• Home
  • About 404TS
  • Contact
  • Shop

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Reviews / Book Review: Cyberphobia – Identity, Trust, Security, and the Internet

Book Review: Cyberphobia – Identity, Trust, Security, and the Internet

2016-07-01

Cyberphobia – Identity, Trust, Security, and The Internet by Edward Lucas covers a lot of topics under the umbrella of information security, as you might guess from the book’s tagline. The book sets out for itself the valiant goal of educating the masses and solving the problem of information security through end-user education. Unfortunately, I do not think any progress was made toward that goal through this book.

I am not this book’s target audience. I am too technical and too familiar with the topic. That is fair enough. It is spelled out right in the preface for whom the book is intended, which also explains the book’s title.

This book is called Cyberphobia because so many people are so put off by needlessly complicated technical language that they fail to realize the importance of the issue at stake. Many books about this subject explain in great technical detail how to build and defend a supposedly secure network of computers. These are rather like technical manuals for locksmiths: interesting to the specialist, but useless to the layman.

The central message of this book is that our dependence on computers is growing faster than our ability to forestall attackers. Criminals, hooligans, activists and hostile foreign powers are constantly attacking individuals, businesses, organizations and governments. They are winning and we are losing. Unless our thinking and behavior change, we will become less safe, less free, less healthy and less happy. Most of all we need to understand that cyber-security is not a technical issue, any more than road safety is about engineering. The books is about how we need to rethink our behavior – as individuals, organizations, and societies – in dealing with the threats we face online. But above all, this is a book about humans, not about machines.

In my opinion, this book achieved a different blend – useless to the specialist and boring to the layman. I was already familiar with almost all of the content conveyed in this book with an exception to the digital identity chapter. Beyond that, I was annoyed by technical definitions that were just close enough to be hard to argue but did not really do the topic justice. Remembering that I am not the target audience, I dumbed myself down and tried to enjoy the book by not getting hung up on specific details.

Continuing on through the material, I found myself wanting the book to end. After the long preface and long introduction, we finally get to the first chapter and it is an eye roll worthy course of information security issues with an on-the-nose example of a married couple that has lived in blissful ignorance of these concerns. Through the rest of the book, it covers botnets, ransomware, politics, foreign spying, vulnerabilities, passwords, identity, and other topics.

My main problem with the book is that I do not think it will find its audience. If you are technical and interested in the topic, you are already familiar with these current events. Even my recollection of some real-life examples given were more detailed and accurate than they were described in the book. The second half of the problem is that the book is too long but mostly too wordy for the topic. If someone has remained blissfully unaware of security problems until coming upon this book, they should not be punished with over-explained recaptures of events and tedious analogies that just keep going.

The book ends after 264 pages and that is far more than is needed. There are multiple appendices, endnotes, and an index which thankfully brings the ending sooner than expected.

Overall, I do not recommend Cyberphobia. I found the writing tedious, boring, and generalizing. A more concise and accurate book could capture and retain an audience’s attention better, which was the whole goal of the book. If you wanted to jump to specific topics, you will first have to “translate” the chapter titles in the table of contents such as “Clearing the Jungle”, “The Geopolitics of the Internet”, and “Spies v. Warriors” in an annoying way, not an intriguing way.

If you would like to see for yourself or know someone that falls perfectly in the target audience niche, you can find Cyberphobia by Edward Lucas on Amazon.

What I would rather recommend, is that you read some of the sources that Cyberphobia drew from, such as Brian Krebs’ site Krebs on Security. A book that will draw you in, and teach you all about social engineering, is Kevin Mitnick’s Ghost in the Wires.

cyberphobia

Share this:

  • Facebook
  • Twitter
  • Reddit
  • Google
  • Print

Related

Filed Under: Reviews

Trending

  • Saved passwords in your browser, an interesting angle
    In Media, Security and Privacy, Software, Talking Points, Tech Solutions
  • Adobe Acrobat and PDFs with Foreign Languages
    In Software, Tech Solutions
  • Product Review: Sprint’s Airave Femtocell
    In Hardware, Gadgets, and Products, Network, Reviews

Latest Media Posts

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

The WannaCry Post-Mortem

The WannaCry Post-Mortem

  • Popular
  • Latest
  • Today Week Month All
  • Microsoft Word: “This modification is not allowed because the selection is locked.” Microsoft Word: "This modification is not allowed because the selection is locked."
  • How to edit the message subject in Outlook 2016 How to edit the message subject in Outlook 2016
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Scan-To-Email with Office 365 from a multifunction copier or printer Scan-To-Email with Office 365 from a multifunction copier or printer
  • You Can Use A VPN To Unlock Regional Content on the Amazon Fire Stick You Can Use A VPN To Unlock Regional Content on the Amazon Fire Stick
  • 3 Common Online Scams People Still Fall For In 2018 3 Common Online Scams People Still Fall For In 2018
  • Methods of Network Transition from IPv4 to IPv6 Methods of Network Transition from IPv4 to IPv6
  • Deleted Partition Recovery – Using Disk Drill File Recovery Tool for Windows Deleted Partition Recovery – Using Disk Drill File Recovery Tool for Windows
  • Securing Open Source Components (it’s different)                                   Securing Open Source Components (it’s different)                                  
Ajax spinner

Upcoming Tech Events

  1. Red Hat Summit 2018

    May 8 - May 10

View All Events

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Follow Us

  • Facebook
  • Google+
  • RSS
  • Twitter
  • YouTube

Recent Posts

  • You Can Use A VPN To Unlock Regional Content on the Amazon Fire Stick
  • 3 Common Online Scams People Still Fall For In 2018
  • Methods of Network Transition from IPv4 to IPv6

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2018 · 404TechSupport.com