Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

  • by The Great Courses
  • Narrated by Professor Paul Rosenzweig
  • 9 hrs and 40 mins
  • Lecture

Publisher's Summary

Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.
In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.
Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.


See More Like This

Customer Reviews

Most Helpful

A well-packaged set of zero surprises.

Would you say that listening to this book was time well-spent? Why or why not?

The lecture format is pretty good, but this book wasn't for me because I am fairly well versed in security as a whole.

Would you recommend Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare to your friends? Why or why not?

For people outside of security, it's a great overview. For Execs, it's a great primer, even if a bit out of date. People inside security will find their time better spent elsewhere.

Which scene was your favorite?

I will give the professor credit for being dynamic with his presentation.

Could you see Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare being made into a movie or a TV series? Who should the stars be?


Any additional comments?

I've spent the last 20+ years in information technology and have been responsible for the attack surface of a multi-million dollar organization for the last 15. While I would say there is some good information here for executive types, I find some of the professor's attitudes - specifically those around personal privacy - creepy and disturbing at best. He's clearly spent too much time around DHS and other policy types.

Read full review

- Todd Algren

Cybersecurity is for Anyone Who Uses the Internet

I listened to this book (Cybersecurity) right after listening to, "We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency" (Anonymous) by Parmy Olson, for the second time and while attending a practical application cyber security course. While Cybersecurity is a much better presentation on understanding fundamentals of the digital network threat, Anonymous is an anecdotal account of what happens when those with the capabilities and intentions wreak havoc on the unassuming as well as those who've gone to great lengths to try to protect themselves.

This book goes from point A to point Z of how computers communicate through the network and then points out the inherent vulnerabilities each system/user has and how to implement protective measures. The author opens with STUXNET but uses many other examples (to include Sabu of Anonymous and Lulzsec fame) to set the stage of what has and could/will happen with Cyber Warfare.

The 'Great Courses' presentation is not as digestible as a regular audio book, partly because the narrator is not an actor who has done several audiobooks (although you'd think a professor would be in tune with how consumable his presentation is) and because understanding of complex technical jargon is tough to visualize for a layman. Although I was able to listen at 3X speed without any interruption, (I just didn't like the flow or his voice) others may find following along difficult.. Also, several times during the lectures the professor acknowledges that this recording is for video and audio purposes, but seems to default to his visual audience (i.e., asking the listener to look at his hand gestures or a display).

My favorite chapter was the final one about what we should be doing regarding protecting the overall internet structure. He presents multiple cases of how regulating and removing anonymity from the internet would help in preventing future cyber crime. However he points out that this is really a philosophical argument that doesn't have an easy answer. Regulations remove the power of the internet that truly allows free speech without worry of government tracking and tyranny. However, this can't be the only argument because of the exponential power of rogue actors writing code that infects ignorant unprotected user's systems that then work in concert without the user realizing they are facilitating crimes. The professor's theory (that I absolutely agree): encourage users to study and better understand the capabilities and vulnerabilities of the internet.

Read full review

- Jonathan Love

Book Details

  • Release Date: 07-08-2013
  • Publisher: The Great Courses