Quantum Computing Lectures: Cybersecurity

“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
-- Stephane Nappo

“The hacker didn't succeed through sophistication. Rather he poked at obvious places, trying to enter through unlock doors. Persistence, not wizardry, let him through.”
― Clifford Stoll

Invest in Cybersecurity (2:07)

The future of cybersecurity will be a combination of human readiness and technological defenses. Investment in cybersecurity training can cost less than technology that may become obsolete.

What is Quantum Safe? (8:44)

Quantum computing is a rapidly maturing technology that could soon give us the ability to solve valuable problems that are intractable to classical computation.

However, some of those problems form the basis of the world's most widely-used security protocols—meaning we need updated, "quantum-safe" cryptography to protect our data. In this video, the core principles of Quantum Safe are explained. 

In July of 2022, NIST identified four quantum safe standards that organizations can start using.  They  are Lattice-Based Cryptography, Code-Based Cryptography, Hash-Based Signatures and Multivariate Public Key Cryptography.

Understanding Hackers (10:41)

In this video, the types of hackers and the taxonomy of the motives, skills and techniques that define them are presented.

"Know your enemy" is the first step of defense, and in the case of hackers, it will help inform your security strategy.

  • Who are the bad guys?
  • What do they do?
  • Why do they do it?

The Anatomy of an Att@ck (7:45)

The bad guys are trying to break into your IT system: They've got tactics, techniques, and procedures (TTPs) they deploy. What about the "good guys" in security? They need a strategy to defend and respond, which starts with better understanding the enemy, in this case, intruders/hackers.

In this video, the MITRE ATT&CK framework is presented; it defines nomenclature for classifying and describing cyberattacks and intrusions, as well as the TTPs behind them, so you can "know your enemy".

What is RansomWare? (12:47)

You've probably heard the term ransomware used recently in the news. Between the Colonial Pipeline attack, attacks against local governments, school systems, etc., ransomware is everywhere in the news these days.

But what is ransomware? How does it work? How can you protect yourself from it? 

This video discusses how ransomware can affect both your personal local machine, as well as a large enterprise, and what you can do to defense yourself against malicious attacks.

Cybersecurity Trends for 2023 (9:45)

What overall trends have we seen in the past year in cybersecurity?

What can we look forward to in cybersecurity, threats as well as good things that can occur?

What role will AI, deep fakes, and quantum computing play going forward?

Data Breach - the cost continues to be in excess of $4 million per incident

Ransomware and Multi-Factor Authentication (MFA) will continue to play key roles in IT security

Expect an increase in attacks for Internet of Things

Adversarial AI: An AI system would be able to maybe design new types of attacks to get into systems

Denial of Service Attacks Explained (9:51)

Denial of Service attacks are one of the many tactics malicious actors may use. 

 Jeff Crume explains the different types of DoS attacks and what kind measures can be taken to mitigate the threat posed by these kinds of attacks. 

What is Public Key Infrastructure (PKI)? (9:21)

Ever wondered how HTTPS actually works - or public key infrastructure, or symmetric and asymmetric cryptography?

  • Public Key Infrastructure (PKI): PKI is a way of governing encryption keys through the issuance and management of digital certificates 

Data Security in 6 Steps (7:21)

Data is the lifeblood of an IT system. It's intellectual property & sensitive customer information.

The "bad guys" want it, so how do you protect your data? A 6 step process for creating a data security strategy:

  • Governance: data security policy, classification, catalog, resilience
  • Discovery: where the information is at
  • Protection: encryption, key management
  • Compliance: regulation, retention
  • Detection: monitoring, analytics
  • Response:

Crack Cybersecurity (22:44)

Break Encryption

Store Now - Decrypt Later 

Symmetric Key Algorithm 

How Quantum Computers Break The Internet... Starting Now:
https://www.youtube.com/watch?v=-UrdExQW0cs