Ultimate magazine theme for WordPress.

Cybersecurity: Crash Course Computer Science #31


Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.

Check out Computerphile’s wonderful video on how to choose a password!

Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here!

Produced in collaboration with PBS Digital Studios:

Want to know more about Carrie Anne?

The Latest from PBS Digital Studios:

Want to find Crash Course elsewhere on the internet?
Facebook –
Twitter –
Tumblr –
Support Crash Course on Patreon:
CC Kids:

Source: https://blogema.org
Read more all post Computer Technology : https://blogema.org/computer/
  1. Anas Kahlid says

    One thing I find intimidating about cyber security and CS in general is the fact that I dont have any prior knowledge of coding. Any body has any advices whether I should major CS in university or go for something else ?

  2. Michal Kučera says

    After 31 videos I am really thinking about joining that Burger Fan Club

  3. Leland Crawford says

    It is a guilty pleasure every time Carrieanne says "doobalidoo".

  4. watch it says

    link in the dooblydoo 🙂

  5. Snapdragon845 Games says

    She looks like if she was raised by a horse

  6. Afu123best says

    im not smart enough to udnerstand this

  7. Kofi Acquah says

    I love her enthusiasm

  8. wooooooot1 says

    2 Timothy 1:7

    For God gave us a spirit not of fear but of power and love and self-control

  9. Active Cypher says

    Great intro course.

  10. Riccardo Benevelli says

    What is the program for these animations?

  11. Speakeasy Chemist says

    As an IT major with a focus on Cybersecurity, this video is very informative and provides a good understanding of my career future

  12. Martha D.moreno says

    Alright listen up if you have experienced any of these. We all have to be careful out there. Over the years, attackers have grown creative over the years by requiring payments that are nearly impossible to trace, which helps cybercriminals remain anonymous. Webghost33 on telegram/skype , is a cyberspace expert and can help if you're ever exposed to internet scams and cybersecurity breach such as Business Email Compromise too. They can can help get it restored and track down the culprit in many cases. Do you want to install spyware on a cellphone, smartphone or computer? Do you know if you have spyware on your computer or mobile devices? Reputation Management? Control your online reputation but removing false information and getting your positive message out. Cyber Stalkers? Don’t be harassed or stalked online. Find the person responsible and put an end to it all. Cheating Spouse? Find out for sure what they up to with Digital Investigation services.
    email : webghost33<at>cyberservices<com

    whatsapp ; 1 414 909 3913

  13. Mathaba Hassan says

    I've benefited alot from your video but I'm asking if you could give me some useful information about administration of security??

  14. Ailton Biji says


  15. mohamed ali says

    nice video

  16. Mince Wati Simatupang says

    nice program

  17. Mince Wati Simatupang says

    i like your video because it is my lesson , please explain more with use pictures exemples direct …it is my lesson

  18. Mince Wati Simatupang says

    interesting you explain with direct with pictures … i need lesson computer science

  19. Mince Wati Simatupang says

    it is good with pictures your video so not only talk expain which makes boring …..i like your video if with use pictures to explain computer science.

  20. Pro GamingRat says

    link in the dooblydoo?

  21. P S says

    Can you do something in gadgets like The Titan security keys & yubico ect – they seem like a brilliant idea ( unless you allready have )

  22. CUTEPOTATO26 says

    Brb I'mma add all the words from the dictionary to my password.

  23. Liam McGregor says

    "Cyber Security is like the Jedi Order trying to bring Peace and Justice to the Cyberverse" Decides to go back to school and study Cyber Security

  24. pocketlll says

    0:18 Legendary bike Favorit.

  25. da ne says

    Computers are not secure on open networks or closed networks so why waste money protecting or pretending they are? Create a fake system with fake information and everything else on paper and let corrupt countrys waste money on fake spies.

  26. Pablo Spinola says


  27. Kenneth Burchfiel says

    7:04 and what if an attacker compromises your fingers? 😮

  28. Artem Zagaynov says

    the creeper is back

  29. Black Satoshi says


  30. Abdulrahman AlQarni says

    Good topic explanation

  31. Fleisch Berg says

    You just lifted a riddle to me: Jedis are the protectors of peace and justice, the warriors of light. Whats the only condition in which you'll ever experience peace and justice? Yup, you got it. Warriors of death, thats what they are. Thats why Anakin was too old, he had already had his taste of life when he was introduced to the order.

  32. teemo says

    I am watching this because it support Korean subtitle

  33. CodeLife says

    Talking Too Fast…

Leave A Reply

Your email address will not be published.