Archiv der Kategorie: Video
Verborgene Gefahr
7 Signs of Terrorism
The following videos teaches us the 7 signs of terrorism:
- Surveillance
- Elicitation
- Tests of security
- Acquiring supplies
- Suspicious people who “don’t belong”
- Dry runs or trial runs
- Deploying assets or getting into position
Now watch out for terrorists.
(7 signs)
SPAD* – Don’t Let It Happen to You!
Today’s safety video is brought to you by ScotRail. It examines in depth three cases of train drivers accidentally passing red signals.
*) SPAD = Signal Passed at Danger
A Perfect Misunderstanding
(youtube)
Driver and Cyclist Safety Tips
(youtube)
What machine learning is capable of
Jeremy Howard explains what machine learning is capable of in this TEDx Brussels talk, „The wonderful and terrifying implications of computers that can learn“:
The Curse of the Security Officer
We’re all going to die
Melonen ohne Helm
Was einer Wassermelone ohne Helm alles passieren kann:
Why We Shouldn’t Bike with a Helmet
Safety, as you know, is paramount
Infantry Weapons and Their Effects
(youtube)
Kill or Be Killed
How Small Arms Work
This video won’t teach you warefare (just like an introduction to cryptography won’t teach you security) but it is nevertheless interesting:
(youtube)
Autonomous Technology and the Greater Human Good
How would a rational autonomous system behave? What might go wrong and what can we do about it?
(youtube)
Hat tip to Manu मनु for pointing me to this video in a comment.
Why Do Planes Crash?
(youtube)
Cyber This, Cyber That
The Art of Misdirection
Wrong Victim
Hal Varian Explains the Google Ad Auction
How Google determines which ad to display in a slot and how much to charge the advertiser:
(YouTube)
Computers explained in plain English
(YouTube)
Learning from History
Everyone knows the story of Clifford Stoll and and West-German KGB hackers (see the video below) in the late 80s. Does this history teach us something today? What strikes me as I watch this documentary again is the effort ratio between attackers and defenders. To fight a small adversary group, Stoll invested considerable effort, and from some point involved further people and organizations in the hunt. In effect, once they had been detected, the attackers were on their way to being overpowered and apprehended.
Today, we take more organized approaches to security management and incident response. However, at the same time we try to become more efficient: we want to believe in automated mechanisms like data leakage prevention and policy enforcement. But these mechanisms work on abstractions – they are less complicated than actual attacks. We also want to believe in preventive security design, but soon find ourselves engaged in an eternal arms race as our designs never fully anticipate how attackers adapt. Can procedures and programs be smart enough to fend off intelligent attackers, or does it still take simply more brains on the defender’s than on the attacker’s part to win?
(YouTube)