Cybersecurity For Dummies, 2nd Edition (häftad)
Fler böcker inom
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
416
Utgivningsdatum
2022-06-10
Upplaga
2nd Edition
Förlag
John Wiley & Sons Inc
Dimensioner
226 x 183 x 28 mm
Vikt
522 g
Antal komponenter
1
ISBN
9781119867180
Cybersecurity For Dummies, 2nd Edition (häftad)

Cybersecurity For Dummies, 2nd Edition

Häftad Engelska, 2022-06-10
240
  • Finns i lager! Skickas inom 1-3 vardagar.
  • Gratis frakt inom Sverige över 199 kr för privatpersoner.
Kan levereras innan julafton!
Explore the latest developments in cybersecurity with this essential guide Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure-and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised. The book also offers: Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target Step-by-step instructions on how to create data backups and implement strong encryption Basic info that every aspiring cybersecurity professional needs to know Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Visa hela texten

Passar bra ihop

  1. Cybersecurity For Dummies, 2nd Edition
  2. +
  3. The Psychology of Totalitarianism

De som köpt den här boken har ofta också köpt The Psychology of Totalitarianism av Mattias Desmet (inbunden).

Köp båda 2 för 496 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av J Steinberg

  • From Comrades to Citizens

    G Adler, J Steinberg

    In the 1980s South Africa's urban townships exploded into insurrection led by youth and residents' organisations that collectively became known as the civics movement. Ironically the movement has been unable to adapt to the role of a voluntary ass...

Övrig information

Joseph Steinberg is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP (R), ISSAP (R), ISSMP (R), and CSSLP (R). Joseph has written several books on cybersecurity, including the previous edition of Cybersecurity For Dummies. He is currently a consultant on information security, and serves as an expert witness in related matters.

Innehållsförteckning

Introduction 1 About This Book 1 Foolish Assumptions 3 Icons Used in This Book 4 Beyond the Book 4 Where to Go from Here 4 Part 1: Getting Started With Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Cybersecurity Means Different Things to Different Folks 7 Cybersecurity Is a Constantly Moving Target 9 Technological changes 9 Social shifts 14 Economic model shifts 15 Political shifts 16 Looking at the Risks Cybersecurity Mitigates 20 The goal of cybersecurity: The CIA Triad 21 From a human perspective 22 Chapter 2: Getting to Know Common Cyberattacks 23 Attacks That Inflict Damage 24 Denial-of-service (DoS) attacks 24 Distributed denial-of-service (DDoS) attacks 24 Botnets and zombies 26 Data destruction attacks 27 Is That Really You? Impersonation 27 Phishing 28 Spear phishing 28 CEO fraud 28 Smishing 29 Vishing 29 Pharming 29 Whaling: Going for the "big fish" 29 Messing around with Other People's Stuff: Tampering 30 Captured in Transit: Interception 30 Man-in-the-middle attacks 31 Taking What Isn't Theirs: Data Theft 32 Personal data theft 32 Business data theft 32 Data exfiltration 33 Compromised credentials 33 Forced policy violations 34 Cyberbombs That Sneak into Your Devices: Malware 34 Viruses 34 Worms 35 Trojans 35 Ransomware 35 Scareware 36 Spyware 37 Cryptocurrency miners 37 Adware 37 Blended malware 38 Zero-day malware 38 Fake malware on computers 38 Fake malware on mobile devices 38 Fake security subscription renewal notifications 39 Poisoned Web Service Attacks 39 Network Infrastructure Poisoning 40 Malvertising 40 Drive-by downloads 41 Stealing passwords 41 Exploiting Maintenance Difficulties 43 Advanced Attacks 43 Opportunistic attacks 44 Targeted attacks 44 Blended (opportunistic and targeted) attacks 45 Some Technical Attack Techniques 45 Rootkits 45 Brute-force attacks 46 Injection attacks 46 Session hijacking 47 Malformed URL attacks 47 Buffer overflow attacks 48 Chapter 3: The Bad Guys You Must Defend Against 49 Bad Guys and Good Guys Are Relative Terms 50 Bad Guys Up to No Good 51 Script kiddies 51 Kids who are not kiddies 52 Terrorists and other rogue groups 52 Nations and states 52 Corporate spies 54 Criminals 54 Hacktivists 54 Cyberattackers and Their Colored Hats 55 How Cybercriminals Monetize Their Actions 56 Direct financial fraud 56 Indirect financial fraud 57 Ransomware 59 Cryptominers 60 Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats 60 Human error 60 External disasters 62 Defending against These Attackers 67 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Don't be Achilles: Identifying Ways You May Be Less than Secure 71 Your home computer(s) 72 Your mobile devices 73 Your Internet of Things (IoT) devices 73 Your networking equipment 74 Your work environment 74 Identifying Risks 74 Protecting against Risks 75 Perimeter defense 76 Firewall/router 76 Security software 79 Your physical computer(s) and any other endpoints 79 Backups 79 Detecting 80 Responding 80 Recovering 80 Improving 80 Evaluating Your Current Security Measures 80 Software 81 Hardware 82 Insurance 83 Education 83 Privacy 101 84 Think before you share 84 Think before you post 85 General privacy tips 86 Banking Online Safely 88 Safely Using Smart Devices 90 Cryptocurrency Security 101 91 Chapter 5: Enhancing Physical Security 93 Understanding Why Physical Security Matters 94 Taking Inventory 94 Stationary devices 96 Mobile devices 97 Locating Your Vulnerable Data 97 Creating and Executing a Physical Security Plan 98 Implementing Physical Security 100 Security for Mobile Devices 101 Realizing That Insiders Pose the Greatest Risks 102 Chapter 6: Cybersecurity Consideration