Listening in
Title | Listening in PDF eBook |
Author | Susan Eva Landau |
Publisher | Yale University Press |
Pages | 238 |
Release | 2017-01-01 |
Genre | Computers |
ISBN | 0300227442 |
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Cybersecurity Leadership
Title | Cybersecurity Leadership PDF eBook |
Author | Dr. Mansur Hasib |
Publisher | Tomorrow's Strategy Today |
Pages | 182 |
Release | 2022-08-02 |
Genre | Computers |
ISBN |
This book enables newcomers, business professionals as well as seasoned cybersecurity practitioners and marketers to understand and to explain the discipline to anyone. This book is not about technology and no technical knowledge or prior background is required to understand this book. The book is also highly recommended as a general management and leadership book. Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process. Too many people equate cybersecurity with computer science even though cybersecurity is a business discipline. Written by Dr. Mansur Hasib a globally acclaimed scholar, practitioner, and author with a Doctor of Science in cybersecurity and over ten years experience designing and running award-winning cybersecurity education programs on a global scale. The author also served as Chief Information Officer and implemented profitable digital transformations and cybersecurity strategy in healthcare, biotechnology, education, and energy for more than 30 years. This book is widely acclaimed by practitioners and scholars alike as the definitive book on cybersecurity leadership and governance. Dr. Hasib is a sought after speaker and has won multiple global awards such as: 2020 Cybersecurity Champion of the Year; 2020 People's Choice Award in Cybersecurity; 2019 Best Cybersecurity Higher Education Program in the USA; 2019 Outstanding Global Cybersecurity Leadership; 2018 Best Cybersecurity Higher Education Program in the USA; 2018 Hall of Fame; 2017 People's Choice Award in Cybersecurity; 2017 Information Governance Expert of the Year; 2017 (ISC)2 Americas ISLA Award. Dr. Hasib enjoys table tennis, comedy, and travel and has been to all 50 states of the USA. Twitter @mhasib Subscribe free to YouTube Channel with 200+ videos: https://www.youtube.com/@DrMansurHasib Contact for speaking invites and author-signed books: https://www.cybersecurityleadership.com
What Is Cybersecurity?
Title | What Is Cybersecurity? PDF eBook |
Author | Haq Kamar |
Publisher | Encyclopaedia Britannica |
Pages | 35 |
Release | 2017-12-15 |
Genre | Juvenile Nonfiction |
ISBN | 1680488554 |
Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online threats, including viruses and malware. They will learn how different dangers spread and some basic steps to stop or prevent them. Additionally, this book will illuminate the scary consequences of falling prey to those threats, such as having personal information stolen or deleted, and cyberstalking.
Making Sense of Cybersecurity
Title | Making Sense of Cybersecurity PDF eBook |
Author | Thomas Kranz |
Publisher | Simon and Schuster |
Pages | 457 |
Release | 2022-11-29 |
Genre | Computers |
ISBN | 1638356262 |
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategy Detect rogue WiFi networks and safely browse on public WiFi Protect against physical attacks utilizing USB devices or building access cards Use the OODA loop and a hacker mindset to plan out your own attacks Connect to and browse the Dark Web Apply threat models to build, measure, and improve your defenses Respond to a detected cyber attack and work through a security breach Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness. Foreword by Naz Markuta. About the technology Someone is attacking your business right now. Understanding the threats, weaknesses, and attacks gives you the power to make better decisions about how to secure your systems. This book guides you through the concepts and basic skills you need to make sense of cybersecurity. About the book Making Sense of Cybersecurity is a crystal-clear overview of common cyber threats written for business and technical readers with no background in security. You’ll explore the core ideas of cybersecurity so you can effectively talk shop, plan a security strategy, and spot your organization’s own weak points. By examining real-world security examples, you’ll learn how the bad guys think and how to handle live threats. What's inside Develop and improve your cybersecurity strategy Apply threat models to build, measure, and improve your defenses Detect rogue WiFi networks and safely browse on public WiFi Protect against physical attacks About the reader For anyone who needs to understand computer security. No IT or cybersecurity experience required. About the author Tom Kranz is a security consultant with over 30 years of experience in cybersecurity and IT. Table of Contents 1 Cybersecurity and hackers 2 Cybersecurity: Everyone’s problem PART 1 3 Understanding hackers 4 External attacks 5 Tricking our way in: Social engineerin 6 Internal attacks 7 The Dark Web: Where is stolen data traded? PART 2 8 Understanding risk 9 Testing your systems 10 Inside the security operations center 11 Protecting the people 12 After the hack
Cybersecurity for Business
Title | Cybersecurity for Business PDF eBook |
Author | Larry Clinton |
Publisher | Kogan Page Publishers |
Pages | 265 |
Release | 2022-04-03 |
Genre | Business & Economics |
ISBN | 1398606391 |
Balance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue. Important and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate reputation and consumer confidence. Over the past several years, organizations around the world have increasingly come to appreciate the need to address cybersecurity issues from a business perspective, not just from a technical or risk angle. Cybersecurity for Business builds on a set of principles developed with international leaders from technology, government and the boardroom to lay out a clear roadmap of how to meet goals without creating undue cyber risk. This essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms. It then describes the roles and responsibilities each part of the organization has in implementing an effective enterprise-wide cyber risk management program, covering critical issues such as incident response, supply chain management and creating a culture of security. Bringing together a range of experts and senior leaders, this edited collection enables leaders and students to understand how to manage digital transformation and cybersecurity from a business perspective.
Schneier on Security
Title | Schneier on Security PDF eBook |
Author | Bruce Schneier |
Publisher | John Wiley & Sons |
Pages | 442 |
Release | 2009-03-16 |
Genre | Computers |
ISBN | 0470505621 |
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.
The Perfect Weapon
Title | The Perfect Weapon PDF eBook |
Author | David E. Sanger |
Publisher | Crown |
Pages | 402 |
Release | 2018-06-19 |
Genre | Political Science |
ISBN | 0451497910 |
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend the 2016 U.S. election from interference by Russia, with Vladimir Putin drawing on the same playbook he used to destabilize Ukraine. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target. “Timely and bracing . . . With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the twenty-first century.”—Washington Post