fbpx
  1. Tubelator AI
  2. >
  3. Videos
  4. >
  5. Science & Technology
  6. >
  7. Introduction to Cybersecurity - ICS Security Part 3

Introduction to Cybersecurity - ICS Security Part 3

Available In Following Subtitles
English
Variant 1
Posted on:
Learn about the importance of cybersecurity in ICS Security. Discover how cybersecurity is essential for protecting data and information within the system. Get insights into the Greek and Russian origins of the term cybersecurity and its role in supporting nature.
tubelator logo

Instantly generate YouTube summary, transcript and subtitles!

chrome-icon Install Tubelator On Chrome

Video Summary & Chapters

No chapters for this video generated yet.

Video Transcript

0:00
Welcome to the ICS Security. Introduction part 3, cybersecurity.
0:06
Now we're going to the cybersecurity.
0:10
Before we start, I want to define the theme of the environment.
0:14
Cybersecurity is very important.
0:17
The word cybersecurity is said, as soon as possible.
0:22
It will be the name of the Greek-born Russian.
0:25
And the introverted introduced the steel system to make it work.
0:33
But the Cyborg has not come to make many other things today, so it is the only thing that has to do with nature.
0:44
So we can definitely get a little closer to what we say, that we have information and we have processes that support nature.
0:52
It is information that is laid on the earth, the information that is laid on the earth, the system that supports the earth.
1:01
It is cyber. It is cyber-mode. So cyber, the security and security are doing well with data and the information that the system is doing.
1:41
I was sitting in the office for a while.
1:44
I needed to be ashamed of being another world of wine.
1:49
I needed another person to be ashamed of my art and art.
1:53
I was forced to sit in a car and be ashamed of my design.
1:58
I had a problem with the air conditioning, the air conditioning, the air conditioning.
2:08
and it's not the worst level I want to have in my daily life, because I don't have that in my head.
2:14
I have made a claim that I need to protect this with the outside world of wind.
2:21
It's going to be possible to protect my data from the wind, but more so, I need the experience that is most important for me to handle the control protection.
2:30
As you can see, we have a cyber security.
2:33
If I don't know what is happening, my data system or my computer system,
2:38
then I can't use the correct security system.
2:41
If I don't know what level of security I need,
2:45
if I can't say that I want to take this level of risk,
2:49
then I don't know if I have set up too much,
2:52
then I don't know if I have set up too little,
2:55
and it's very difficult for me to do this about my security work.
2:58
is true. Because the traditional law of the government is a little bit of a secret.
3:04
So, you need to take up three years of the rule.
3:07
But the rule is called CIA in three years.
3:10
The first rule is confidentiality, to keep things and be honest.
3:15
This is the traditional law of the government.
3:17
I think I've been going back to it for a long time.
3:19
I want to have certain things and I want to keep things and be honest with others.
3:23
The military side, the Sun, I want to have my plans and be honest with others.
3:26
I want to keep my industry in secret and form myself.
3:33
The other thing we have is really one.
3:37
I don't want an income can come into my document.
3:42
Historically, it hasn't been a problem for many years.
3:46
But it was a physical issue.
3:49
And if you were to get some of those things, you would have to pay for it.
3:54
and the goal of the firm is to have more self-sufficiency.
3:59
Even if you have a future for example,
4:01
for the lack of a better provenance of certain works,
4:05
or in question of the past,
4:07
when you want to make your test.
4:10
In data-sounding reality,
4:13
there are many important things
4:14
that we have data and program in the same way
4:18
that must be changed.
shape-icon

Download extension to view full transcript.

chrome-icon Install Tubelator On Chrome