Audiobook11 hours
Cybersecurity and Cyberwar: What Everyone Needs to Know
Written by P. W. Singer and Allan Friedman
Narrated by Sean Pratt
Rating: 4.5 out of 5 stars
4.5/5
()
About this audiobook
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times bestselling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of twenty-first-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what we can do. Along the way, they take listeners on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and Cyberwar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.
Author
P. W. Singer
P. W. SINGER is an expert on twenty-first-century warfare. His award-winning nonfiction books include the New York Times bestseller Wired for War.
More audiobooks from P. W. Singer
Ghost Fleet: A Novel of the Next World War Rating: 4 out of 5 stars4/5LikeWar: The Weaponization of Social Media Rating: 4 out of 5 stars4/5Burn-In Rating: 4 out of 5 stars4/5
Related to Cybersecurity and Cyberwar
Related audiobooks
Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Biggest Cyber Crimes in the History Rating: 5 out of 5 stars5/5Schneier on Security Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Cyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Rating: 4 out of 5 stars4/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 3 out of 5 stars3/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsThe Internet Things Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsThe Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Computing: A Concise History Rating: 4 out of 5 stars4/5
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5
Reviews for Cybersecurity and Cyberwar
Rating: 4.275 out of 5 stars
4.5/5
60 ratings5 reviews
- Rating: 5 out of 5 stars5/5Amazing insight through history and current day comparisons and wisdom
1 person found this helpful
- Rating: 5 out of 5 stars5/5Very detailed description of the challenges in cyber security. Very nice.
1 person found this helpful
- Rating: 5 out of 5 stars5/5Great analyses and outstanding presentation. I enjoyed it and it’s been useful.
1 person found this helpful
- Rating: 5 out of 5 stars5/5Cybercrime is real even though We don’t see it is here !
Don’t ignore it ! Get involve , learn and implement it !
Knowledge is Power!
Ignorance is dangerous and costly! - Rating: 5 out of 5 stars5/5Singer and Friedman argue that cyber knowledge needs to be a requirement in schools. All the kids are now in cyberspace yet there is little formal education about the insecurity of simple passwords, the importance of OS updates, and problems inherent in social networking as a mechanism to reveal personal information. Most common password="password" and the 2nd most common is "123456". Common words are easily hack-able. One high level executive told his IT people he only wanted a one letter password, that he was too busy to be bothered to type in a long one. By the end of the day he had labelled himself to everyone in the corporation as a really stupid person and one who didn't care about security.With complexity comes vulnerability. BMW had designed a high tech car and when authorities in Paris couldn't figure out why only a certain new model of BMW was being stolen they reviewed CCTV cameras and discovered how the thieves could hack into the car's software, unlock the doors, reprogram a blank key and just drive off, all in the pace of five minutes. Terrorists use social networking to get their word out and often with the unwilling connivance of the West. One terrorist cell was using a web hosting company located in Texas to promote their campaign. The hosting company had sixteen million web pages, had not seen the offending pages, and did nothing until someone happened to point out to them what they were doing.Humans are often the weak link in the chain. In a famous "candy drop" attack, malevolent actors left flash drives around a military base. Sure enough, a soldier picked one up and inserted it in his machine to see what was on it. It took the Army 14 months to clean up the damage to all its machines. People will often just give out their passwords to official sounding individuals who may or may not be really who they say they are. In another example, some soldiers in Iraq took pictures inside their helicopters and posted them to a picture website. There was nothing classified in the pictures but each picture contained locational information in the meta-data and terrorist were able to destroy the helicopters in a mortar attack by knowing their exact location. Emails, pictures, virtually everything that moves on the Internet has meta-data attached to it and just a routine search of social sites can reveal all sorts of information about people they would rather not have knownJust defining what is or is not an attack can be problematic. The authors identify several types. What the response should be may depend on the severity or the result. Often even experts can't agree on what constitutes an attack. How about denial of service attacks. If it simply interferes with gamers ability to finish a game it's not as serious as preventing banks from interacting with their customers or delivering a utility. Is stealing someone's identity in a confidentiality attack just as serious as stealing the plans of a new fighter jet? In one war game sponsored by the U.S. the opposition team changed the shipping labels on shipments intended for troops and they received toilet paper instead of ammunition and MREs.NSA surveillance practices have caused tension throughout the world. In one instance, the Dutch, were about to refuse any access to cloud services in the Netherlands to U.S. companies. Some foreign countries have now begun to institutionalize the Internet as a basic human right. Authoritarian regimes, on the other hand, see internet freedom as a threat to their governments. Censorship is seen as a tool for stability. In Thailand it's against the law to defame the monarch; in Britain it's a hobby. Cultural differences abound. Internet governance is still up for grabs.A really interesting book, aimed at the informed layperson. The problem with books of such currency is that they really lack timelessness because of the speed with which the technology changes so the reader has to assume the possibilities have advanced far beyond what the author has explained.