Тёмный

Critical digital infrastructure: Why societies are becoming so vulnerable to cyberattacks |Techtopia 

DW News
Подписаться 5 млн
Просмотров 70 тыс.
50% 1

For weeks, a cyberattack paralyzed the German district of Anhalt-Bitterfeld in 2021, bringing its whole administration to a standstill. It was a stark illustration of how hackers can knock out entire communities in milliseconds - and how digital technology has become vital for running our societies.
Such “critical digital infrastructure” helps boost efficiency. But it also makes communities ever more vulnerable to hacking. And attacks are on the rise. In this episode of Techtopia, DW Chief Technology Correspondent Janosch Delcker investigates how a criminal industry makes billions by taking computers hostage - and how governments can use similar methods as a political weapon.
Subscribe: ru-vid.com...
For more news go to: www.dw.com/en/
Follow DW on social media:
►Facebook: / deutschewellenews
►Twitter: / dwnews
►Instagram: / dwnews
Für Videos in deutscher Sprache besuchen Sie: / dwdeutsch

Опубликовано:

 

6 июл 2022

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 85   
@lioraselby5328
@lioraselby5328 Год назад
videos like this are good motivation for me to keep studying computer networking and cybersecurity
@justiceperez3087
@justiceperez3087 Год назад
I hope it goes well m8
@money3076
@money3076 Год назад
Thank you for your comments..write ✍️ to me👆👆👆
@money3076
@money3076 Год назад
@@justiceperez3087 Thank you for your comments..write ✍️ to me👆👆👆
@ChezYusuf
@ChezYusuf Год назад
We can safe humanity by contributing our quarter in protecting our networks and information structure. I’m also an IT student
@zaeltrus
@zaeltrus Год назад
I am a final year computer science student, I wanted to pick VR development as my specialisation. My brother landed me a trainee position at a cyber security firm, since then, I realised this is my calling. And since then I am paranoid about everything I do on and offline 😂
@twestgard2
@twestgard2 Год назад
The gasoline-related attack mentioned at 12:10 only affected the company’s billing system. The actual gasoline system was perfectly safe and untouched the entire time. It was perfectly possible to distribute gasoline the entire time. The only thing affected was the ability to profit from it.
@anisraiss
@anisraiss Год назад
they cant say that because it is not fearmongering
@julianbrown3100
@julianbrown3100 Год назад
While that's technically true, there was still a fear that the attack could spread to the operational tech. Also, it was kind of interesting that they only needed to stop the billing system in order to stop the flow of gas.
@twestgard2
@twestgard2 Год назад
@@julianbrown3100 We should look very skeptically at the phrase “there was still a fear that…” because it puts weight behind unsubstantiated fears. If there’s some objective cause to believe that there’s the technical capability to attack the gasoline itself, that’s important. If there’s reason to think they wanted to or were willing to, that’s important. But just treating fears that aren’t connected to reality as if they deserve serious response is how you get wild overreactions and in foreign policy the consequences of that can be extremely bad. Also the fact that the profitability of a private company can cause the loss of crucial infrastructure tells us that we have a critical infrastructure weakness in allowing private profits to carry more than they should. We can build defenses by, for example, having an emergency purchase/sale agreement in place in the event of an emergency. Something that would kick in as soon as the private company loses its ability to provide basic necessities in the ordinary course of business. That way the amount of loss is lessened.
@julianbrown3100
@julianbrown3100 Год назад
@@twestgard2 It's been quite a while since I looked into this case, but if I remember correctly, there was no microsegmentation to separate the OT from other systems. So, yes, the fear that the attack could spread to the OT was (very much based in reality and) material during Colonial's mitigation and remediation efforts. The threat actors in question ultimately regretted the attack, since it brought too much attention to them. But it would be foolish to think that we could trust in future threat actors' goodwill or good intentions in staying away from critical infrastructure. I'm not usually one to fear-monger but this particular case should serve as a wakeup call - and it did, as we saw from the many, many white house/CISA statements on cybersecurity in critical infrastructure, supply chains, and private enterprise to come out in its wake. Your suggestion for an emergency purchase agreement sounds interesting. I'm not sure if the niggly practicalities would work out, but it could ensure that 'the spice flows.'
@twestgard2
@twestgard2 Год назад
@@julianbrown3100 yeah, my point is not that cyber threats don’t exist or aren’t serious. They do exist and they are serious. My point is that our choices about how to build and distribute the critical infrastructure were poorly conceived, in two specific ways: one is that we overly rely on privatization and the required profits of that system are what shut down the system. We can make different choices there, such as an emergency taking when and if the for-profit system fails to function. The second thing is that we concentrate infrastructure in a misguided concept of efficiency, which is the direct opposite of safety redundancy in engineering. The gasoline shortage could only happen because there was one company that was too big to fail and that’s a structural vulnerability that we are building into our own armor. We should break up monopolies as a matter of national security.
@phil20_20
@phil20_20 Год назад
Not like the days of the closed system I trained for. You weren't connected to the internet, just a private network - a REAL private network.
@Texasdav1
@Texasdav1 Год назад
DW documentaries, short and long, are always so well done. It is easy to follow the storyline--you keep your viewers engaged from beginning to end.
@willaumep
@willaumep Год назад
They do not need for a user to type their credential, most of the time they have done some reconnaissance and they have apayload designed to exploit know vulnerabilities that the target is likely to have. just going to a web site or opening the attachement can be enough to download that payload.
@money3076
@money3076 Год назад
Thank you for your comments..write ✍️✍️ to me👆👆
@thekaiser4333
@thekaiser4333 Год назад
What is very suspicious is, that neither the governments, nor the police, nor the secret services and most suspicious, that investigative journalists do never identify the cyber criminals nor have them arrested unless it is convenient for them privately and personally.
@nathanngumi8467
@nathanngumi8467 Год назад
The future is digital infrastructure interconnectivity, and cyber security will be critical going forward.
@jesselima_dev
@jesselima_dev Год назад
Great short documentary. We need to use the best technologies. In fact, we must use the best possible tools to mitigate risks. However, it's all gone if we do not train everyone on how to avoid the threats. A few years ago, I heard many times, "All companies will become IT companies or will be left behind". Now, those companies also need to be security companies by design. Security tools, processes and personal training are a must-have for any company. As a company, if you do not invest time and money continuously in tools, processes and personal training, then you (the company) are significantly at risk.
@21stcenturyscots
@21stcenturyscots Год назад
"we must use the best possible tools to mitigate risks" Yes. And you must develop those tools! Go to work now! You must save the world!
@jesselima_dev
@jesselima_dev Год назад
@@21stcenturyscots Yes. I am a developer!
@CAStone-kq4md
@CAStone-kq4md Год назад
A simple solution would be to disconnect from the internet .
@penguin902
@penguin902 Год назад
12:20 This would be very hard to do. That's like saying. "Robbing a bank is bad but if you try to rob 10 banks at once it'll be worse!". The bigger the crime the more people involved and the higher the chance of leak or capture before it starts.
@narkelnaru2710
@narkelnaru2710 Год назад
I expected better information on the perpetrators.
@fandyllic1975
@fandyllic1975 Год назад
I really good video, but watchers should be skeptical of some of the solutions. There was an implication in the video that companies and governments should assume cyber attacks will succeed and possibly focus effort and money on hiring cybersecurity professionals to clean up messes more than prevent attacks. People should be aware that cybersecurity companies may be motivated to act like pharmaceutical companies and push cure over prevention, since cure will be more profitable. Tools and resources should consider prevention tactics like secure browsers and zero trust models at the user level as well as monolithic backend, data center solutions.
@Spitfire_Cowboy
@Spitfire_Cowboy Год назад
Mmm kali is such an awesome learning tool. Jack the ripper was da bomb back in the day. Nowadays, its easier to use a RaspberryPi with a base debian install an installing what tools you need. Remember: if you find something, report it to the relevant operators. Never use what you find for malicious purposes.
Год назад
At the same time costs for getting certified in IT is redicules expensive. So the costs for schooling and reschooling should come down to get more IT workers. I get companies want the best of the best but they need to settle for more average workers than a few of the best.
@GaasubaMeskhenet
@GaasubaMeskhenet Год назад
remove the motivating factor. abolish money
@magatism
@magatism Год назад
I fear for the transatlantic cables...
@casparcoaster1936
@casparcoaster1936 Год назад
Damn.
@AliceAmane
@AliceAmane Год назад
Wait, does that mean IT technicians are the soldiers of tomorrow?
@linmal2242
@linmal2242 Год назад
Cut the hard lines!
@ClintonGonsalves-ed9zw
@ClintonGonsalves-ed9zw Год назад
This is scary since this can devastate economies and can also stop major trade of the countries. Maybe further development in Quantum computing could solve this problem. But it is a two sided coin indeed.
@janein6491
@janein6491 Год назад
07:22 - 07:33 "We lost all Mails from the last 20 years." ... ooooh, how I´d love to hear that..I´d break out the champaign and stop working. For every request I´d shrug my shoulders and say something like: "I´d love to help, but you know...the emails..." and I´d let my voice trail of...
@gamlerik1
@gamlerik1 Год назад
The cannary in the coal mine. :D
@HL65536
@HL65536 Год назад
So they had no backup and no anti-phishing training. Utter incompetence.
@rainyang8101
@rainyang8101 Год назад
interesting
@meejinhuang
@meejinhuang Год назад
Cyberattacks shouldn't be so common. It's poor system architecture and software. One day only trusted IPs will be able to access critical networks or even commercial websites.
@davidhiggins2804
@davidhiggins2804 Год назад
Well that's not entirely true some well designed software can still have bugs/ vulnerabilitys
@aarongiorno6580
@aarongiorno6580 Год назад
Problem is you just use all that tec on your own people.
@daddy9132
@daddy9132 Год назад
I also wants be an ethical hacker
@money3076
@money3076 Год назад
Thank you for your comments..write ✍️ to me👆👆👆👆
@bcaominh
@bcaominh Год назад
I guess the Landkreis didn't get the "digital transformation" memo...
@yellowbhee7220
@yellowbhee7220 Год назад
Ration should star soon
@86MarcusP
@86MarcusP Год назад
😔
@watanglipuhadjar2654
@watanglipuhadjar2654 Год назад
canary in the coal mine.. lesson from mistakes, over and over.
@krishnkant9477
@krishnkant9477 Год назад
I have zero idea how to protect myself from an hacker but I have done a basic thing. I keep two different sim cards, one in a smartphone and another one in a tablet. The smartphone is used for contacting with others, via phone calls and social media platforms but there is no critical data stored in the smartphone. While whatever essential files and documents I have to save are saved in the tablet and the number of the simcard in Tablet is completely private. There is no transfer of files, folders and other information from the tablet with other devices, but only by my smartphone.
@money3076
@money3076 Год назад
Thank you for your comments..write ✍️ to me👆👆👆
@urimtefiki226
@urimtefiki226 Год назад
Simply don't do anything, whatever you do you are in his hands. The more you try to do something the more you encourage him to torture and steal your work.
@MrBeeMAD
@MrBeeMAD Год назад
Хакеры взломали систему. Обнаружили что оно говняно, и решили делиться своими интересами.
@money3076
@money3076 Год назад
Write ✍️✍️ to me 👆👆
@elizeleroux6388
@elizeleroux6388 Год назад
now we desperate need men to catch hackers
@rdsc.455
@rdsc.455 Год назад
PEGASUS, although all know about Pegasus its origin, its sale its purchaser and its misuse even with some high political entities being its victims no one have been doing or say cannot do anything to prevent it, to stop its sale and penalise its producers.
@peteranderson3956
@peteranderson3956 Год назад
Because Germany thought the Russians were their friends? Increase your defense budget already for goodness sake!
@J.R.Graham
@J.R.Graham Год назад
Great true story,book title-"Cowboy Mafia "-
@jasonrose77
@jasonrose77 Год назад
Presenter doesn't blink much. Sort of freaky once you notice it. 😁
@bunnyniyori6324
@bunnyniyori6324 Год назад
I won't mind being forced to mail a letter, use physical currency and rely on a landline. I don't care if cashiers need to actually manually input prices and count change. And being unable to talk on FB or watch RU-vid won't kill me. I seriously don't care if I can't buy it online. And too bad if you have to actually get dressed and go to work. Life wasn't better in 1970, it was just less complicated. And I wouldn't mind a little simpler, to be honest.
@hate.doublespeak991
@hate.doublespeak991 Год назад
Give Klaus Shwabb his great reset!
@rainyang8101
@rainyang8101 Год назад
so that's another reason why you can't do anything.
@sizzla123
@sizzla123 Год назад
Good episode Proverbs 9:10 The fear of the LORD is the beginning of wisdom, and knowledge of the Holy One is understanding.
@CSS-in-Points
@CSS-in-Points Год назад
101th like, 22th comment.
@bantuandproud8456
@bantuandproud8456 10 месяцев назад
🥴🥴🥴
@dubistverrueckt
@dubistverrueckt Год назад
Hype and fluff to distract from REAL issues like keeping the nuclear reactors running, and restarting the rest. I would think that staying warm in the winter and keeping factories running are more important!
@davidhiggins2804
@davidhiggins2804 Год назад
Cyber security is extremely important without it all modern system will fall
@deborahwhy3637
@deborahwhy3637 Год назад
◇late late late late news! ◇yet helpful to the "clueless global masses", ◇who truly probably won't see this video; don't care; and who are too "lazy minded" to read, & educate themselves, about the "out of control" standalone attacks, or well- connected & organized; vicious criminal network threats. ☆danke◇🖖🏽
@money3076
@money3076 Год назад
Thank you for your comments..write ✍️ to me👆👆👆👆
@szalailaci3722
@szalailaci3722 Год назад
Not suitable for listening As a podcast. I won't.
@anisraiss
@anisraiss Год назад
preparing for the wef attack
@AlgoNudger
@AlgoNudger Год назад
Cybersecurity is a bs! 🤣
@davidhiggins2804
@davidhiggins2804 Год назад
A bs ?
@AlgoNudger
@AlgoNudger Год назад
@@davidhiggins2804 how you protect your systems from full-chain, 0-click, 0-day with persistence', kernel code execution attack?
@cinitapatrick2174
@cinitapatrick2174 Год назад
Predictive programming coming ..coming soon World economic forum. Social credit biometric ids brave new world. Yet I see so many sheeples here cheering 😳😳🤦‍♀️🤦‍♀️
@ABCXYZ-jk8me
@ABCXYZ-jk8me Год назад
Are You Born-again ?
Далее
#kikakim
00:12
Просмотров 364 тыс.
Why Hacking is the Future of War
31:45
Просмотров 2,3 млн
Cyber Attacks | 60 Minutes Full Episodes
55:59
Просмотров 784 тыс.