Lýsing:
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.
Annað
- Höfundur: Joseph Steinberg
- Útgáfa:1
- Útgáfudagur: 01-10-2019
- Hægt að prenta út 10 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9781119560340
- Print ISBN: 9781119560326
- ISBN 10: 1119560349
Efnisyfirlit
- Cover
- Introduction
- About This Book
- Foolish Assumptions
- Conventions Used in This Book
- Icons Used in This Book
- Beyond This Book
- Where to Go from Here
- Part 1: Getting Started with Cybersecurity
- Chapter 1: What Exactly Is Cybersecurity?
- Cybersecurity Means Different Things to Different Folks
- Cybersecurity Is a Constantly Moving Target
- Looking at the Risks That Cybersecurity Mitigates
- Chapter 2: Getting to Know Common Cyberattacks
- Attacks That Inflict Damage
- Impersonation
- Interception
- Data Theft
- Malware
- Poisoned Web Service Attacks
- Network Infrastructure Poisoning
- Malvertising
- Exploiting Maintenance Difficulties
- Advanced Attacks
- Chapter 3: Bad Guys and Accidental Bad Guys: The Folks You Must Defend Against
- Bad Guys and Good Guys Are Relative Terms
- Bad Guys Up to No Good
- Cyberattackers and Their Colored Hats
- Monetizing Their Actions
- Dealing with Nonmalicious Threats
- Defending against These Attackers
- Addressing Risks through Various Methods
- Chapter 1: What Exactly Is Cybersecurity?
- Chapter 4: Evaluating Your Current Cybersecurity Posture
- Identifying Ways You May Be Less than Secure
- Identifying Risks
- Protecting against Risks
- Evaluating Your Current Security Measures
- Privacy 101
- Banking Online Safely
- Safely Using Smart Devices
- Chapter 5: Enhancing Physical Security
- Understanding Why Physical Security Matters
- Taking Inventory
- Locating Your Vulnerable Data
- Creating and Executing a Physical Security Plan
- Implementing Physical Security
- Security for Mobile Devices
- Realizing That Insiders Pose the Greatest Risks
- Chapter 6: Securing Your Accounts
- Realizing That You’re a Target
- Securing Your External Accounts
- Securing Data Associated with User Accounts
- Securing Data with Parties That You’ve Interacted With
- Securing Data at Parties That You Haven’t Interacted With
- Chapter 7: Passwords
- Passwords: The Primary Form of Authentication
- Avoiding Simplistic Passwords
- Password Considerations
- Creating Memorable, Strong Passwords
- Knowing When to Change Your Password
- Changing Passwords after a Breach
- Providing Passwords to Humans
- Storing Passwords
- Transmitting Passwords
- Discovering Alternatives to Passwords
- Chapter 8: Preventing Social Engineering
- Don’t Trust Technology More than You Would People
- Types of Social Engineering Attacks
- Six Principles Social Engineers Exploit
- Don’t Overshare on Social Media
- Leaking Data by Sharing Information as Part of Viral Trends
- Identifying Fake Social Media Connections
- Using Bogus Information
- Using Security Software
- General Cyberhygiene Can Help Prevent Social Engineering
- Chapter 9: Securing Your Small Business
- Making Sure Someone Is in Charge
- Watching Out for Employees
- Considering Cyber Insurance
- Complying with Regulations and Compliance
- Handling Internet Access
- Managing Power Issues
- Chapter 10: Cybersecurity and Big Businesses
- Utilizing Technological Complexity
- Managing Custom Systems
- Continuity Planning and Disaster Recovery
- Looking at Regulations
- Deeper Pockets — and Insured
- Considering Employees, Consultants, and Partners
- Looking at the Chief Information Security Officer’s Role
- Chapter 11: Identifying a Security Breach
- Identifying Overt Breaches
- Detecting Covert Breaches
- Chapter 12: Recovering from a Security Breach
- An Ounce of Prevention Is Worth Many Tons of Response
- Stay Calm and Act Now with Wisdom
- Bring in a Pro
- Recovering from a Breach without a Pro’s Help
- Reinstall Damaged Software
- Dealing with Stolen Information
- Recovering When Your Data Is Compromised at a Third Party
- Chapter 13: Backing Up
- Backing Up Is a Must
- Looking at the Different Types of Backups
- Exploring Backup Tools
- Knowing Where to Back Up
- Knowing Where Not to Store Backups
- Encrypting Backups
- Figuring Out How Often You Should Backup
- Disposing of Backups
- Testing Backups
- Conducting Cryptocurrency Backups
- Backing Up Passwords
- Creating a Boot Disk
- Chapter 14: Resetting Your Device
- Exploring Two Types of Resets
- Rebuild Your Device after a Hard Reset
- Chapter 15: Restoring from Backups
- You Will Need to Restore
- Wait! Do Not Restore Yet!
- Restoring from Full Backups of Systems
- Restoring from Incremental Backups
- Dealing with Deletions
- Excluding Files and Folders
- Understanding Archives
- Restoring Using Backup Tools
- Returning Backups to Their Proper Locations
- Restoring to Non-Original Locations
- Never Leave Your Backups Connected
- Restoring from Encrypted Backups
- Testing Backups
- Restoring Cryptocurrency
- Booting from a Boot Disk
- Chapter 16: Pursuing a Cybersecurity Career
- Professional Roles in Cybersecurity
- Exploring Career Paths
- Starting Out in Information Security
- Exploring Popular Certifications
- Overcoming a Criminal Record
- Looking at Other Professions with a Cybersecurity Focus
- Chapter 17: Emerging Technologies Bring New Threats
- Relying on the Internet of Things
- Using Cryptocurrencies and Blockchain
- Optimizing Artificial Intelligence
- Experiencing Virtual Reality
- Transforming Experiences with Augmented Reality
- Chapter 18: Ten Ways You Can Improve Your Cybersecurity without Spending a Fortune
- Understand That You Are a Target
- Use Security Software
- Encrypt Sensitive Information
- Back Up Often
- Do Not Share Passwords and Other Login Credentials
- Use Proper Authentication
- Use Social Media Wisely
- Segregate Internet Access
- Use Public Wi-Fi Safely
- Hire a Pro
- Chapter 19: Ten Lessons from Major Cybersecurity Breaches
- Marriott
- Target
- Sony Pictures
- Office of Personnel Management
- Anthem
- Chapter 20: Ten Ways to Safely Use Public Wi-Fi
- Use Your Cellphone as a Mobile Hotspot
- Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi
- Don’t Perform Sensitive Tasks over Public Wi-Fi
- Don’t Reset Passwords When Using Public Wi-Fi
- Use a VPN Service
- Use Tor
- Use Encryption
- Turn Off Sharing
- Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks
- Understand the Difference between True Public Wi-Fi and Shared Wi-Fi
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 16152
- Útgáfuár : 2019
- Leyfi : 380