Cybersecurity Bundle: 4 Books in One
The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 18,74 $
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
-
Narrateur(s):
-
Tom Brooks
-
Auteur(s):
-
Tom Brooks
À propos de cet audio
By Tom Brooks - Federal Trade Commission - US Department of Defense - CIS Agency
Have you been worried about your own personal safety, as well as security, as the tech world continues to grow and threats increase per day?
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. Since info from our bank account to our zip code, social security numbers, and so much more have all been encrypted into the depths of our tech devices, it’s only natural for you to worry about your own safety when you know the extent of your vulnerability and dependency upon the technology around you.
Is cybersecurity possible?
The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place. This effort has led to much debate around the question of whether cyber deterrence is possible.
Answering this question is difficult, since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance. The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible. To be effective, this strategy must be multilayered and use all instruments of US national power.
Cybersecurity for Small Business
You may have heard about the NIST Cybersecurity Framework, but what exactly is it? And does it apply to you?
NIST is the National Institute of Standards and Technology at the US Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The framework is voluntary. It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection. You can put the NIST Cybersecurity Framework to work in your business in these five areas: identify, protect, detect, respond, and recover. Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.
Cybersecurity Career Path
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations. The cyber career pathway can include none, one, all, or any combination of similar endorsements. However, none are actually required to become a cybersecurity expert. Employers may have requirements for a candidate, which they trust are enough to demonstrate the necessary qualifications. However, one’s proficiency and expertise in cybersecurity is often determined by their inquisitive nature, problem solving skills, technical aptitude, and their ability to understand the interdependencies of people, systems, and applications.
©2021 Tom Brooks (P)2021 Tom Brooks