Gr 6 Up–Some people use the internet for legitimate purposes, such as job hunting and online dating. Other users have nefarious purposes, such as cyberstalking and stealing corporate secrets. Some nations engage in cyber-espionage to disrupt government networks. “Hacktivists” try to influence the vote by using hacking to further their political agenda. Terrorists and warring countries use technology to conduct cyberattacks and cyberwarfare. Miller offers practical advice for home computer security, including using a virtual private network, implementing strong passwords, and recognizing phishing emails. The last chapter lists possible careers in cybertechnology as well as educational requirements, job growth, and pay. There is information about current events, including the 2020 Russian hacking of pharmaceutical companies and universities working on COVID-19 vaccines. Engaging real-life vignettes illustrate technical terms. For example, Miller describes how
Shark Tank host Barbara Corcoran was a victim of a spear-phishing email, which requested money for a fake real estate deal. Subtitles organize the chapters into manageable sections, with occasional photographs and colorful charts. The text explains cyber terminology using language that readers will understand. An attractive red-and-black binary code motif appears as a background pattern. A glossary, source notes, a bibliography, resources, and an index are included.
VERDICT An excellent addition to middle school and high school libraries looking for updated titles about computers and technology careers.
Be the first reader to comment.
Comment Policy:
Comment should not be empty !!!