Watch Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

  • 2013
  • 1 Season

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is a captivating show that explores the intricate world of cybersecurity. The show takes the audience on an insightful journey into the complex world of cybercrime and cyber warfare by presenting a blend of informative, entertaining, and educational content.

The show's host, an experienced cybersecurity expert, delves deep into the angles and facts of the cybersecurity world, bringing to light the various ways and means by which hackers and cybercriminals infiltrate digital systems to perpetrate their criminal acts. The host's approach uses both theoretical and practical scenarios to explore the various aspects of cybersecurity.

The show is divided into several episodes, each tackling a different aspect of cybersecurity, making it easy for the audience to understand and apply the concepts presented. The beginning episodes cover the basics of cybersecurity, which gives the audience a foundational understanding, while the subsequent episodes dig deeper into the more complex issues in the cybersecurity industry.

One of the primary themes explored in the show is the importance of cyber hygiene. The host takes time to explain how individuals can protect themselves against cyber attacks by taking simple but practical steps, such as the use of strong passwords, regular software updates, and avoiding suspicious emails and websites.

The show also focuses on the dangers that businesses face concerning cybersecurity. The host describes how cybercriminals can take advantage of corporate data breaches, which can lead to critical financial losses or damage to the business's reputation. The host also presents different strategies that businesses can use to safeguard sensitive data and mitigate cyber risks.

The show explores the ever-growing threat of cybercrime and how it has become a significant concern for government agencies worldwide. The host describes how security agencies work around the clock to detect, prevent and mitigate cyber attacks, but they often face challenges due to the sophistication of cybercriminals. The show also touches on the rise of cyber warfare and how cyber technology is being employed in warfare.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare presents its content in a way that is easy to understand and digest. It breaks down complex cybersecurity concepts into simpler terms, making it accessible for individuals with different backgrounds and levels of technical expertise. The show includes visuals and graphics that illustrate some of the topics discussed, helping the audience to visualize and contextualize the information presented.

The show's expert guests, who are professionals in the cybersecurity industry and related fields, provide expert opinions and practical insights that complement the host's commentary. The show's guests explain the different security risks that various institutions face, including financial institutions, healthcare providers, educational institutions, and government agencies.

The show's soundtrack is expertly curated to create a suspenseful and immersive experience that engages the audience throughout. The tone of the show is serious, reflecting the importance of cybersecurity, but it also includes moments of humor, taking the edge off the heaviness of the topic.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare isn't just a show that provides valuable insights to individuals and businesses; it's also an essential resource for policymakers and governments worldwide. The show lays out the complex issues concerning cybersecurity, providing a comprehensive guide to the risks, dangers and how to mitigate them.

In conclusion, Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is an educational and insightful show that provides a comprehensive understanding of cybersecurity in a way that is both entertaining and informative. The show's focus on cyber hygiene, business security, and government policy provides a well-rounded perspective on the issue, making it an important resource for anyone interested in the topic.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is a series that ran for 1 seasons (18 episodes) between April 5, 2013 and on

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Filter by Source

Do you have Paramount+?
What are you waiting for?
Nice! Browse Paramount+ with Yidio.
Ad Info
Seasons
Looking Forward-What Does the Future Hold?
18. Looking Forward-What Does the Future Hold?
April 5, 2013
Finish the course with a helpful summary of the main issues and arguments involved in the current state of cybersecurity throughout the world. Then, take an intriguing peek into the future to explore possible--and even radical--new developments that may shape this powerful and important topic for years to come.
Critical Infrastructure and Resiliency
17. Critical Infrastructure and Resiliency
April 5, 2013
Take an alternate approach to cybersecurity, this time focusing on resiliency and recovery. There may be good reason to think that creating a system that isn't immune to failure but is less likely to be attacked--and better able to operate even while under attack--is the best course of action.
Protecting Yourself in Cyberspace
16. Protecting Yourself in Cyberspace
April 5, 2013
Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You'll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems, how to encrypt and erase personal data and documents, and much more.
The Devil in the Chips-Hardware Failures
15. The Devil in the Chips-Hardware Failures
April 5, 2013
Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips?
Listening In and Going Dark
14. Listening In and Going Dark
April 5, 2013
Learn how encryption and wiretapping work in cyberspace, and how both methods are becoming increasingly frustrating for law enforcement and national security officials. This "going dark" phenomenon, as you'll find in this eye-opening discussion, brings benefits and causes problems--and the solutions seem to bring problems of their own.
Privacy for the Cyber Age
13. Privacy for the Cyber Age
April 5, 2013
It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data"--and how "Big Data" can keep the government honest--you'll discover insights into how we can evolve our privacy laws while embracing new technologies.
Big Data-They- Know Everything about You
12. Big Data-They- Know Everything about You
April 5, 2013
In the first of two lectures on personal data tracking and privacy, ponder the problem of "Big Data"--where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's a frightening aspect of cybersecurity, and one that, unfortunately, is here to stay.
The Constitution and Cyberspace
11. The Constitution and Cyberspace
April 5, 2013
Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and limited--but not prohibited--by the Constitution.
International Governance and the Internet
10. International Governance and the Internet
April 5, 2013
Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses existing Internet governance and the dynamics leading to change. Then, he assesses some of the barriers to effective international governance of the Internet. Is the current structure, with all of its flaws, better than the alternatives?
Government Regulation of Cyberspace
9. Government Regulation of Cyberspace
April 5, 2013
Join the debate about government regulation of cyberspace with this lecture that considers both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you'll be better informed about a topic that has serious ramifications for how you use the Internet.
Nations at Cyber War
8. Nations at Cyber War
April 5, 2013
Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an attack--and should we?
Hacktivists and Insurgency
7. Hacktivists and Insurgency
April 5, 2013
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this lecture, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers.
Cyber Fraud, Theft, and Organized Crime
6. Cyber Fraud, Theft, and Organized Crime
April 5, 2013
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are fighting back against organized, international cyber criminals.
The Problem of Identity on the Network
5. The Problem of Identity on the Network
April 5, 2013
Identification is perhaps the single most profound challenge for cybersecurity today. In this lecture, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems involved in this issue?
Of Viruses, Botnets, and Logic Bombs
4. Of Viruses, Botnets, and Logic Bombs
April 5, 2013
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.
The Five Gateways of Internet Vulnerability
3. The Five Gateways of Internet Vulnerability
April 5, 2013
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.
The Incredible Scope of Cyberspace
2. The Incredible Scope of Cyberspace
April 5, 2013
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that make up a conceptual "map" of cyberspace, and more.
Stuxnet-The First Cyber Guided Missile
1. Stuxnet-The First Cyber Guided Missile
April 5, 2013
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.
Description
Where to Watch Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is available for streaming on the website, both individual episodes and full seasons. You can also watch Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare on demand at Amazon Prime, Amazon and Hoopla.
  • Premiere Date
    April 5, 2013
  • Sports Stream Live Sports and Breaking News
  • Thousands of Episodes Tens of thousands of TV show episodes
  • Something for Everyone Movies and shows for the whole family
Ad Info