Transcript

CORY DOCTOROW
Over the past few weeks, we've looked at the threats to your digital information and the technologies available to protect it. Now you know how cryptography can help you keep your secrets and how to protect your network from an attack. But what if you are attacked? This week, we're going to look at what can go wrong when an attack on the security of your information is successful. Using case studies, we'll look at individuals and organisations that have been hit and see what impact it had on them.
This will help you learn to recognise the signs of an attack, arm you with the information on how to recover from a security breach, and how to stop it happening again. Just as importantly, we'll be looking at backing up your data, and the pros and cons of various approaches. 'Til next week.