Jump to ratings and reviews
Rate this book
Rate this book
An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.Wilson describes the principles that underlie all cybersecurity confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

158 pages, Kindle Edition

Published September 14, 2021

15 people are currently reading
120 people want to read

About the author

Duane C. Wilson

2 books1 follower
Duane C. Wilson is Founder and CEO of Wilson Innovative Solutions LLC, a firm that provides cybersecurity training, research, and consulting for businesses.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
9 (16%)
4 stars
18 (32%)
3 stars
22 (39%)
2 stars
7 (12%)
1 star
0 (0%)
Displaying 1 - 4 of 4 reviews
Profile Image for Nils.
26 reviews
August 31, 2022
The book provides a brief and broad overview of cybersecurity. Some things are already known. The technical depth of detail is not necessarily great, but it is easy to understand even for non-informaticians.

This is really just a rough overview. However, this one succeeds well.
1 review
September 23, 2022
Overall great book that provides a good understanding of basic cybersecurity principles. Easy to read and understand.
2 reviews
March 12, 2025
Cybersecurity by Wilson provides an excellent overview of various facets from the broad topic of cybersecurity. While it does not provide much technical information for people with a background in computation, encryption, or data and privacy, it is a survey book which provides perspective on various aspects of cybersecurity which can be studied in more detail by one who has interest. For people who are interested in a broad overview without technical details which require more of a background in math, computer science, and logic, this is a decent book and will require minimal google searches to understand. People with that background will also notice certain topics and "easter eggs" which can help improve their knowledge and perspective.

The best part of this book is how the discussion is couched in little vignettes about successful cybersecurity breaches in the past. One of the most interesting breaches is the worm released by Robert Morris, then a first-year graduate student at Cornell University. Unbeknownst to Morris, the worm replicated itself many more times than intended and caused a DDoS attack. Other cybersecurity breaches, such as Melissa and ILOVEYOU are also explained in terms of the virus components. With further examples of real data breaches and examples of how various network and authentication systems work, the reader is also given some real-life knowledge of the various ways cybersecurity is incorporated into our day to day lives.

The book also includes a very clear and key exposition of security layers. In particular, it covers people, network security, host security, application/software security, data security, and cloud + mobile security. Providing strategies and possible breaches for each layer of security, the author helps create a big picture of the multiple layers and possible vulnerabilities with each. While not covered explicitly in the book, this kind of demonstration provides motivation for best practices, such as the principle of least privilege, fail-safe defaults, complete mediation, and separation of privilege.

This book can occasionally fall short due to its usage of technical language without much detail. While this might be acceptable for beginners who do not expect to understand every concept with clarity, and likewise with experts who can fill in the gaps by themselves, people with some technical knowledge might not find these sections particularly rewarding. For example, the author alludes to the concepts of a salted hash for password security and MACs for both authentication and integrity in service of nonrepudiation. However, while reference to salt maps, private keys, digital signatures are made, the details are not quite clear to the reader. The book would have benefited from an index with more technical details, and readers at that level might benefit from a book with more technical details.

There are also times when the content of the book is a bit repetitive. While repetition can help a reader internalize concepts, it sometimes feels like the same concepts are being expounded repeatedly. While this makes the book amenable to skimming, the reader runs the risk of skipping some helpful content.

Finally, the last chapter stands out as an excellent introduction to cybersecurity frameworks. The immunological, outcome-based, and machine learning approaches to cybersecurity are especially well explained in a very concise and cogent way.

I highly recommend this book to complete beginners in cybersecurity, people who have some knowledge but want a survey of other areas to explore, and experts who need a review.



Profile Image for Ian Hamilton.
624 reviews11 followers
November 4, 2025
The content in this brief read doesn’t break any new ground, but in an age when all facets of life and existence have drifted into the digital world, it’s a great primer for the lay person. If everyone would read this to better comprehend the privacy and security risks associated with their online lives, it would be a net positive. Sometimes short and sweet is the best approach.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.