Cybersecurity Bundle: 4 Books in One Audiobook By Tom Brooks cover art

Cybersecurity Bundle: 4 Books in One

The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path

Preview

Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Cybersecurity Bundle: 4 Books in One

By: Tom Brooks
Narrated by: Tom Brooks
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $14.95

Buy for $14.95

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel

About this listen

By Tom Brooks - Federal Trade Commission - US Department of Defense - CIS Agency

Have you been worried about your own personal safety, as well as security, as the tech world continues to grow and threats increase per day?

As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. Since info from our bank account to our zip code, social security numbers, and so much more have all been encrypted into the depths of our tech devices, it’s only natural for you to worry about your own safety when you know the extent of your vulnerability and dependency upon the technology around you.

Is cybersecurity possible?

The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place. This effort has led to much debate around the question of whether cyber deterrence is possible.

Answering this question is difficult, since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance. The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible. To be effective, this strategy must be multilayered and use all instruments of US national power.

Cybersecurity for Small Business

You may have heard about the NIST Cybersecurity Framework, but what exactly is it? And does it apply to you?

NIST is the National Institute of Standards and Technology at the US Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The framework is voluntary. It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection. You can put the NIST Cybersecurity Framework to work in your business in these five areas: identify, protect, detect, respond, and recover. Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.

Cybersecurity Career Path

Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations. The cyber career pathway can include none, one, all, or any combination of similar endorsements. However, none are actually required to become a cybersecurity expert. Employers may have requirements for a candidate, which they trust are enough to demonstrate the necessary qualifications. However, one’s proficiency and expertise in cybersecurity is often determined by their inquisitive nature, problem solving skills, technical aptitude, and their ability to understand the interdependencies of people, systems, and applications.

©2021 Tom Brooks (P)2021 Tom Brooks
Security & Encryption Computer Security Hacking Cyberattack
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Cybersecurity Bundle: 4 Books in One

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.