Episodes

  • Cyber Risks and Insurance: The Legal Principles
    Nov 22 2024
    The Book present a comprehensive analysis of cyber risks and insurance, particularly in relation to the legal principles and regulations governing data protection, cybersecurity, and the impact of artificial intelligence. The sources examine various legal frameworks, including the General Data Protection Regulation (GDPR), the Data Protection Act 2018 (DPA 2018), the Privacy and Electronic Communications (EC Directive) Regulations 2003 (PECR), and the Network and Information Systems Regulations 2018 (NIS Regulations). They further explore the legal remedies available for victims of cyber attacks, including injunctions, freezing orders, and Norwich Pharmacal relief. Additionally, the sources delve into the specific considerations for the insurance industry, including the growth of cyber insurance, the use of blockchain technology in insurance, and the common exclusion clauses found in cyber insurance policies.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cyber-Risks-Insurance-Legal-Principles/dp/1526514133?&linkCode=ll1&tag=cvthunderx-20&linkId=2e7aca506090ba4091a53b421092cffb&language=en_US&ref_=as_li_ss_tl

    Show more Show less
    14 mins
  • Cyber Crime Investigator's Field Guide
    Nov 22 2024
    The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The guide explores various aspects of cybercrime, covering topics such as network security, forensics tools, common cyberattacks, and emerging technologies like transhumanism. The author, Bruce Middleton, shares his extensive experience in the field, emphasizing the importance of understanding network architecture, recognizing attack signatures, and leveraging open-source intelligence. The guide also features detailed case studies, recommended reference materials, and a Q&A section to further aid investigators in their work.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cyber-Crime-Investigators-Field-Guide/dp/0367682303?&linkCode=ll1&tag=cvthunderx-20&linkId=cb1289791c435f3a26e5b61030647e7a&language=en_US&ref_=as_li_ss_tl
    Show more Show less
    45 mins
  • Cuckoo Malware Analysis
    Nov 22 2024
    The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cuckoo Sandbox, an open-source automated malware analysis system, providing instructions on its installation, configuration, and usage. It explores various features of Cuckoo Sandbox, such as analyzing different file types like Word documents, PDF files, and executables, along with performing memory forensics using Volatility. The excerpt also touches upon advanced topics, including hardening Cuckoo Sandbox against VM detection, integrating it with the Maltego project using Cuckooforcanari, and automating email attachment analysis with Cuckoo MX.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cuckoo-Malware-Analysis-Digit-Oktavianto/dp/1782169237?&linkCode=ll1&tag=cvthunderx-20&linkId=ea28732cbbd370cca4c64d11b2603f1c&language=en_US&ref_=as_li_ss_tl
    Show more Show less
    16 mins
  • Cryptography and Network Security: Principles and Practice
    Nov 22 2024
    The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, covering security attacks, services, and mechanisms, before delving into symmetric and asymmetric encryption techniques. The text explores classical encryption methods like the Caesar cipher and the Playfair cipher, then progresses to modern block ciphers like DES and AES. The source also examines key management and distribution, focusing on public-key cryptography, digital signatures, and hash functions. It delves into authentication protocols like Kerberos, secure shell, and network access control mechanisms, including EAP and 802.1x. Finally, the text discusses IPsec, SSL, and wireless security, including WPA2 and mobile device security. The text aims to equip readers with a foundational understanding of cryptography and network security, while exploring practical applications and challenges.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cryptography-Network-Security-Principles-Practice/dp/0133354695?&linkCode=ll1&tag=cvthunderx-20&linkId=36c4077192cebb07725a2565f7c5d15a&language=en_US&ref_=as_li_ss_tl

    Show more Show less
    25 mins
  • SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
    Nov 22 2024
    The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals preparing for the Certified Secure Software Lifecycle Professional (CSSLP) exam. The book covers a wide range of topics related to secure software development, from secure coding practices and threat modeling to software testing strategies and risk management. The book provides practical guidance on building secure systems and implementing security controls throughout the software lifecycle.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Certified-Secure-Software-Lifecycle-Professional/dp/1264258208?&linkCode=ll1&tag=cvthunderx-20&linkId=893e8bb3c84e7fb054a71b4fc67bceb8&language=en_US&ref_=as_li_ss_tl

    Show more Show less
    12 mins
  • Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
    Nov 22 2024
    The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and decrypt data. It covers various techniques from classical ciphers like the Caesar cipher and ROT13 to modern encryption algorithms like AES and RSA. The book also explains hashing techniques, including MD5 and SHA, used for file integrity checks and password obfuscation. In addition to providing code examples and challenges, the book explores vulnerabilities like the padding oracle attack and discusses the importance of concepts such as confusion and diffusion in strong encryption methods.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Hands-Cryptography-Python-Leverage-encrypt-ebook/dp/B07F73GW7Y?&linkCode=ll1&tag=cvthunderx-20&linkId=5d997c5aa32cd42a5ac52107f7a7bba5&language=en_US&ref_=as_li_ss_tl

    Show more Show less
    15 mins
  • Cryptography and Network Security
    Nov 22 2024
    This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergraduate students, is a comprehensive resource covering the fundamental concepts and applications of cryptography and network security. The text focuses on numerous aspects including information theory, network protocols, malicious codes, network security vulnerabilities, and cryptography algorithms. The book explores the history of these topics, the mathematical principles behind them, and the real-world applications, including examples of famous cybercrimes and the evolution of the Internet. The text emphasizes the importance of understanding these concepts in the modern world, where data security and privacy are crucial.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:


    Show more Show less
    7 mins
  • The Security Risk Assessment Handbook
    Nov 22 2024
    The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, analyzing, and mitigating risks to an organization's assets. The guide delves into various aspects of security risk assessment, including administrative data gathering, technical data gathering, physical data gathering, risk analysis, and risk mitigation. It provides practical insights and tools for security professionals, offering examples, checklists, decision techniques, and real-world scenarios to assist in conducting effective security risk assessments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Security-Risk-Assessment-Handbook-Assessments/dp/103204165X?&linkCode=ll1&tag=cvthunderx-20&linkId=0399175cb49159faabc58aedcc4d8f23&language=en_US&ref_=as_li_ss_tl

    Show more Show less
    17 mins