In this video, you will learn to describe why comprehensive cybersecurity architecture can be very complex to implement in reality. So let's talk now about how the Internet works and why the online security is so hard to implement and to maintain. First, it is important to understand what is the current picture that we're having in our online presence. This is our report soon where we actually have the report presented by Domo on 2018. Here we could see that there is almost, for example, nearly 25,000 GIFs are sent on Facebook Messenger, that's a curious fact. Actually, there is a lot of tweets, almost 473,000 tweets are sent on Twitter and 4.2 million of videos are viewed on a Snapchat. Why those numbers are important? These numbers represents that everybody, everyone that has a smartphone, that has a computer are on the Internet, are sending and receiving information from not just web servers, but from another people in the Internet. The interesting part here is those numbers are minute numbers. So every minute 4.2 million of videos are seen on Snapchat, every minute 25,000 GIFs are sent into Facebook. So there is a lot of data, there is a lot of information that we are using and we are dealing with the Internet right now. Quick example and something that it's a nice exercise to perform, Datum it's an organization that collects and understand data around the world. They try to analyze data using big data technologies and artificial intelligence and things like that. They put together a site where you can calculate how much or what is the cost of your information over the Internet. For example, when a couple of clicks same, for example, that you have a Facebook page, that you normally send tweets that you receive, or you have a personal blog on Wordpress, or something like that, we can estimate that the information that you already have on the Internet cost almost $1,000. So that's something important because normally, we don't actually pay attention to the information that we share or we have on the Internet. That's one of things that we need to understand in order to implement controls on our accounts. We're going to talk about authentication. We're going to talk about identification and the methods that we could use to protect our information not just on the business side, but also in our personal digital life. So that's something important. We need to understand the amount of money that we're putting into the table for the attackers for the cyber crime, to exploit, to capture. Now what is so difficult? What is so difficult to implement to understand and to keep track of Internet security or Internet privacy on these days? Well, first of all, we need to care about data protection, and that's something important. But in the past, if we want to protect the data, we protect the server, we protect the computer, we protect our printed documents and lock them into a box or something like that. Right now, we actually need to protect not just the computer, we need to protect our tablet, we need to protect our smartphone, we need to protect our smartwatch. We have a lot of devices, and those devices carry the information that we shared, that we care. The part of the must be changed. We don't need to protect right now the asset, we need to protect the data on the asset. The asset is something important also but we should care about data. We shouldn't care about the asset. Then we have mobile technology. There is a lot of mobile right now. We have 4G networks that practically mimics the speeds or actually improve the speed of WiFi in some businesses or houses. We have cellphones. Actually, most of the people right now are using their cell phones, their tablets, and try to replace their computers with that. Again, we need to protect the devices, but we need to protect the confidential data on that device. We need to be sure that the devices are secure with authentication methods that will increase or will have enough controls, enough control mechanisms, to protect the data that a mobile device is carry on. We're dealing now with global businesses, we're not dealing with a single obvious or the single headquarter in one city and that's all. We are dealing with a lot of offices and a lot of places in the world. So we need to protect each of those fields, each of those businesses, their communication between those businesses, those offices. The data transportation between those enterprises and those offices from the same company should be protected, and that's difficult. We need to understand not just the technical stuff, but also administrative stuff, for example, policies in countries, compliance in countries, things like that are difficult to keep track off. Last, we have multiple vendors. In the past, we deal with, for example, Lenovo, we deal with Dell, with Asus to buy computers, buy servers, and that's it. Then we have providers or vendors that will give us routers, network equipment, things like that. Then we have our ISP to give us Internet access. But right now, we're dealing not just with one vendor, we're dealing with multiple vendors on computers. It's something common that we go into any office and we've seen not just PCs, but they're also Macs. We see computers with Windows, but also with Linux. So there is a lot of vendors there. We're dealing right now with Cloud computing. Cloud computing is a key part of the expansion of the technology. But also there is a lot of vendors, there is a lot of technology there and we need to understand those technologies in order to protect the infrastructure that we are implementing or we are having in our companies and our personal life.