Understanding Hackers

  Рет қаралды 30,172

IBM Technology

IBM Technology

Жыл бұрын

Detect and eliminate threats → ibm.biz/BdPa7
Understand current threat trends → ibm.biz/BdPa9s
Our security guru, Jeff Crume, frequently refers to "the bad guys", which you might might assume is synonymous with hackers. But that's arguably an incomplete definition, as "white hat" hackers are a force for good in security circles. In this video, Jeff presents the types of hackers and then provides a taxonomy of the motives, skills and techniques that define them. "Know your enemy" is the first step of defense, and in the case of hackers, it will help inform your security strategy.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

Пікірлер: 50
@luislopes806
@luislopes806 Жыл бұрын
I would like to thank to IBM Technology Team for their Videos, they are very educative and explanatory to us.
11 ай бұрын
This guy deserves an award from the IT and cybersecurity community! I love his Carl-Sagan-ish way to divulgate the information. 🤩
@jeffcrume
@jeffcrume 5 ай бұрын
I’m truly humbled to be compared even in some small way to Sagan 😊
@aruizsilva
@aruizsilva Жыл бұрын
You are a very good communicator. Thanks!
@jeffcrume
@jeffcrume Жыл бұрын
Thank you for saying so @aruizsila!
@srivasala4080
@srivasala4080 Жыл бұрын
really love the content. very very good
@bobanmilisavljevic7857
@bobanmilisavljevic7857 Жыл бұрын
Thanks for the info
@tiom28x
@tiom28x Жыл бұрын
Fantastic content, as a 3rd year cybersecurity student, I'm enhancing my knowledge and understanding thanks to your videos. Very clear and concise, also analogies you using are spot on. Thank you for being a good guys. 💪👍
@jeffcrume
@jeffcrume Жыл бұрын
Thanks for the positive feedback, Tio! So glad you are finding the content useful
@donasaha1936
@donasaha1936 Жыл бұрын
Ur voice n way of teaching is very warm and comfortable sir.. 😊very good work
@jeffcrume
@jeffcrume Жыл бұрын
Thank you for the kind complements!
@brocode3974
@brocode3974 Жыл бұрын
Excellent contents ❤
@linegenevievemichaud6739
@linegenevievemichaud6739 7 ай бұрын
Thank you for the presentation. I am glad you brought up the psychology of these guys referring to the black hat hacker. Sociopath/criminal I strongly agree.
@jeffcrume
@jeffcrume 5 ай бұрын
So glad you liked it!
@neail5466
@neail5466 Жыл бұрын
I believe, Knowing yourself should be the priority.
@malibu188
@malibu188 Жыл бұрын
Very lucid presentation of a multifaceted problem. Battlefield strategy sounds wise.
@gmanonDominicana
@gmanonDominicana Жыл бұрын
I experienced in the past, not anymore, websites with an offensive security that would attack users who fit some criteria such as having port 80 running, or Linux as operating system. Also at one point, social media used to have cyber warriors very offensive. I believe those people made use of software to run their attacks and even as a form of defense base more on fear than on real potential threads.
@melaacademy1872
@melaacademy1872 Жыл бұрын
Question: how and what is needed to film with the screen and neon colors like this?
@techgeek6773
@techgeek6773 11 ай бұрын
thanks a lot and keep going
@jeffcrume
@jeffcrume 5 ай бұрын
Many more to come!
@never_give_up944
@never_give_up944 Ай бұрын
Well presented and highly informative. Please do more, especially revamping the IBM courses on Coursera which have been complete garbage.
@pauliusnarkevicius9959
@pauliusnarkevicius9959 Жыл бұрын
Does ISO/IEC 27005:2022 includes words like "Hacker" (what would be his motivation in comparison to more bad-n-strong terms)? Title could be stating a "Bad Hackers" instead of "Hackers". If there around exists a lot of material for teaching "Hacking", then probably You Right!
@LemonadetvYT
@LemonadetvYT Жыл бұрын
Thumbs up for this person that has to write everything backwards in his view
@IBMTechnology
@IBMTechnology Жыл бұрын
Search on "lightboard videos"
@jeffcrume
@jeffcrume Жыл бұрын
Thanks for the complement but I have to confess that I can barely write frontwards (as you can see from the poor handwriting). They flip the image in the post production process and make it all come out nice in the final product
@LoveYourFamily2
@LoveYourFamily2 Жыл бұрын
I wouldn't describe them as 'enemies'. In time, they could become our defenders, or co-workers. If we weren't so extremely bad at making them our friends.
@dennisdalogdog7018
@dennisdalogdog7018 3 ай бұрын
Sir Good day to you.. I'm Dennis From the Philippines and I'm interested about that Cyber Security Course,, you're course u offered sir is affordable,, but I'm not sure to avail that course because I have no enough money to pay that.. Hopefully, soon you Reply my message to you.. Thank you very much.. Glory to god
@sadianaz9639
@sadianaz9639 Жыл бұрын
How can I get away from the hackers?
@vijithkumar
@vijithkumar 9 ай бұрын
ELITE
@krizziaoro9174
@krizziaoro9174 Жыл бұрын
I have a cyber stalker!!!!! It happened to me!!! Where do I start? How do you stop them?
@krizziaoro9174
@krizziaoro9174 Жыл бұрын
If it’s on the rise, people who cyber stalk and put spyware and malware on your devices where and who do you go to? It’s illegal right? If it’s on the rise what do you recommend to do???
@jeffcrume
@jeffcrume Жыл бұрын
Yes, it’s illegal in most places that I know of but discovering it can be difficult as is discovering who is behind it and, therefore, who to prosecute can be even more challenging. The best defenses I know of are to keep strong passwords/biometrics on mobile devices, don’t download software from untrustworthy sources, don’t click on links unless you know what they are going to do, keep up to date with all patches and keep physical possession of your devices
@krizziaoro9174
@krizziaoro9174 Жыл бұрын
Do you know how to unhack your own phone? A guy is obsessed with me and stalking me on my phone. I’ve bought so many phones and he keeps hacking them. I also think he has my entire wifi hacked. Where do I start to get rid of him?
@luislopes806
@luislopes806 Жыл бұрын
I have this question: How can we implement the decentralization of data in entrepreneurs? And if so, would we be helping to protect our data?
@jeffcrume
@jeffcrume Жыл бұрын
Not sure I understand the question. Can you restate? (BTW, I have a Data Security 101 video recorded that should publish in the next few weeks)
@sakshipriyadarshini3264
@sakshipriyadarshini3264 Жыл бұрын
@@jeffcrume nope bad idea companies are more secure
@luislopes806
@luislopes806 Жыл бұрын
Hacker: is a person who uses computers to gain unauthorized access to data. The Cyber Stalker: is someone who puts some sort of malware, some sort of spyware, or maybe in your phone, your computer, your tablet. And then they are able to look at all your activities. How can I defend my electronic devices against this type of hacker (Cyber Stalker)?
@Stopinvadingmyhardware
@Stopinvadingmyhardware Жыл бұрын
You have to factory reset it. Those are shittiest people I have even met. They’re usually stealing from you and doing far worse.
@jeffcrume
@jeffcrume Жыл бұрын
Taking care not to download apps from other than the official App Store for the platform helps (but is no guarantee). Keeping a strong password/biometric to unlock the device can help keep someone from installing stalkerware when you aren’t in physical possession as well.
@JhinguBaba
@JhinguBaba Жыл бұрын
Stalkers are Criminals and Accidents are only attributed to goodies(Warriors and Hacktivists). Unwarranted commandments.
@FlorD3Lot0444
@FlorD3Lot0444 11 ай бұрын
Cyber stalked 😢
@world.of.october
@world.of.october Жыл бұрын
Second comment 😏
@MaipuruSyrup
@MaipuruSyrup Жыл бұрын
Calling people performing malicious cyber activities "hackers" isn't really fitting anymore, it should really have it's own exclusive term as hackers is used in a very generalised term nowadays whereas something like "attacker" gets the point across better. What if I make my gameboy do something that it wasn't originally designed to do? I could call myself a hacker. And what if I modify the html of a webpage to respell something? I am a hacker. I install linux programs on the terminal? Hacker. I cut down shrubbery? Hack.
@su8z3r03
@su8z3r03 Жыл бұрын
Second comment 🥷 🏴‍☠🏴‍☠🏴‍☠
@su8z3r03
@su8z3r03 Жыл бұрын
Hack the planet !!! 🌎
@stephanodev
@stephanodev Жыл бұрын
First comment 😼
@justagenzontheinternet808
@justagenzontheinternet808 Жыл бұрын
Second comment here😎
@truthseepeaking
@truthseepeaking Жыл бұрын
No Bad Girls? Or Bad Women? Lets not be sexist
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Become a Penetration Tester without experience
9:14
UnixGuy | Cyber Security
Рет қаралды 38 М.
ТАМАЕВ vs ВЕНГАЛБИ. Самая Быстрая BMW M5 vs CLS 63
1:15:39
Асхаб Тамаев
Рет қаралды 4,7 МЛН
Stupid Barry Find Mellstroy in Escape From Prison Challenge
00:29
Garri Creative
Рет қаралды 19 МЛН
터키아이스크림🇹🇷🍦Turkish ice cream #funny #shorts
00:26
Byungari 병아리언니
Рет қаралды 21 МЛН
OMG🤪 #tiktok #shorts #potapova_blog
00:50
Potapova_blog
Рет қаралды 13 МЛН
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 43 М.
Cybersecurity Careers FAQ
13:46
IBM Technology
Рет қаралды 14 М.
Cybersecurity Quiz. How Much Do You Know?
10:57
IBM Technology
Рет қаралды 11 М.
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 149 М.
Securing Your IoT Devices
13:55
IBM Technology
Рет қаралды 25 М.
Aise Hacking Device Apne Dekhe Nahi Honge? | RealTalk Clips
17:01
RealTalk Clips
Рет қаралды 1,7 МЛН
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 63 М.
What are you going to do in 2023? Tops 5 skills to get!
18:56
David Bombal
Рет қаралды 2,4 МЛН
Flipper Zero: Truth or Hype?
12:14
Hacking Modern Life
Рет қаралды 139 М.
ТАМАЕВ vs ВЕНГАЛБИ. Самая Быстрая BMW M5 vs CLS 63
1:15:39
Асхаб Тамаев
Рет қаралды 4,7 МЛН