Book Review: Cybersecurity For Everyone

by | Jul 16, 2022

Malware, Cyberattack, Cybersecurity

UPDATED 18-July: A  tabloid in Mumbai named Mid-day has taken up a reporting campaign about the rampant loan app fraud that has robbed so many victims of their earnings and life savings. Almost every day, we read about people clicking on links or downloading apps or sharing OTPs – only to realize how naive and foolish they have been when they check their bank balances. Seniors or working professionals respond to calls from “bank managers,” electricity companies, and even “Income Tax officials” – warning of dire consequences like the disconnection of electricity unless one makes a payment. And these fraudulent “officials” sound so authoritative and convincing!

Can someone please explain why so many people are becoming victims of fraud?

You’ll find a satisfying answer to that question in this jargon-free book on cybersecurity. The author, Chaitanya, whom I have known for the past year, is a cybersecurity expert. Yet he does not throw jargon at you; he explains cybersecurity concepts in simple terms, using relatable analogies. For instance, he explains Risk Quotient in the introduction without mentioning the term. So, one does not need to have a background in technology or cybersecurity to understand the concepts that Chaitanya presents. He also busts myths, explains jargon, and gives engaging examples.

As one progresses through the book, it becomes clear that much of cybersecurity and fraud is about the commonsense, presence of mind, and the need to ask questions and verify. Fraudsters leverage human weaknesses like greed, impulsivity and fear.

How should you respond if you receive an SMS or a call from the electricity company that they have not received the payment? What if you paid the bill last week and received an acknowledgment? It doesn’t add up. Something fishy is going on. You need to visit the electricity company and verify this – NOT click on a link or talk to a stranger on the phone believing that he is an official from the utility company.

That’s the presence of mind and alertness we need to protect ourselves in a digital world. And yes, we also need to be aware of apps like TeamViewer, AnyDesk, and other remote access apps that these fraudsters ask us to install on our phones and computers.

The author adopts a storytelling approach to keep the reader engaged. He does not rush into cybersecurity because he wants the reader to have a good grounding in computers, networks, and the internet. How does it work? He patiently explains the internal architecture of a computer and what happens when we start a computer. How is data transmitted through the internet till it gets to its destination? He takes two chapters to explain all that. Because only with this foundation will you understand how bad actors manipulate weaknesses in networks to hack and steal your data and credentials.

In the cyberverse, we have digital assets or “crown jewels” that we need to identify and protect. Do you have visibility into your digital assets? You can’t protect what you don’t see. Your digital assets are your identities and your data. It includes your PAN, Aadhaar number, email address, social media handles, mobile phone number, bank account number, and credit card numbers. And then there is metadata – data about your usage patterns. Think about the number of times you have given away all this information when filling out online forms. Chaitanya shows us how to identify all our digital assets and then assign values based on importance and risk. He talks about the risks posed and shows us how to protect our crown jewels.

We also like his hands-on approach, and occasionally, he encourages us to try out different commands that sys admins and network administrators use. Simple commands that help us understand concepts such as IP address, TCP/IP, domain name system and other technical concepts. And these tools are already available with your operating system and run at the command prompt.

Privacy is an important part of cybersecurity and I was glad to see explanations about how targeted advertising works. It makes me more cautious about how much personal information I want to share in exchange for free usage of an online service. The chapter on Privacy makes us aware of the perils and annoyances of targeted advertising. Cookies for tea, anyone?

An entire chapter is devoted to explaining the tools we need to protect ourselves from cyberattacks and hackers.

And yes, Chaitanya also tells you what to do if you get hacked.

But why has the title been prefixed with Monkey, Shakespeare, Typewriter? Well, it is a clever title and you will need to read the book to find out. I don’t want to spoil that.

My recommendation: Read the book, even if you are a cybersecurity professional. Just for the foundational concepts. Your non-technically aligned family members will love the book.


Title: Monkey, Shakespeare, Typewriter: Cybersecurity for Everyone
Author: Chaitanya Kunthe
Publisher: Om Books International
Pages: 176
Price: Rs 284/-

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
The First 90 Days Are Crucial for the CISO and CIO

This book arms you with insights into crafting a robust 90-day plan, and you’ll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions.

Similar Articles

The First 90 Days Are Crucial for the CISO and CIO
The First 90 Days Are Crucial for the CISO and CIO

This book arms you with insights into crafting a robust 90-day plan, and you’ll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions.