Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- Narrated by: Paul Rosenzweig
- Length: 9 hrs and 41 mins
- Release date: 08-07-13
- Language: English
- Publisher: The Great Courses
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.
In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.
Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.
PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your Library section along with the audio.
Regular price: £14.09
Buy Now with 1 Credit
Buy Now for £14.09
Customer ReviewsMost Helpful
By iLard on 17-12-14
Informative and entertaining
Would you recommend this audiobook to a friend? If so, why?
This is a great overview of the cyber security landscape. It was engaging and prompted me to think a long new lines as I mull over the vulnerabilities and challenges in my organization. I am a senior technology manager in a large global organisation and cyber security is managed by others who are professionals in that domain. So for me this was a useful adrenalin shot to get more background and help me get more from my engagements with those professionals. I myself am in technology infrastructure and I did not pick up on any material issues with the technical content - some of it is simplified so it appeals to as wide an audience as possible. It is NOT a technical book but a high level overview of a large, complex domain. Technical people should listen to this book so they get a stronger appreciation of the socio-political landscape to balance the technicalities of cyber security or infrastructure.
2 of 2 people found this review helpful
Customer ReviewsMost Helpful
By Todd Algren on 24-04-14
A well-packaged set of zero surprises.
Would you say that listening to this book was time well-spent? Why or why not?
The lecture format is pretty good, but this book wasn't for me because I am fairly well versed in security as a whole.
Would you recommend Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare to your friends? Why or why not?
For people outside of security, it's a great overview. For Execs, it's a great primer, even if a bit out of date. People inside security will find their time better spent elsewhere.
Which scene was your favorite?
I will give the professor credit for being dynamic with his presentation.
Could you see Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare being made into a movie or a TV series? Who should the stars be?
Any additional comments?
I've spent the last 20+ years in information technology and have been responsible for the attack surface of a multi-million dollar organization for the last 15. While I would say there is some good information here for executive types, I find some of the professor's attitudes - specifically those around personal privacy - creepy and disturbing at best. He's clearly spent too much time around DHS and other policy types.
24 of 27 people found this review helpful
By Tommy D'Angelo on 29-11-15
Required if you use the internet!
What did you love best about Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare?
A great course. Everyone who uses the internet should take this course to understand the vulnerabilities that exist in cyber space today and the responses available.
• The professor covered the following material well:
o How the five gateways of internet vulnerability result in cyber threats being drastically different from traditional threats/war
o Descriptions of the various types of threats (including DDoS, Botnets, financial/intellectual theft, espionage, war acts such as the disruption of the electrical grid or shutting down a uranium enrichment facility, and hardware-based threats)
o Descriptions of the malicious actors in cyberspace (including petty criminals, organized crime, hacktivists, and nation states)
o The legal ramifications of violating a “terms of service” you accept when you sign up for a service on the internet
o The debate on whether the government should provide oversight of cyber security on the internet as a whole and, if so, how much? Can policies keep up with the pace of technological advances?
o The debate on whether the government should monitor internet usage for national security reasons and, if so, to what degree?
o The debate on the definition of privacy in this new age: Do our existing privacy laws need to be revised and updated to reflect technological advances?
• The professor provided both sides of an argument or case for the controversy topics such as privacy protection and government policy on cyber security controls and gave his own views
• The professor kept the technical minutia to a minimum making it easy to follow the technological discussions
• I found myself hoping the professor would’ve provided a few more examples (whether real life use cases or theoretic possibilities) when explaining certain topics (such as hardware threats)
4 of 4 people found this review helpful