Audible会員プラン登録で、20万以上の対象タイトルが聴き放題。

サンプル
  • Cybersecurity 101: What You Absolutely Must Know! - Volume 2

  • Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More!
  • 著者: James Scott
  • ナレーター: Kelly Rhodes
  • 再生時間: 1 時間 36 分

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

上記からお申込みいただくと30日間の無料体験期間が付与されます。現在開催中の2か月無料体験キャンペーンには、こちらのキャンペーンページからお申込みください。
会員は、20万以上の対象作品が聴き放題
アプリならオフライン再生可能
Audibleでしか聴けない本やポッドキャストも多数。プロの声優や俳優の朗読も楽しめます。
無料体験終了後は月額¥1,500。いつでも退会できます。

Cybersecurity 101: What You Absolutely Must Know! - Volume 2

著者: James Scott
ナレーター: Kelly Rhodes
¥630で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥900 で購入

¥900 で購入

下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら
activate_samplebutton_t1

あらすじ・解説

Right now, you are in a battle to protect yourself and your family from hackers, and there is no white knight on horseback galloping to your rescue. Most of the so-called "experts" in the yellow pages are upstarts who, in most cases, know just as much as you about the problem but compensate by using virus scan programs that offer the illusion of expertise. Most computers have boilerplate antivirus software and perhaps some sort of firewall, but this is hardly enough to thwart malicious hackers from breaching your system.

The weakest link in cybersecurity is the human factor. You'll get an email that looks like it's from your boss or child's school, you'll click the link, and in microseconds your computer is contaminated with a virus that incapacitates your PC and you realize you've just been pwned!

Not all hackers are bad, but those who have malicious intent are typically categorized as script kiddies, hacktivists, mercenaries, or state sponsored. Each group carries with it a different motivation, target to breach, and data it seeks to exfiltrate. Script kiddies will typically wreak sporadic techno-chaos using cut-and-paste scripting methods from content they find on deep web hacker forums. Hacktivists usually target organizations of affiliates who are aligned with other organizations and affiliates that this category of hacker-activists deem ethically or economically corrupt or sided with the wrong side of group ideology.

Mercenary hackers will typically be part of a criminal enterprise that seeks financial gain for its activity and can work for crime syndicates or state sponsors. And finally, state-sponsored hackers will work for a government and target specific organizations and data for espionage and political motivation.

©2016 James Scott (P)2016 James Scott

Cybersecurity 101: What You Absolutely Must Know! - Volume 2に寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。