Catalog

Record Details

Catalog Search



Thinking about cybersecurity: from cyber crime to cyber warfare / Paul Rosenzweig.

Image of item

Series Information

Great courses (DVD).

Record details

  • Physical Description: 1 online resource (18 video files (approximately 540 min.)) : sound, color.
  • Publisher: [United States] : The Great Courses : 2013.

Content descriptions

Formatted Contents Note:
Episode 1 Stuxnet-The First Cyber Guided Missile Episode 10 International Governance and the Internet Episode 11 Constitution and Cyberspace Episode 12 Big Data-"They" Know Everything about You Episode 13 Privacy for the Cyber Age Episode 14 Listening In and Going Dark Episode 15 Devil in the Chips-Hardware Failures Episode 16 Protecting Yourself in Cyberspace Episode 17 Critical Infrastructure and Resiliency Episode 5 Problem of Identity on the Network Episode 6 Cyber Fraud, Theft, and Organized Crime Episode 3 Five Gateways of Internet Vulnerability Episode 9 Government Regulation of Cyberspace Episode 8 Nations at Cyber War Episode 18 Looking Forward-What Does the Future Hold? Episode 2 Incredible Scope of Cyberspace Episode 7 Hacktivists and Insurgency Episode 4 Of Viruses, Botnets, and Logic Bombs.
Restrictions on Access Note:
Digital content provided by hoopla.
Participant or Performer Note:
[Lectures delivered by] Professor Paul Rosenzweig, The George Washington University Law School.
Summary, etc.:
Virtually every aspect of global civilization now depends on interconnected cyber systems to operate... which makes keeping these systems safe from threat one of the most pressing problems we face. Get an intriguing look at the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers.
Target Audience Note:
Rated TVPG.
System Details Note:
Mode of access: World Wide Web.
Subject: Computer crimes.
Cyberterrorism.
Cyber intelligence (Computer security)
Computer networks > Security measures.
Internet > Security measures.
Electronic information resources > Access control.

Additional Resources