Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss. Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.
PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your Library section along with the audio.
©2013 The Teaching Company, LLC (P)2013 The Great Courses
The lecture format is pretty good, but this book wasn't for me because I am fairly well versed in security as a whole.
For people outside of security, it's a great overview. For Execs, it's a great primer, even if a bit out of date. People inside security will find their time better spent elsewhere.
I will give the professor credit for being dynamic with his presentation.
I've spent the last 20+ years in information technology and have been responsible for the attack surface of a multi-million dollar organization for the last 15. While I would say there is some good information here for executive types, I find some of the professor's attitudes - specifically those around personal privacy - creepy and disturbing at best. He's clearly spent too much time around DHS and other policy types.
I found the topic of this course of lectures absolutely fascinating. I admit that I know little of computers and cyber security, so these lectures were very beneficial for me. Professor Rosenzweig is a great narrator which makes listening to his words even more enjoyable.
Can't think of any at the moment, but I will definitely read and learn more on this subject.
The way he talks and explains fully grabs your attention.
Yes, it was.
I learned a lot from this course. If there are any more courses of professor Rosenzweig, I will find and buy them.
This is my first review of an audio download from Audible. (I say "audio download" because this is more like a classroom style lecture series rather than the more common audio book.) Until now I thought it totally unnecessary to add yet another me-too review to other books I've listened to with dozens to hundreds of similar reviews already posted. But since this course has been lightly reviewed I wanted to give my input for others considering this lecture series.
In a few words: I really enjoyed it...
I really thought I was pretty savvy when it comes to computer security. Was I ever wrong! This series was fascinating from beginning to end. The Stuxnet virus lecture (lecture 1) was really amazing. The hardware vulnerability lecture was disturbing. The section on password vulnerability made me super paranoid, and has made me change all my passwords to ones that are much more secure.
I will certainly be more careful in my browsing habits, but I worry greatly about attacks on our infrastructure here in the USA. After listening to this series I was taking a walk along the California aqueduct and came to a massive flow control gate station. There was nobody there. The building itself was heavily fortified, and most likely alarmed. But everything is controlled remotely, and the entire path of the controlling cable is clearly marked with "Do not dig here" placards. Can you tap in here by digging down a few feet? What if someone hacked into that network and opened all the control gates along the entire route from northern California to Los Angeles? Are the control sequences encrypted? How secure are they? Are they connected to the internet? [Keep in mind, though, the Stuxnet virus penetrated the Iranian uranium enrichment facility even though it wasn't hooked up to the internet].
So I can be prosecuted for a federal crime if I update my facebook account at work, but if I make a personal phone call on the company phone it is not? The legal system is so outdated, based on law from the 1970's when phones were the most common communication medium. Fascinating stuff.
I was amazed at how vulnerable we are, and I don't have much confidence in the ability of our elected leaders to handle this. Are we headed for an impending crisis?
The technical information is lacking, and what he does use, he puts into the story in metaphorical instances with poor indications that he knows how it really works.
Chose a title that indicated the true level of technical skills and knowledge. "Cyber" anything appears to be more buzzword.
Irrational, but True
If you're looking for a broad overview of cybersecurity issues, covered in layman's terms, this course is a good resource. For those looking for in an in-depth look at the technical details behind why cybersecurity issues exist and how exactly cybersecurity threats and principles work, you will be let down.
I love the Great Courses and I highly recommend them.
The spoken lectures are delivered in an engaging way, with good delivery and enough intellectual meat to hold the attention of those casually interested.
The lectures are well delivered, but are not well designed. The course doesn't proceed in a way that lays any real ground work and the lack of any assumption of technical knowledge on the part of the audience means that it ranges from being vague to utterly superficial (technical concepts are primarily presented using metaphors and analogies without enough substance to give the larger security issues the real gravity and illumination that they deserve.
A great course. Everyone who uses the internet should take this course to understand the vulnerabilities that exist in cyber space today and the responses available.
• The professor covered the following material well:
o How the five gateways of internet vulnerability result in cyber threats being drastically different from traditional threats/war
o Descriptions of the various types of threats (including DDoS, Botnets, financial/intellectual theft, espionage, war acts such as the disruption of the electrical grid or shutting down a uranium enrichment facility, and hardware-based threats)
o Descriptions of the malicious actors in cyberspace (including petty criminals, organized crime, hacktivists, and nation states)
o The legal ramifications of violating a “terms of service” you accept when you sign up for a service on the internet
o The debate on whether the government should provide oversight of cyber security on the internet as a whole and, if so, how much? Can policies keep up with the pace of technological advances?
o The debate on whether the government should monitor internet usage for national security reasons and, if so, to what degree?
o The debate on the definition of privacy in this new age: Do our existing privacy laws need to be revised and updated to reflect technological advances?
• The professor provided both sides of an argument or case for the controversy topics such as privacy protection and government policy on cyber security controls and gave his own views
• The professor kept the technical minutia to a minimum making it easy to follow the technological discussions
• I found myself hoping the professor would’ve provided a few more examples (whether real life use cases or theoretic possibilities) when explaining certain topics (such as hardware threats)
I learn more when I listen to audiobooks and I can chew through a lot more books this way! Audiobooks are also a lot easier with a TBI
I know that not all of the information in this course is current because technology is changing so rapidly. Despite that pitfall I still found a lot of useful and relevant information. His arguments are certainly persuasive and well thought out. Before this course I felt that my knowledge of computer security was lacking and after this course I felt much more confident in- and much more motivated to protect myself online. Overall I am really, really glad I listened to this course- I found it entertaining, interesting, and accessible but I also feel like this sort of course is a necessity for anyone who spends any amount of time online.
As a computer professional, the comprehensive nature of this course was illuminating. Rather than focus only on the technical aspects of cyber security, the professor covered political, cultural, legal, and international relations perspectives. With excellent overview of the issues and challenges as well as practical discussions on ways forward, this course is valuable for everyone who uses the internet. That is, essentially for everyone.
someone more interested in an overview of the topic from a legal perspective
not for practitioners or technologists
The lecture series provided a great overview, for the non-expert, of the most current issues in information- & cyber-security, in a highly intelligible & engaging manner. Even if you are moderately literate on this subject, from trade press reading & from the security policies of your corporate home, you will learn a lot from this series.
Well, this is not a book, just a lecture series. I understand that the author has written some books on the same topic & I plan to look them up and get one if it doesn't look too technical.
"Informative and entertaining"
This is a great overview of the cyber security landscape. It was engaging and prompted me to think a long new lines as I mull over the vulnerabilities and challenges in my organization. I am a senior technology manager in a large global organisation and cyber security is managed by others who are professionals in that domain. So for me this was a useful adrenalin shot to get more background and help me get more from my engagements with those professionals. I myself am in technology infrastructure and I did not pick up on any material issues with the technical content - some of it is simplified so it appeals to as wide an audience as possible. It is NOT a technical book but a high level overview of a large, complex domain. Technical people should listen to this book so they get a stronger appreciation of the socio-political landscape to balance the technicalities of cyber security or infrastructure.
"The best audio book in this subject."
Although, I work in the industry - I have to say that I have learned a great deal from this course.
"Must read for everyone"
A real eye opener. this book is a must read for everyone on the internet. it is very thought provoking and evident of vulnerability on the net.
This book gives the listener a high level overview of many of the security issues that a prevalent. The author uses many examples of real world examples and breaches to illustrate the
Yes it did
I dont think it would work as a film as it is a series of CyberSecurity lectures
Report Inappropriate Content