adbl_ms_membershipImage_includedwith_altText_B076FLV3HT
adbl_ms_membershipImage_includedwith_altText_B076FLV3HT

1 audiobook of your choice.
Stream or download thousands of included titles.
$14.95 a month after 30 day trial. Cancel anytime.
Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Beginners: Each week it seems that some major corporation or another is having serious issues, thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible, for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private. This defeatist attitude is just what the criminals want, however, and the truth of the matter is there is plenty you can do to improve your cybersecurity right now. 

While everyone knows that they need to exhibit some level of caution when interacting with the online world, with the bounds of technology changing all the time, this can be easier said than done. Luckily, this is where this book comes in to discuss the types of cybersecurity you should care about and how to put them to use for you in a way that is proven to be effective in both the short and the long-term. 

Inside you will find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more.

Intermediate: The purpose of this book is to inform listeners about cybersecurity, hackers, and the Internet in general. A lot of people are unaware how hackers can get their privileged information or what security measures they need to take in order to avoid falling victim to these hackers or cybercriminals. 

This book explains the types of threats that people can be exposed to while their device is connected to a network, why hackers engage in the activities that they do, what happens to personal data once it has been compromised, and much more.

Advanced: The book considers the problems of related to cyber security in the individual, as well as the organizational setting. Cyber security is essential to the organization considering the growing technological dependencies that organizations are continuously facing. The book considers the nature of threats of cyber-crime from hacking to data manipulation.

The text also considers intrusions related to corruption of information and its theft where the organization suffers from loss of crucial data. Conversely, there is data manipulation where the information is corrupted without the knowledge of the users in the organization. The book tackles the methods of dealing with these types of intrusions and how to mitigate risk through policy changes.

These policies are known as risk management framework for the organizations to secure their data from the basic levels to advanced security settings. These include the steps for cyber security planning maturity, addressing process risks and elements related to personnel vulnerabilities.

©2018 Zapata Publishing (P)2018 Zach Webber

What listeners say about Cybersecurity: 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively

Average Customer Ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    65
  • 4 Stars
    7
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 5 out of 5 stars
  • 5 Stars
    67
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    66
  • 4 Stars
    7
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Statistics brings a lot of value

According to Techopedia, a network is a group of linked computers intended to allow the computers to share information amongst one another, like the internet, local area network (LAN), and wide area network (WAN). These networks can only exist if devices have a medium to transmit data through. This medium connects hardware together which allows the transfer of data and communication.

Today, these hardware components include PCs, intercommunications, switches, routers, WLAN devices, and servers. Without computers to connect to one another, there would be no need for a network. That being said, PCs are a critical component of networks. Each individual computer is referred to as a node in a network.

The more network security an individual has, the less chance there is of a hacker accessing their data and files.

Network security is the process by which measures are taken to prevent unauthorized access, misuse, or modification of information passed over a network. In other words, network security simply means that any computers accessing a private network are protected from any forms of cyber theft or manipulation.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

For greater computer security awareness!

This book covers verified steps and tactics on how to increase the level of Cybersecurity in the organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. Hence, the book provides policies and strategies meant to tackle the developing threats of cybercrime in a technologically dependent world.

Cybersecurity has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers. We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cybercrime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

It is not just enough to plug the hole but to also safeguard it against future attacks. The key is to be preventive and creative, rather than reactive to such attacks. These are all factors that need to be considered in the event of infiltration, but not all corporations have such protocols.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Now more than ever!

Cybercriminals tend to gravitate to the weakest point within the company defenses, and that usually means going after the personnel and the customers. Bank accounts have typically become part of the technology footprint; for example, with account information being contained on personal computers and mobile devices. The criminals would seek to compromise the data security in different ways, such as the installation of malware, often with phishing emails to compromise the data security of the customer and emulation of unsecured Wi-Fi facilities in restaurants, airports, and cafes. Thieves have been known to create fake accounts, so they direct traffic where they want it to go. It’s one of the biggest issues when it comes to the financial institutions, especially if multiple departments are responsible for the management of the risks that are related to cybersecurity. In an age where the cybercriminals are able to do a lot of damage, there is a case for the aligning or integration of different functions like fraud, IT security, and compliance.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Know tech vulnerabilities

Today’s world and its technological wonders bring many conveniences, but along with that come risks and a responsibility to understand the basics, to be able to lessen those risks and put protective measures in place. The following chapters will provide clear, easy-to-understand definitions and explanations for users at every level of expertise. It starts by describing cybersecurity and its various types and what they could mean to you. Next, you will learn about a variety of different cyber threats and proposes ways to protect yourself and/or your business from them in both the short and the long-term. It also describes careers in this growing and vital field, including engineer and analyst, among others. You will then learn all about how to maximize your personal cybersecurity to the fullest before learning about additional cybersecurity practices and means of protection to try. There are plenty of books on this subject on the market, thanks again for choosing this one! Every effort was made to ensure it is full of as much useful information as possible, please enjoy!

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Cyber security easy guide.

I adapted so much data and occasions about digital security that I once never knew. Very supportive for getting into the field. Spreads the fundamentals and enlightening. Each fledgling should peruse this to get an idea of the extent of the digital security issue and how to assault it.This book is such a great amount of superior to anything some in the weeds thing depicting a particular specialized ways to deal with a particular issue. This book explains to you where to begin and what sorts of specialists you have to enroll and the various parts of digital security that you have to consider. There was plenty of new material definitely worth the purchase. It really gives you a great cybersecurity representation of the model and how it all works together.

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

an American hero that fights against cyber crime!

The United States Government employees a fair portion of the contractor cybersecurity force in the country today. As such, that means if you want to ensure you are qualified for as many different positions as possible you will need to ensure that you are able to obtain security clearance for the type of work that can easily require access to secure information. Unfortunately, this can mean sticking to a fairly strict personal lifestyle as well. Depending on your level of security clearance, you may need to report when and where they travel, what their current debts might be and possibly even who they speak with. Failing to monitor such interactions, and a host of others could ultimately put your clearance in jeopardy. It is also a significant amount of work to obtain a higher security clearance, so it is up to you if access to many higher-paying jobs is worth the hassle. Cybersecurity job postings increased nearly 75 percent between 2012 and 2017 and, regardless of what type of career you are interested in pursuing, the job prospects are excellent across the board. What follows are some of the different job options that those in the cybersecurity industry are currently looking to explore. What follows are some of the most popular options on the market today.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Found at the last moment

In the last days of my research on a special topic on cybersecurity, I have discovered a book which was published in November 19th in 2018. The book title is "Cybersecurity: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively" by Zach Webber and narrated by William Bahl. This book talks about cybersecurity threats, attacks, incident respnse procedure, gives detailed information about attack scenarios and each stage of attacks, and also covers security policy topics. On the other hand, the technical language of the book is very understandable with full of examples and good structure. This book was very useful for my research and punlishing my paper and will be very helpful to pass my international certificate exam on Incident Response. I recommend this audio book to all incident responders, penetration testers, network and system security engineers and others who are interested in deep technical topics on cyber security, or willing to start their career in this field.

11 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great Book for Businesses

A business impact analysis is a crucial component when it comes to preparing a contingency plan in case your system is attacked in a serious way. This plan should provide your organization with two key components, interdependencies and a classification and characterization of relevant components. To plan for this type of scenario, an organization is going to need to address the accessibility of available resources including mission critical applications and systems, contact information for crucial external contacts, contact information for essential personnel and a secure communication channel for each. It is also important to have all major vendor contact details, points of contact when it comes to organizational procurement and back up ISO files for all critical applications and systems.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book,

All computers and devices are attacked by viruses, banking networks are attacked regularly, databases of the state are daily trying to be hacked . Someone wants to gain access to our information all the time and it must be reliably protected at all levels, and the more the security expert is aware, the more possible attempts to crack and steal data it can prevent. To protect my data and personal information I’d like to know more about cyber security in order to get my information safe.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Useful to ALL

The author has put together a true primer, useful to both novices and the more knowledgeable among us, on a critical topic of our times - cyber-security. Cyber is everybody's business but it is especially the business of organizations big and small from corporations to NGOs to government agencies. The author provides a clear-eyed, understandable, actionable approach to a subject that is new, rapidly changing and super-complex in its own right but is also often jargon heavy and intentionally made overly complicated by the "experts". Great job!

6 people found this helpful

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Beverly
  • Beverly
  • 06-20-20

Case in point: Take Cybersecurity seriously

It is relevant to call to attention that people are essentially the weakest connection as they are unpredictable and multi-faceted with their plans, flaws, and convictions. Indeed, even the most solidified framework can be broken through a demonstration of social engineering. There is no measure of secure networks and firewalls which can counter a client clicking on fishy emails or being persuaded into giving their own private passwords over the phone to individuals claiming to be from the client relations branch of an organization serving them. The reliance on automation also focuses on single points of failure, which would have a dramatic effect if coordinated at communication and transportation networks. Drawing from rising advances of driverless cars getting more known, the following shows a case study of what could happen if automated items keep on being made without taking cybersecurity into account.

In the future, the society will probably be run on an automated transportation system including cars, trains, and buses while drones monitor from the skies to check on crime and framework glitches. The advantage to be considered would be that this advance in technology will allow for a greater efficiency, as traffic jams will be a thing of the past. There will be lower instances of pollution, as cars will be running on EV systems and the transportation cost will be much cheaper or altogether nonexistent. In the worst case scenario, a cyberattack can compromise the entire system. The systems which coordinate the entire transportation network could be shut down, and that would bring the entire city to a standstill as the workers would not be able to get to and from work, which means the productivity comes to a halt. People on life support systems will definitely suffer, as would those who require daily services to maintain lifestyle conditions. Without essential services, chaos would soon ensue as people would
struggle to make ends meet and panic would happen. The city would be held hostage by foreign influence without the exertion of physical force, which is quite scary because it is quite easy to execute. This is an interesting dystopian theory, but it represents which society people are heading into, and the reason why cybersecurity needs to be prioritized above everything else.

Consider the fact that the internet has enabled new business models which have already shaped the way the world works. Even though search engines, social media, and ordering platforms are some of the most profitable companies that conduct business over the internet, cybercrime beats all of them. That shows just how lucrative fraud is because it operates and benefits on the ignorance of the majority of the 3.4 billion users in the world today.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Leslie Hummer
  • Leslie Hummer
  • 06-21-20

Important to Know

In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the credit card information of 56 million customers. The hack began when malware masquerading as antivirus software infected the POS systems of the company's stores. The company had to pay nearly twenty million dollars in damages and identity theft protection services to those whose information had been compromised.

In February 2015, the largest security breach in healthcare history occurred when a group of cyber criminals, allegedly sponsored by a foreign government, hacked into the Anthem Health Insurance website. The attack led to millions of names, addresses, dates of birth, and the personal health information of individuals insured by Anthem to become compromised. The breach began when an Anthem employee opened up a phishing email; that one email led to well over one hundred million dollars in damages.

In the fall of 2016, while Yahoo was in negotiations to sell itself to the company Verizon, it disclosed that back in 2014, it had been hacked. 500 million email addresses, real names, dates of birth, and other sensitive information that can lead to identity theft had all been hacked. In the early winter of 2016, it disclosed that it had also been similarly hacked back in 2013. This security breach led to compromising the information of one billion users. Yahoo lost $350 million in its sell price to Verizon, as well as its good name.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nicole  Dunigan
  • Nicole Dunigan
  • 06-22-20

Keeping you and your family safe

The text talks about the attack surface in different facilities depending on the mode that the infiltration uses. If the car, home, and security systems are integrated, then the attack surface becomes exponential because there is a high potential for serious damage if a hack is successful. Unfortunately, the dependence on technology is only increasing, and individuals are unwittingly becoming more vulnerable to the dangers, but they are not paying as much attention as needed to the considerable issues. The attack can come in various forms from ransomware, malware, and data manipulation. Data manipulation is when the hacker does not overtly declare their presence, but manipulates the data after discrete infiltration, such that they are able to surveil or change the outcome without the knowledge of the user. You also need to authenticate the external collaborators. There are inevitable risks which come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared for and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled. The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks. To avoid cybercrime from evolving, and to not become better at infiltration and such, cybersecurity needs to become a practice that adapts to growing problems.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mary  Stirling
  • Mary Stirling
  • 06-23-20

Comprehensive, doable, effective computer security

When it comes to the importance of ensuring the cybersecurity of your portable devices, only you can accurately determine what’s at risk besides the machine itself. However, with most portable devices these days, if the thief is able to access the information that is stored within it successfully, a lot more than the data directly on the device itself is at risk. You have likely heard stories about the uproar caused when a senior manager for one major corporation or another leaves a laptop or a smartphone somewhere they shouldn’t. Confidential information of this type can cause untold damage to a company, especially if it has something to hide. Even if your devices don’t have serious secrets hidden within, there is still enough on the average smart device to make your life very difficult if the wrong person gained access to it. Keep the following in mind when it comes to keeping your data private on the go. Computers are an important part of everyday life, but they can also lead to a wide variety of headaches if you don’t take the time to secure them properly, and this starts before you even connect a new computer to the internet. What follows are a number of suggestions to help secure your computer; it is important to keep in mind, however, that while they will help to minimize your risk, they won’t serve to remove it completely, so you will still need to practice safe internet usage for the best results.

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Evelyn
  • Evelyn
  • 09-30-19

If you're connected than LISTEN!

Zach Webber has written a genuinely useful book that should be listen by everyone involved in our 21st-century information technology ecosystem -- which essentially means that everyone should listen this book, whether you run a corporate IT shop or own a smart phone. Cyber risks are real and omnipresent. The potential liabilities are enormous. Again, it doesn't matter whether you run a large business or you're simply concerned about the security of your family's electronic devices -- if you're connected in any way, shape or form to the Internet, you need to listen this essential book!

15 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Sylvia  Livingston
  • Sylvia Livingston
  • 06-27-20

If you own an electronic device, please read.

Most mobile device users have absolutely no idea how frequently their locations are being pinged and stored in a company’s servers. Many free applications available for download in the Apple Store or Google Play Store are not actually free. There is a growing trend among app developers to collect your location using your phone or tablet’s GPS system, this is known as geo-tracking. This information is gathered in huge quantities and is bought by large business entities who utilize this data to study and accurately predict consumer behavior. Advertisers are always looking for new ways to capture your attention so that you will buy their product. If an app developer collects GPS locations from an individual on a daily basis, he or she could look at it and say, “Wow, this person seems to drive by a certain store every day.” This app developer then takes this information and sells it to the store that the individual in question drives by every day so that the individual can be targeted with advertisements. These advertisements could come in the form of emails or spam text messages. How can these stores know how to direct ads at specific individuals? The answer to this is that more than just the individual’s location data can be used for marketing. This app developer could have permissions that he or she will gain access to the phone’s personal information like contacts, emails, etc. This allows the app developer to not only sell an individual’s daily transit routes, as well as the information needed for advertisers to reach them specifically.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Patricia
  • Patricia
  • 09-30-19

Worth listening

Any book that attempt to describe anything about cybersecurity is worth listening because the author has decided to tackle a very complex subject. Based on his FBI experience, Zach Webber has the unique gift of explaining cybersecurity in simple terms so everyone can understand it. A must listen for everyone!

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Hall
  • Hall
  • 06-29-20

Online Security Made Easy

Broadband allows users to access the internet and its related services at higher speeds than what’s available through dial-up internet access services. The speeds differ based on the type and level of services offered. Broadband services deployed for residential consumers provide faster download speeds than upload speeds. There are two groups of broadband technologies: fixed-line broadband and wireless technologies. Fixed-line solutions communicate through physical networks that provide a direct wired connection from customer to service supplier. Wireless solutions, on the other hand, use radio or microwave frequencies to provide connections between operator and customer networks.

6 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Natalie
  • Natalie
  • 09-30-19

Audio book on Cybersecurity.

I found this to be a very good audio book on Cybersecurity. This book is very understandable and one that I will likely refer back to often. The authors provide excellent resources, tools and examples to refer to for further study.

5 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Randy
  • Randy
  • 09-30-19

Effective Methods

In this book, you will learn about the fundamental concepts of cyber security. These are facts that form the foundation of your knowledge in cyber security. The knowledge you gain from this book will help you understand the need to enhance your security online. I Love the includition of 3 Books in 1 and can not wait to use this book to help my team rewrite our curriculums. There is so much more to discover in this book. I quickly devoured it in one sitting. I will now go back to dig deep to map out how I am going to implement it with my teaching and to share it with my assistant instructors.

5 people found this helpful