可以搜索公号【璐璐的英文小酒馆】或者添加【luluxjg2】咨询课程or加入社群,查看文稿和其他精彩内容哦~
Hi, everyone. And welcome back to Geek Time. 欢迎回来【极客时间】. Hi, Brad.
Hey, lulu, how's going?
It's being great. And Brad, I would like to propose a topic today.
Ok
Let's talk about one of your majors, which is Cyber Security, right?
Ok, good topic.
网络安全. Let's start with the basic. What is Cyber Security? I mean we can translate it. But exactly what is the security about? Is it about data? Is it about I don't know, finance? What is it about?
So, cyber security is the total your security of your data and your devices. But when we think about it, right, there's you can look at it as two main ideas.
You're protecting your data, whether it's your personal data or the company data or protecting critical infrastructure, companies, computers, your computer, or country's electric grids, their voting machines, their financial systems.
So, it's not just data ,it’s devices as well.
Okay. Am I to understand it's like several tiers, so you protect personal data, you need to protect like organizational data, like a company or organization, and you also have to protect sort of infrastructure in a country, in a community, like you said, electric grids and then voting machines, financial systems to make sure the country or the community or the region runs smoothly, operate smoothly.
Right.
Can I ask you just out of curiosity? What does this cyber security major fall under? What is like the big faculty or the big...?
So this one is between two faculties usually, most of its under IT, like information technology. But oftentimes with cyber security, it's not just on the IT side of things. It's also on the administrative side of things. So they often will combine the two. So my focus was yeah...
Like public admin.
Yes, kind of.
I see, and would you say it is a popular major to choose based on your observation?
It's fairly popular. I think a lot of people tend to go with just more of the basic IT support. I think cyber security is a little bit more daunting for some just because they look at it and they think that's got to be really difficult, but I think it's not any more difficult necessarily than the other IT majors.
So let's start with basic two more advanced security measures or settings. Obviously for most dummies, like me the first layer is password, but I know that is not really safe.
Yes,when you have a network,of course you need to have a password. And then when you think about passwords, you don't want to just have numbers because then this makes it very simple to decode or decrypt your password.
You add in letters and then symbols and then the more you add, the more complex it becomes, the more safe it is. But aside from passwords, a lot of times, people can or systems will use what's called a white list and what's called a blacklist.
What you allow and disallow.
Yes, right. A white list would just be we only allow these devices, right? And so anything that's on our white list as it is, are the only things that can enter. Or they might use a blacklist where they just say these devices can't be...can’t come onto the network.
A white list is a little bit safer, but it also makes it a little bit more difficult if you want to add a new device because you have to go into the system, you have to allow that device.
Yeah, unfortunately, I think a lot of people nowadays do not really have the basic awareness. I'm not even talking about the know how but the awareness of cyber security and we opt for convenience rather than total security.
Then of course on top of that, we have things like the antivirus software. Most people might run one or two different ones on their systems. But if you're like, really into cyber security, we use something called sand boxing.
Sand boxing?
Yes. So basically you have your operating system on your computer. When you log onto your computer, you use your computer. But you can actually kind of create what's called a virtual machine.