Digital Earth: Cyber threats, privacy and ethics in an age of paranoia
Written by Sarah Katz
Narrated by Georgina Morton
()
About this audiobook
Whether it's the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years. Issues surrounding phishing, misinformation, cyber terrorism, physical security, and privacy continue to arise for both individual users and large enterprises.
With technology an intrinsic part of our everyday lives, we need to be aware of digital threats, and be able to identify other threats such as phishing, ransomware, and spyware before they can wreak havoc in our professional or personal lives.
This book discusses the most prevalent technological threats that we face today. It is an accessible guide that highlights the most common cyber attacks, and explores data ethics and privacy in an age where we hold so much of our PII (personally identifiable information) online.
It covers cyber threats such as phishing, disinformation versus misinformation in a post-COVID-19 world, cyber terrorism, and the power of social media, and analyzes ever-evolving privacy concerns in response to technological advances. For example, does the use of drones by law enforcement offer us complete security or raise questions around the privacy of citizens?
The book focuses on:
- The spike in phishing amid the COVID-19 pandemic
- Cyber terrorism
- The risks associated with social media
- Whether drones are a search-and-rescue solution or the all-seeing eye in the sky
Sarah Katz
Sarah Katz is a graduate of UC Berkeley with a background in cybersecurity. She works as a Technical Writer at Microsoft, and previously worked at NASA. Her writing has appeared in Cyber Defense Magazine, Dark Reading, Infosecurity Magazine, and Tech Xplore. Sarah has served as a cybersecurity speaker for the Brazilian technical institute IGTI, and is pursuing a PhD in cyberpsychology with a focus on user security in augmented reality. The short film “Rationale” – currently in production – based on her eponymous short story and published in Thriller Magazine, is about the risks of using mood-altering technology to enhance cognition.
Related to Digital Earth
Related audiobooks
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCyber Warfare in 2022+ Rating: 0 out of 5 stars0 ratingsThe Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Sustainably Investing in Digital Assets Globally Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsThe Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Advanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsThe Battle for Your Computer: Israel and the Growth of the Global Cyber- Security Industry Rating: 0 out of 5 stars0 ratingsExploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsRansomware Protection Playbook Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Obfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsBreached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Malware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Digital Grooming: Discourses of Manipulation and Cyber-Crime Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsManipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Rating: 4 out of 5 stars4/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5
Security For You
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsThe Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Blockchain For Dummies Rating: 5 out of 5 stars5/5
Reviews for Digital Earth
0 ratings0 reviews