maintaining the computer security is the
responsibility of all the person who are using the system. It would mitigate the possibility of
breaching of information form the system. The computer security can be achieved through
the physical isolation, giving proper training to the people who are handing system and
implementation of the cryptography system. There are different types of securities like
physical security, access control and OS security. Some of the consequences of security
threats are loss of data, identity theft, and loss of reputation and unethical use of computer
resources. Before using the system, some of the checklist are needed to be done like if the OS
is secured and there is an antivirus software installed in the system. Apart from that the use of
original OS and enabling the updating system would be helpful for the protection of the
system.
Common cyber security threats: (22.04)
https://www.youtube.com/watch?v=Dk-ZqQ-bfy4
In this video, 8 common cyber security threats has been discussed. Live cyber-attack
threat map named Threat cloud can detect the cyber-attacks happening to different part of the
world. The 8 types of common attacks are- Malware, Phishing, Password attacks and DDoS,
man in the middle, drive by download, malvertising, and rogue software. Under the malware
Document Page
2ONLINE COURSEWORK
there are certain types of threats like Worms, computer virus, spyware. This malware threats
can be spared from OS vulnerabilities, software downloads and email attachments. In order to
prevent the malware attacks, users should not click on suspicious links. Apart from that the
update of the firewall and OS is needed to be done in a periodic way. Phishing is the attacks
that can be done through acquiring the password and the username of the users.
Cloud security: (26:05)
https://www.youtube.com/watch?v=0lw4KU5wHsk
This video has described the importance of the cloud security. In this context, the
example of the data security and data breaches of linkedin, icloud and Sony has been
described. It has been seen that most of the applications are associated with the cloud. In this
context, it is important to maintain the security of cloud. In this context, the selection of the
public, private and hybrid cloud is needed to be decided. It has been seen that most of the
companies who are adopting the cloud security, their main concern is regarding the top most
security. It can be said that cloud security is the merger of art and science. The cloud
technology is science because it has to come up with new technologies for the data
protection. It is art because the security is needed to be implemented in such a way that will
not hinder the user experience. An example can give in this case. If the security password is
asked from the user after interval of every 5 minutes, it is justified from the security point of
view, however, this will not lead to a good user experience. In order to maintain the loud
security monitoring EC2 and other AWS resources are needed to be done.
IGF-USA 2015 Breakout - Maintaining Trust Online: Cybersecurity, Encryption,
Backdoors, and Privacy (1:24:41)
https://www.youtube.com/watch?v=NBSBTwXqgYs
Document Page
3ONLINE COURSEWORK
The concept of security of the security is confusing. The security means maintain the
confidentiality of the data or prevention of possible threats in the system. According to the
Mr. Peha, the concept of security is very abstract. According to the Nick Sullivan, the
security is needed for the network systems and the components associated with the network
like routers and the hubs. For maintain the security of the web some of the users find it
difficult as there is a need for the certification for the security and equipment are needed for
the implementation of the system. Mr. Flaim is concerned about maintain the rules and
regulations regarding the cyber security. In this context, he said that if the rules are not
followed in a right way people have to face the consequences.
[Asan Plenum 2018] Session 2 - "Cyber Security" (1:32:53)
https://www.youtube.com/watch?v=QwiwWt3bE7o
According to this video in order to purse the objectives regarding the cyber space in a
secured way, the organizations can cooperate with the competitors. In maintain the security
of the system, the video explains the role and the importance of hacking. In this context, the
mention of the ethical hacking came. For the most the users, they do not know the use of
cyber weapons. Apart from that the attacks on the system are getting advanced so it is
become problematic to prevent the new threats on the system. The defensive control can be
taken in order to prevent this kind of attack. This can also lead to the cyber strike.
How Machine Learning & AI Will Improve Cyber Security (58:34)
https://www.youtube.com/watch?v=lO2Cf5BmjvI
This video describes the use of the machine learning and the artificial intelligence for
the improvement of the cyber security. The use of AI and machine learning can detect the
intruders in the system in a flexible way and it will take less time to detect the threats. The
smart AI system will be trained so that it can collect data from the past incidents of the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ONLINE COURSEWORK
attacks and based on the collected data proper action and the detection of the threat can be
done by the AI driven cyber security system.
Document Page
5ONLINE COURSEWORK
Bibliography
[Asan Plenum 2018], [Asan Plenum 2018]. "[Asan Plenum 2018] Session 2 - "Cyber
Security"." YouTube. N.p., 2019. Web. 12 Mar. 2019.
Edureka, E. (2019). Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training |
Edureka. [online] YouTube. Available at: https://www.youtube.com/watch?
v=0lw4KU5wHsk.
Edureka, Edureka. "8 Most Common Cybersecurity Threats | Types Of Cyber Attacks |
Cybersecurity For Beginners | Edureka." YouTube. N.p., 2019. Web. 12 Mar. 2019.
Edureka, Edureka. "Computer Security | Types Of Computer Security | Cybersecurity Course
| Edureka." YouTube. N.p., 2019. Web. 12 Mar. 2019.
IGF, IGF. "IGF-USA 2015 Breakout - Maintaining Trust Online: Cybersecurity, Encryption,
Backdoors, And Privacy." YouTube. N.p., 2019. Web. 12 Mar. 2019.
Webminer, webminer. "How Machine Learning & AI Will Improve Cyber
Security." YouTube. N.p., 2019. Web. 12 Mar. 2019.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]