PowerPoint Presentation

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

[Audio] Let's say your writing an email.. Home office with plants.

Page 2 (5s)

[Audio] You send it to someone far away.. Home office with plants.

Page 3 (13s)

[Audio] But you wonder.. But you wonder. Social network with solid fill.

Page 4 (21s)

[Audio] How does it go through to the other person?.

Page 5 (29s)

An open laptop. Our internet is provided by underwater cables..

Page 6 (42s)

[Audio] The email, using the internet cable, will go underwater. And not using the air radio waves..

Page 7 (51s)

[Audio] When it reaches the destination, a power grid..

Page 8 (1m 1s)

[Audio] It travels through. It travels through. Cyber attack takes down power grid, 60 substations - SecureIDNews.

Page 9 (1m 7s)

[Audio] As it goes through the electricity poles.

Page 10 (1m 18s)

[Audio] It'll be accepted by their internet provider..

Page 11 (1m 27s)

[Audio] And go through the modem of the home.. Living room with sofa.

Page 12 (1m 37s)

[Audio] Towards their preferred device.. Living room with sofa.

Page 13 (1m 42s)

[Audio] And so now you know. And so now you know.

Page 14 (1m 46s)

[Audio] Your email. Home office with plants. Woman in black skirt.

Page 15 (1m 54s)

[Audio] Will get there safely. Your email will get there safely.

Page 16 (2m 0s)

Home office with plants. Woman in black skirt. Checkmark with solid fill.