Priority Codes are on the back of the catalog, mail promotion, or within an advertisement. To ensure that the pricing on the website is the same as what is in your catalog or advertisement, please enter the priority code provided.
The Hack Attack with Professor Paul Rosenzweig
Examine the high-tech methods corporations and governments are developing and using to find cyber threats, protect themselves from future attacks, track down perpetrators, and stave off the threat of all-out cyber war. Join Great Courses professor Dr. Paul Rosenzweig on March 23, at 6:00 PM ET for a thrilling chat.

3rd & 7 37yd
3rd & 7 37yd
B
S
O
close
close

-





-
Good evening, and thank you all for joining us tonight as we discuss cybersecurity with our esteemed guest, Professor Paul Rosenzweig. At this time, our chat is now open and you may begin sending your questions to Professor Rosenzweig by clicking on the Submit a Question button.
This is a text based chat, please be patient while the professor is responding. There is an abundance of questions, and we will try to get to as many as possible in this chat. We apologize if we do not get to yours- they are moderated subject to the professor’s approval.
Please use appropriate language. If you are having trouble seeing answers, refresh your browser. Thank you, and let’s start the chat! -
Hello and thanks for joining me to talk about surveillance and cybersecurity. I am very excited to be returning to The Teaching Company to do another one of The Great Courses. One of the reasons I like it so much is that the viewers/listeners are such engaged participants through things like this Chat opportunity. I enjoy the opportunity to talk with people who are interested in the topics I’m passionate about. So let’s get started – any questions you have about “The Surveillance State” or “Thinking About Cybersecurity” are fair game. And if the conversation lags, feel free to ask me about my beloved Washington Nationals – though I have no great expertise on that score.
-
Dr. Rosenweig, what are the three most important Windows or browser settings a person can use to protect their file information from being compromised by a hacker. How can we be sure an intrusion to our file information has not occurred?
-
-
What tools should an individual use for their communications online to protect them from cyber threats?
-
If you tallied up all the hours you spend on the web, how much would it be? What device is most of your time spent on? Learn more with Professor Rosenzweig
1 of 3
-
When did stuxnet damage the Iranian centrifuges? How does the treaty with Iran deal with their current centrifuges? What is your view of the treaty in terms of reducing the ability of Iran to become a nuclear weapons power?
-
What do you consider to be the most significant current issue within the realm of cyber-security and how do you see this impacting the future of cyber-security? Side note: LOVED your previous and new courses!!! Thanks for all the amazing information you provided!
-
Respected Sir I have listened your course that was fabulous.my Question .Waiting for your New Course on Great Courses.
-
So what got you into codes, computer bugs, and espionage? I mean, were you into it in your early teens, your childhood, right before college, etc.? (Is this is a bad question?) My parents say I changed my ideas for jobs a lot, but I've wanted to be a singer since the beginning of my teen years! Before that, I was actually looking into being a spy for CIA as a kid. Codes have always fascinated me, but I wasn't into the bullets. Your job sounds SO cool!
-
How can one know if a pop-up is safe? It would seem to me relatively easy for a hacker to copy the logo and look of a trustworthy name like Microsoft and incorporate that into his pop-up design. Might he even design the No Thank You button or even the Close button (X) to be the activation button for a virus?
-
Who Will Watch the Watchmen | The Great Courses
by The Great Courses via YouTube 3/23/2016 10:17:06 PM -
Dr. Rosenzweig, I'm senior in college finishing my last year in Management Information Systems. Since listen to your course on the Cyber State and over the last several month I have developed an interest in pursuing a career in cybersecurity. My question to you has two parts, first would you please name a few specialization/skills most needed at this time in the field of cybersecurity and do you think a doctorate degree is necessary in the field?
-
-
We’ve received a number of great submissions! Thanks for your patience as Professor Rosenzweig answers your questions as quickly as possible.
-
You talked about the Stasi in "The Surveillance State" and the implications on culture. Obviously, we are headed toward increased surveillance simply because sensors and computing is becoming less expensive. Not necessarily criminal surveillance, but surveillance of crops for agriculture or to improve transportation services. Which contemporary cultures (Nordic, Anglo, Asian, etc) do you think will most successfully adapt to a world with increased surveillance? I'm wondering where around the world we could look for good legal structures to help us make decisions in the USA.
-
How much metadata would constitute an intrusive mosaic about a person? Are there any new insights into measuring such quantities for the purpose of modernizing laws?
-
Dr. Rosenzweig, my research interest is around decision theories related to "AI" in the computer science/information science areas to include cybersecurity. With the success of AlphaGO are there any relevant references concerning learning systems you are aware for referral and do you have an opinion about learning systems impact on defeating static and dynamic cyber defenses? -
-
Professor Rosenzweig trying out Google Glass shades. He nailed the look, wouldn't you say?Professor Rosenzweig at the Foreign Press Center
1 of 2
-
Drones. They come in all sizes and from what I understand, little ones built like bugs, can fly into a room of your house. Is there any legal recourse if one could find out the operator?
-
Since I am currently in a rehab center, I use my Droid Maxx for literally everything. How can I protect the data on my smartphone?
-
-
-
Prof. Rosenzweig - do you consider the hack of OPM (allegedly by the Chinese military) an "Info Hack" on the order of bragging rights or do you think there was something more to this?
-
do the subjects you cover in your lectures represent a particular favorite area of interest (of yours) at the time, or how did you decide those topics over others (that you could cover)
-
HMI systems seem to be very vulnerable to outside attack as they control many critical systems throughout the world, yet industry is reluctant to invest necessary capital to harden systems. Will it take a disaster to change attitudes, or are there other incentives to nudge business to take action. Tax breaks for compliance, perhaps, or other carrots?
-
What do you think of the growth of cyber currency...bitcoin first and now onecoin? Do you have concerns for the use of cyber currency?
-
-
Dr. Rosenzweig, what has been your favorite part about lecturing for The Great Courses?
-
Professor - In cases of stolen identity, what would you recommend?
-
What do you think? Does Anonymous make a stronger impact than law? Learn more in "Surveillance State: Big Data, Freedom and You"Have you ever been on the wrong end of a phishing scam?
1 of 3
-
I read a lot of spy novels, and really hope our intelligence people lie often about what their capabilities really are. Do they?
-
What do you think of the RFID chips in to almost everything we buy?
-
Future Appearances:March 24th: If you live in the DC Metro area, you can see Professor Rosenzweig during a panel discussion tomorrow, 3/24 from 12-2pm! He'll be discussing Apple v. FBI at the George Washington Univ School of Law (20th & H St NW). More info here.March 30th: Join The Heritage Foundation for an in-depth series of conversations with intelligence experts on the role of intelligence, how it is used to protect the United States, and how we ensure that conduct of intelligence activities are conducted in a lawful manner. Professor Rosenzweig will be there with other experts in the security field. More info here.
-
In the past day, I have heard that an attack in space could bring down our electric grid. Would you speak to that please.
-
Professor Rosenzweig will be answering questions until 7:10. He has graciously agreed to answer your remaining questions in the upcoming week, so be sure to check back for answers!
-
Hot potato: Snowden, should Obama give him a Presidential pardon? Also, should we increase whistleblower protections to offset the potential abuses of a Surveillance State?
-
With the buzz around big data analytics do you see an emergence of new threats as organizations fumble their data management practices in a hurry to discover the gold in their business data? Ex. Hacker creation of faux data, and manipulation of analytic logic in applications.
-
All work and no play makes us go a little kooky on set :-P
1 of 3
-
-
I watch my smart TV, but is my smart TV watching me?!
-
-
Thank you, professor! I look forward to hearing from you again!
-
-
