Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

TTC Audio - Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Posted By: serpmolot
TTC Audio - Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

TTC Audio - Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Audiobook | English | 2013 | mp3 | 2 ch 96 kbps | 9 hrs 40 min | 404 MB
eLearning | Course No.9523

Cyberspace is the 21st century’s greatest engine of change. And it’s everywhere. Telecommunications, commercial and financial systems, government operations, food production—virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Which makes keeping these systems safe from threat one of the most pressing problems we face.

There are billions of Internet users connected to one another, and every minute, these parties create mind-boggling amounts of new information and data. Yet because cyberspace is so vast, flexible, and unregulated (and because it grows in leaps and bounds every year), all these users are highly vulnerable to dangers from cyber criminals, rogue nation-states, and other outside forces.

Just how important an issue is cybersecurity? Consider these points:

- Every minute, individuals and organizations hack multiple websites around the world.
- Each year, experts discover millions of new pieces of malware designed to illegally tamper with computer systems.
- Yearly, cyber crime leads to astounding global monetary losses of billions and billions of dollars.
- In just a single year, millions of people will find themselves the victims of cyber identity fraud.

Public policymakers and technology experts agree: Cybersecurity and the issues associated with it will affect everyone on the planet in some way. That means the more you know about this hot-button topic, the better prepared you’ll be to protect yourself, to weigh in on the political and ethical issues involved, and to understand new threats (and new solutions) as they emerge.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig of The George Washington University Law School, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers. Combining an expert lecturer with a fascinating topic, this course is a riveting learning experience that immerses you in the invisible world of codes, computer viruses, and digital espionage, and offers an enthralling look at the high-stakes battles of tomorrow.

Explore the Range of Cyber Threats Out There

Thinking about Cybersecurity is laid out in a clear, systematic fashion so that you never feel overwhelmed by a topic that can seem mindboggling. Professor Rosenzweig starts by giving you a solid foundation of how the Internet and cyberspace are built, why cyber systems work the way they do, and how technical experts and scientists have attempted to “map” them out.

From there, you’ll take a comprehensive look at the different types of viruses and vulnerabilities infecting the cyber domain and interfering with both technology and the real aspects of life that technology supports. You’ll explore an entire cyber arsenal of threats both large and small, including

- spiders, automated programs that crawl around the Internet and harvest personal data;
- keystroke loggers, programs that actually capture the keystrokes entered on a computer’s keyboard; and
- advanced persistent threats, which intrude into computer systems for long periods of time and make computers vulnerable to continuous monitoring.

And those are only a few. Using case studies drawn straight from contemporary headlines, Professor Rosenzweig gives you a solid grasp of who in cyberspace is using these and other weapons—individual hackers, “hacktivists,” crime syndicates, and, increasingly, large nations—and what their motivations are for doing so.

Probe Intriguing Cybersecurity Issues

While we can never completely protect cyberspace from threat, we are far from helpless. Thinking about Cybersecurity focuses on some of the high-tech methods corporations and governments are developing and using to find cyber threats, protect themselves from future attacks, track down perpetrators, and stave off the threat of all-out cyber war.

But you’ll also go deeper than that. You’ll examine the intricate law and policy issues involved in dealing with these threats.

- How do government constitutions both protect civil liberties and limit the ability of people to protect themselves?
- How should privacy be defined in a modern world where personal data can now be tracked and shared?
- Should cyber warfare follow the same rules of armed conflict that exist on the physical battlefield, or do we need to come up with new ethics and rules?

In addition, you’ll get a chance to place everything you’ve learned about cybersecurity in the context of everyday life. Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.

Understand, Manage, and Reduce Your Risks

Central to Thinking about Cybersecurity is Professor Rosenzweig’s expertise in this relatively new field. As a former deputy assistant secretary for policy in the U.S. Department of Homeland Security, an author of noted books on cyberspace and national security, and a frequent lecturer on cybersecurity law and policy, he is the perfect guide for a journey deep into the heart of this all-important subject.

Accompanying his informative lectures are a wealth of dynamic green-screen effects, 3-D animations, and other visual tools that help you understand

- theoretical views of cyberspace,
- how information spreads around the world,
- how viruses attack computer systems, and
- how special tools and programs block those attacks.

By actually immersing you in the cyber world, the green-screen sequences in particular make learning about cybersecurity more engaging and visually accessible than anything you could find in a textbook.

Professor Rosenzweig takes care to emphasize throughout Thinking about Cybersecurity that the situation is never hopeless, despite the seriousness of cybersecurity threats and the rapidly evolving challenges they present. “Internet openness brings risks and dangers that cannot be eliminated,” he notes. “But they are risks that can be understood, managed, and reduced. By the end of this course, you’ll have a greater appreciation for what governments and individuals are doing—and can do—to reduce these risks.”


1 Stuxnet—The First Cyber Guided Missile
2 The Incredible Scope of Cyberspace
3 The Five Gateways of Internet Vulnerability
4 Of Viruses, Botnets, and Logic Bombs
5 The Problem of Identity on the Network
6 Cyber Fraud, Theft, and Organized Crime
7 Hacktivists and Insurgency
8 Nations at Cyber War
9 Government Regulation of Cyberspace
10 International Governance and the Internet
11 The Constitution and Cyberspace
12 Big Data—“They” Know Everything about You
13 Privacy for the Cyber Age
14 Listening In and Going Dark
15 The Devil in the Chips—Hardware Failures
16 Protecting Yourself in Cyberspace
17 Critical Infrastructure and Resiliency
18 Looking Forward—What Does the Future Hold?


NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


TTC Audio - Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Uploaded.net
Course Guidebook.pdf

TGC_9523_Lect01_Cybersecurity.mp3
TGC_9523_Lect02_Cybersecurity.mp3
TGC_9523_Lect03_Cybersecurity.mp3
TGC_9523_Lect04_Cybersecurity.mp3
TGC_9523_Lect05_Cybersecurity.mp3
TGC_9523_Lect06_Cybersecurity.mp3
TGC_9523_Lect07_Cybersecurity.mp3
TGC_9523_Lect08_Cybersecurity.mp3
TGC_9523_Lect09_Cybersecurity.mp3
TGC_9523_Lect10_Cybersecurity.mp3
TGC_9523_Lect11_Cybersecurity.mp3
TGC_9523_Lect12_Cybersecurity.mp3
TGC_9523_Lect13_Cybersecurity.mp3
TGC_9523_Lect14_Cybersecurity.mp3
TGC_9523_Lect15_Cybersecurity.mp3
TGC_9523_Lect16_Cybersecurity.mp3
TGC_9523_Lect17_Cybersecurity.mp3
TGC_9523_Lect18_Cybersecurity.mp3

Keep2share.cc
http://k2s.cc/file/0c9831bc7224b/Course_Guidebook.pdf
http://k2s.cc/file/3fad9a0ae34b1/TGC_9523_Lect01_Cybersecurity.mp3
http://k2s.cc/file/fa258cb1b98e3/TGC_9523_Lect02_Cybersecurity.mp3
http://k2s.cc/file/f731867a25202/TGC_9523_Lect03_Cybersecurity.mp3
http://k2s.cc/file/dd281f2ec70a9/TGC_9523_Lect04_Cybersecurity.mp3
http://k2s.cc/file/21cfc567ec77e/TGC_9523_Lect05_Cybersecurity.mp3
http://k2s.cc/file/8fb99fdc33750/TGC_9523_Lect06_Cybersecurity.mp3
http://k2s.cc/file/e35d7dc389033/TGC_9523_Lect07_Cybersecurity.mp3
http://k2s.cc/file/6df16ff71926a/TGC_9523_Lect08_Cybersecurity.mp3
http://k2s.cc/file/cd80215ca20bd/TGC_9523_Lect09_Cybersecurity.mp3
http://k2s.cc/file/0dc432f338354/TGC_9523_Lect10_Cybersecurity.mp3
http://k2s.cc/file/6e2a1e26226fa/TGC_9523_Lect11_Cybersecurity.mp3
http://k2s.cc/file/ce4646a03eb77/TGC_9523_Lect12_Cybersecurity.mp3
http://k2s.cc/file/2eb54fc658a7c/TGC_9523_Lect13_Cybersecurity.mp3
http://k2s.cc/file/7d04b703c594b/TGC_9523_Lect14_Cybersecurity.mp3
http://k2s.cc/file/3d71a44968d71/TGC_9523_Lect15_Cybersecurity.mp3
http://k2s.cc/file/b2c0e9831138e/TGC_9523_Lect16_Cybersecurity.mp3
http://k2s.cc/file/cbed038d25a34/TGC_9523_Lect17_Cybersecurity.mp3
http://k2s.cc/file/da78d9d78a575/TGC_9523_Lect18_Cybersecurity.mp3