Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
the great courses living

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Sezóna 1
Virtually every aspect of global civilization now depends on interconnected cyber systems to operate... which makes keeping these systems safe from threat one of the most pressing problems we face. Get an intriguing look at the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers.
202018 epizod13+
Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit

Je vyžadováno členství Prime

Platí smluvní podmínky

Epizody

  1. S1 E1Stuxnet-The First Cyber Guided Missile

    4. dubna 2013
    32 min
    TV-PG
    Your introduction to the fascinating - and fascinatingly dangerous - world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  2. S1 E2The Incredible Scope of Cyberspace

    31. května 2020
    30 min
    TV-PG
    What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that make up a conceptual "map" of cyberspace, and more.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  3. S1 E3The Five Gateways of Internet Vulnerability

    31. května 2020
    30 min
    TV-PG
    Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  4. S1 E4Of Viruses, Botnets, and Logic Bombs

    31. května 2020
    32 min
    TV-PG
    Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  5. S1 E5The Problem of Identity on the Network

    31. května 2020
    33 min
    TV-PG
    Identification is perhaps the single most profound challenge for cybersecurity today. Delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems involved in this issue?
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  6. S1 E6Cyber Fraud, Theft, and Organized Crime

    31. května 2020
    31 min
    TV-PG
    Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are fighting back against organized, international cyber criminals.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  7. S1 E7Hacktivists and Insurgency

    31. května 2020
    31 min
    13+
    Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. Learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  8. S1 E8Nations at Cyber War

    31. května 2020
    33 min
    TV-PG
    Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an attack - and should we?
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  9. S1 E9Government Regulation of Cyberspace

    31. května 2020
    32 min
    TV-PG
    Join the debate about government regulation of cyberspace as you consider both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you'll be better informed about a topic that has serious ramifications for how you use the Internet.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  10. S1 E10International Governance and the Internet

    31. května 2020
    35 min
    TV-PG
    Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses existing Internet governance and the dynamics leading to change. Then, he assesses some of the barriers to effective international governance of the Internet. Is the current structure, with all of its flaws, better than the alternatives?
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  11. S1 E11The Constitution and Cyberspace

    31. května 2020
    33 min
    TV-PG
    Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and limited - but not prohibited - by the Constitution.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  12. S1 E12Big Data-They- Know Everything about You

    31. května 2020
    32 min
    TV-PG
    In a first look at personal data tracking and privacy, ponder the problem of "Big Data" - where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's a frightening aspect of cybersecurity, and one that, unfortunately, is here to stay.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  13. S1 E13Privacy for the Cyber Age

    31. května 2020
    33 min
    TV-PG
    It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data" - and how "Big Data" can keep the government honest - you'll discover insights into how we can evolve our privacy laws while embracing new technologies.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  14. S1 E14Listening In and Going Dark

    31. května 2020
    34 min
    TV-PG
    Learn how encryption and wiretapping work in cyberspace, and how both methods are becoming increasingly frustrating for law enforcement and national security officials. This "going dark" phenomenon, as you'll find in this eye-opening discussion, brings benefits and causes problems - and the solutions seem to bring problems of their own.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  15. S1 E15The Devil in the Chips-Hardware Failures

    31. května 2020
    31 min
    TV-PG
    Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips?
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  16. S1 E16Protecting Yourself in Cyberspace

    31. května 2020
    31 min
    TV-PG
    Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You'll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems, how to encrypt and erase personal data and documents, and much more.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  17. S1 E17Critical Infrastructure and Resiliency

    31. května 2020
    32 min
    TV-PG
    Take an alternate approach to cybersecurity, this time focusing on resiliency and recovery. There may be good reason to think that creating a system that isn't immune to failure but is less likely to be attacked - and better able to operate even while under attack - is the best course of action.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit
  18. S1 E18Looking Forward-What Does the Future Hold?

    31. května 2020
    36 min
    TV-PG
    Finish with a helpful summary of the main issues and arguments involved in the current state of cybersecurity throughout the world. Then, take an intriguing peek into the future to explore possible - and even radical - new developments that may shape this powerful and important topic for years to come.
    Bezplatné zkušební období kanálu The Great Courses Living, obsah si můžete také koupit