Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Cyberspies

Inside the World of Hacking, Online Privacy, and Cyberterrorism

ebook
1 of 1 copy available
1 of 1 copy available
The news is filled with stories of data breaches at companies and of threats to national security as hackers interfere with elections. It's more important than ever for internet users to know how to maintain their privacy online. The digital world has become inescapable, and to be a responsible digital citizen, it is necessary to be aware of the threats to your online privacy and security. This book looks at the legal and illegal forms of cyberspying, goes behind the scenes to explore career paths in cyberintelligence, and looks at the digital threats of cyber propaganda, fake news, cyberterrorism, and threats to the US government and individuals. Readers will learn tools to keep themselves safe and protect their privacy, as well as tips for what to do if they are attacked online, and a final chapter looks at how digitally savvy teens can prepare for a career in cyberintelligence.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Levels

  • Reviews

    • School Library Journal

      March 1, 2021

      Gr 6 Up-Some people use the internet for legitimate purposes, such as job hunting and online dating. Other users have nefarious purposes, such as cyberstalking and stealing corporate secrets. Some nations engage in cyber-espionage to disrupt government networks. "Hacktivists" try to influence the vote by using hacking to further their political agenda. Terrorists and warring countries use technology to conduct cyberattacks and cyberwarfare. Miller offers practical advice for home computer security, including using a virtual private network, implementing strong passwords, and recognizing phishing emails. The last chapter lists possible careers in cybertechnology as well as educational requirements, job growth, and pay. There is information about current events, including the 2020 Russian hacking of pharmaceutical companies and universities working on COVID-19 vaccines. Engaging real-life vignettes illustrate technical terms. For example, Miller describes how Shark Tank host Barbara Corcoran was a victim of a spear-phishing email, which requested money for a fake real estate deal. Subtitles organize the chapters into manageable sections, with occasional photographs and colorful charts. The text explains cyber terminology using language that readers will understand. An attractive red-and-black binary code motif appears as a background pattern. A glossary, source notes, a bibliography, resources, and an index are included. VERDICT An excellent addition to middle school and high school libraries looking for updated titles about computers and technology careers.-Maile Steimer, Jones M.S., Buford, GA

      Copyright 2021 School Library Journal, LLC Used with permission.

Formats

  • Kindle Book
  • OverDrive Read
  • EPUB ebook

Languages

  • English

Levels

  • Lexile® Measure:1170
  • Text Difficulty:8-9

Loading