Cyber Insecurity : Examining the Past, Defining the Future - Vladas Leonas

Cyber Insecurity

Examining the Past, Defining the Future

By: Vladas Leonas

eText | 16 June 2025 | Edition Number 1

At a Glance

eText


$102.30

or 4 interest-free payments of $25.57 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation. The author, Dr. Leonas, shares his journey from Moscow to Australia, highlighting his academic and professional milestones.

Then the book covers the evolution of cybersecurity from the late 1960s to the present, detailing significant events and technological advancements. It emphasizes the importance of simplicity in technology projects, citing complexity as a major hindrance to success. This book also discusses the impact of the digital revolution, using the example of a global IT outage caused by a faulty software update.

Project management methodologies are explored, tracing their origins from ancient civilizations to modern techniques like CPM and PERT. The concept of cloud computing is examined, highlighting its benefits and potential security issues. The evolution and advantages of SaaS solutions are also discussed, noting their increased adoption during the COVID-19 pandemic.

The author then addresses supply chain challenges, using real-world examples to illustrate vulnerabilities. It traces the history of communication methods leading up to TCP/IP and discusses the development and importance of DNS. The differences between compliance and conformance in cybersecurity are clarified, emphasizing that compliance does not equate to security.

Key cybersecurity standards like the NIST CSF and ISO/IEC 27000 series are examined. The book also covers the Essential 8, a set of cybersecurity controls developed by the Australian Signals Directorate. The convergence of OT and IoT is discussed, highlighting the cybersecurity risks associated with this integration.

Emerging threats from AI and quantum computing are explored, noting their potential to both advance and threaten cybersecurity. The evolving legal landscape of cybersecurity is also covered, emphasizing the need for international cooperation and innovative legal solutions.

In conclusion, the book stresses the importance of critical thinking and a holistic approach to cybersecurity, advocating for simplicity and foundational practices to enhance security.

on
Desktop
Tablet
Mobile

Other Editions and Formats

Hardcover

Published: 15th June 2025

More in Computer Viruses

Cyber Threat Hunting - Nadhem AlFardan

eBOOK

Learning ParrotOS - Arvin Destar

eBOOK

Industrial Cybersecurity - Anand Shinde

eBOOK

Defense in Depth - Qasim

eBOOK

$39.99

El Plan Cibernetico - Andre Edmond

eBOOK