1 00:00:00,000 --> 00:00:02,450 [MUSIC PLAYING] 2 00:00:02,450 --> 00:00:16,690 3 00:00:16,690 --> 00:00:17,780 DAVID MALAN: Hello, world. 4 00:00:17,780 --> 00:00:21,280 My name is David Malan, and this is CS50 Introduction 5 00:00:21,280 --> 00:00:25,180 to Cybersecurity for technical and nontechnical audiences alike. 6 00:00:25,180 --> 00:00:29,110 In this course, you'll learn how to secure your accounts, data, systems, 7 00:00:29,110 --> 00:00:31,600 and software against today's threats and how 8 00:00:31,600 --> 00:00:36,010 to recognize and evaluate tomorrow's as well, both at home and at work. 9 00:00:36,010 --> 00:00:38,290 You'll learn how to preserve your own privacy. 10 00:00:38,290 --> 00:00:41,230 You'll learn how to view cybersecurity not in absolute terms, 11 00:00:41,230 --> 00:00:44,890 but relative, a function of risks and rewards for an adversary 12 00:00:44,890 --> 00:00:46,990 and costs and benefits for you. 13 00:00:46,990 --> 00:00:49,000 And you'll learn to recognize cybersecurity 14 00:00:49,000 --> 00:00:51,820 as a trade off with usability itself. 15 00:00:51,820 --> 00:00:55,900 In the world of cybersecurity, I daresay you and I have to be perfect. 16 00:00:55,900 --> 00:00:59,770 All of our doors, all of our windows, virtually speaking, have to be locked. 17 00:00:59,770 --> 00:01:02,740 But an adversary has to find just one mistake that we've 18 00:01:02,740 --> 00:01:05,410 made-- a single door or window ajar. 19 00:01:05,410 --> 00:01:09,110 So perhaps we should be focused not only on prevention, but on detection 20 00:01:09,110 --> 00:01:11,410 especially, through auditing, through monitoring, 21 00:01:11,410 --> 00:01:15,280 so that even if an adversary gets in, we can at least detect as much quickly 22 00:01:15,280 --> 00:01:19,760 and minimize the downsides for us and, in turn, the upsides for them. 23 00:01:19,760 --> 00:01:23,180 Perhaps nowadays, tools like artificial intelligence or AI 24 00:01:23,180 --> 00:01:26,570 can even help with that, detecting patterns and potential adversaries' 25 00:01:26,570 --> 00:01:29,420 behavior that we might not even notice ourselves. 26 00:01:29,420 --> 00:01:32,810 And perhaps, if we raise the bar high enough for the adversary, 27 00:01:32,810 --> 00:01:36,890 increasing their cost, their risk, decreasing their potential reward, 28 00:01:36,890 --> 00:01:39,680 they'll simply lose interest in us as a target. 29 00:01:39,680 --> 00:01:42,090 Of course, if they have more resources than us, 30 00:01:42,090 --> 00:01:44,150 they might very well win anyway. 31 00:01:44,150 --> 00:01:46,370 But will they be even interested in us? 32 00:01:46,370 --> 00:01:49,100 Which of these threats should we actually worry about? 33 00:01:49,100 --> 00:01:52,940 Throughout this course, we'll present both high-level and low-level examples 34 00:01:52,940 --> 00:01:57,620 of threats and provide you with all you need technically to understand both, 35 00:01:57,620 --> 00:02:01,010 even if you're not a programmer or computer person yourself. 36 00:02:01,010 --> 00:02:04,580 Through those examples, we'll introduce you to certain first principles, 37 00:02:04,580 --> 00:02:08,360 how computers themselves work, so that you can understand and deduce, 38 00:02:08,360 --> 00:02:12,590 even after the course ends, how other threats that the world might not 39 00:02:12,590 --> 00:02:15,450 have even seen yet actually work. 40 00:02:15,450 --> 00:02:20,560 This is CS50's Introduction to Cybersecurity. 41 00:02:20,560 --> 00:02:22,000