Invitation to Cybersecurity

INVITATION TO CYBERSECURITY ii Table 1 A comparison of training and education. Furthermore, this book provides a broad overview of cybersecurity and views cybersecurity from the perspective of computer science. Cybersecurity spans several technical and non-technical disciplines (see Figure 1). However, it was birthed out of the discipline of computer science, and computer science remains the foundation of cybersecurity. To really understand cybersecurity, a person has to understand how computers and the Internet work. This book does not delve too deeply into details, but it does get technical in sections to help the reader understand the world of cyberspace. This technical background is necessary to enable the reader to contextualize the tools, principles, and practices of cybersecurity. This book builds cybersecurity from the ground up. It starts with a brief examination of how cyberspace is fundamentally different from physical space and how this creates a difficult security context (Chapter 1). Then it takes a deeper dive into how cyberspace works because cyberspace is the context of cybersecurity (Chapter 2). Then it moves to the reasons why cybersecurity is necessary by examining cyber adversaries (Chapter 3) and their activities (Chapter 4). Then it explores how to approach cybersecurity at a macro level through an introduction to cyber risk management (Chapter 5). Next, it focuses on the hallmark of cybersecurity, adversarial thinking (Chapter 6). This aspect of cybersecurity makes it unique among other technical disciplines. Then it explores cryptography (Chapter 7). Cryptography is the bedrock of cybersecurity because it is how data is kept secure in cyberspace. Next, because cybersecurity is primarily concerned with preventing unauthorized access, it addresses the means of cybersecurity, access control (Chapter 8). Then the book transitions to basic cybersecurity principles and practices (Chapter 9), and the ethical and legal boundaries of cybersecurity (Chapter 10). It concludes with a brief reflection on the societal impact of cybersecurity (Chapter 11).

RkJQdWJsaXNoZXIy MTM4ODY=