• Cybersecurity 101: What You Absolutely Must Know! - Volume 2

  • Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More!
  • By: James Scott
  • Narrated by: Kelly Rhodes
  • Series: Cybersecurity 101, Book 2
  • Length: 1 hr and 36 mins
  • Unabridged
  • Release date: 02-08-16
  • Language: English
  • Publisher: James Scott
  • 3 out of 5 stars 3.0 (4 ratings)

Regular price: $6.95

Free with 30-day trial
Membership details Membership details
  • A 30-day trial plus your first audiobook, free
  • 1 credit/month after trial – good for any book, any price
  • Easy exchanges – swap any book you don’t love
  • Keep your audiobooks, even if you cancel
  • After your trial, Audible is just $14.95/month
Select or Add a new payment method

Buy Now with 1 Credit

By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Buy Now for $6.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Right now, you are in a battle to protect yourself and your family from hackers, and there is no white knight on horseback galloping to your rescue. Most of the so-called "experts" in the yellow pages are upstarts who, in most cases, know just as much as you about the problem but compensate by using virus scan programs that offer the illusion of expertise. Most computers have boilerplate antivirus software and perhaps some sort of firewall, but this is hardly enough to thwart malicious hackers from breaching your system.
The weakest link in cybersecurity is the human factor. You'll get an email that looks like it's from your boss or child's school, you'll click the link, and in microseconds your computer is contaminated with a virus that incapacitates your PC and you realize you've just been pwned!
Not all hackers are bad, but those who have malicious intent are typically categorized as script kiddies, hacktivists, mercenaries, or state sponsored. Each group carries with it a different motivation, target to breach, and data it seeks to exfiltrate. Script kiddies will typically wreak sporadic techno-chaos using cut-and-paste scripting methods from content they find on deep web hacker forums. Hacktivists usually target organizations of affiliates who are aligned with other organizations and affiliates that this category of hacker-activists deem ethically or economically corrupt or sided with the wrong side of group ideology.
Mercenary hackers will typically be part of a criminal enterprise that seeks financial gain for its activity and can work for crime syndicates or state sponsors. And finally, state-sponsored hackers will work for a government and target specific organizations and data for espionage and political motivation.
©2016 James Scott (P)2016 James Scott
Show More Show Less

Customer Reviews

Most Helpful
5 out of 5 stars
By Roger Swanson on 03-19-18

👍 Great overview with some tech detail

I would recommend this book as reference material for owners and technical supervisors in any organizations that are serious about protecting business, personal data or who are responsible for correctly handling business, customer and critical data.

Read More Hide me
4 out of 5 stars
By Ejamesmaul on 09-23-16

Very Entry Level

Would you listen to Cybersecurity 101: What You Absolutely Must Know! - Volume 2 again? Why?

Since it is only and hour and a half, I would probably listen to it again to brush up on things I may have missed the first time.

What did you like best about this story?

Easy to digest. Great for morning commutes to work.

Any additional comments?

Great for beginners, not much more than that. It very briefly goes over multiple topics/cyber security threats that companies should be aware of. If you have any technical knowledge in Cyber Security, this book will do little for you.

Read More Hide me

0 of 1 people found this review helpful

See all Reviews

Customer Reviews

Most Helpful
4 out of 5 stars
By Dan on 05-13-16

Intuitive information delivery, easy to follow.

Great general overview of today's security challenges with ways to identify and mitigate them. Suitable for beginners seeking a career in information security.

Read More Hide me
See all Reviews
© Copyright 1997 - 2018 Audible, Inc