Gratuit avec l’offre d'essai

Écouter avec l’offre

  • Cybersecurity Bundle: 4 Books in One

  • The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
  • De : Tom Brooks
  • Lu par : Tom Brooks
  • Durée : 4 h et 23 min

Écoutez en illimité un large choix de livres audio, créations & podcasts Audible Original et histoires pour enfants.
Recevez 1 crédit audio par mois à échanger contre le titre de votre choix - ce titre vous appartient.
Gratuit avec l'offre d'essai, ensuite 9,95 €/mois. Résiliez à tout moment.
Couverture de Cybersecurity Bundle: 4 Books in One

Cybersecurity Bundle: 4 Books in One

De : Tom Brooks
Lu par : Tom Brooks
Essayer pour 0,00 €

9,95 € par mois après 30 jours. Résiliez à tout moment.

Acheter pour 13,42 €

Acheter pour 13,42 €

Utiliser la carte qui se termine par
En finalisant votre achat, vous acceptez les Conditions d'Utilisation. Veuillez prendre connaissance de notre Politique de Confidentialité et de notre Politique sur la Publicité et les Cookies.
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !

    Description

    By Tom Brooks - Federal Trade Commission - US Department of Defense - CIS Agency

    Have you been worried about your own personal safety, as well as security, as the tech world continues to grow and threats increase per day?

    As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. Since info from our bank account to our zip code, social security numbers, and so much more have all been encrypted into the depths of our tech devices, it’s only natural for you to worry about your own safety when you know the extent of your vulnerability and dependency upon the technology around you.

    Is cybersecurity possible? 

    The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place. This effort has led to much debate around the question of whether cyber deterrence is possible.

    Answering this question is difficult, since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance. The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible. To be effective, this strategy must be multilayered and use all instruments of US national power.

    Cybersecurity for Small Business

    You may have heard about the NIST Cybersecurity Framework, but what exactly is it? And does it apply to you?

    NIST is the National Institute of Standards and Technology at the US Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The framework is voluntary. It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection. You can put the NIST Cybersecurity Framework to work in your business in these five areas: identify, protect, detect, respond, and recover. Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.

    Cybersecurity Career Path

    Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations. The cyber career pathway can include none, one, all, or any combination of similar endorsements. However, none are actually required to become a cybersecurity expert. Employers may have requirements for a candidate, which they trust are enough to demonstrate the necessary qualifications. However, one’s proficiency and expertise in cybersecurity is often determined by their inquisitive nature, problem solving skills, technical aptitude, and their ability to understand the interdependencies of people, systems, and applications.

    ©2021 Tom Brooks (P)2021 Tom Brooks

    Ce que les auditeurs disent de Cybersecurity Bundle: 4 Books in One

    Moyenne des évaluations utilisateurs. Seuls les utilisateurs ayant écouté le titre peuvent laisser une évaluation.

    Commentaires - Veuillez sélectionner les onglets ci-dessous pour changer la provenance des commentaires.

    Il n'y a pas encore de critique disponible pour ce titre.