Edwards | Cyber Defense | Buch | 978-1-394-33701-9 | sack.de

Buch, Englisch, 400 Seiten, Format (B × H): 185 mm x 257 mm, Gewicht: 998 g

Edwards

Cyber Defense

Best Practices for Digital Safety
1. Auflage 2025
ISBN: 978-1-394-33701-9
Verlag: Wiley

Best Practices for Digital Safety

Buch, Englisch, 400 Seiten, Format (B × H): 185 mm x 257 mm, Gewicht: 998 g

ISBN: 978-1-394-33701-9
Verlag: Wiley


Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices

Cyber Defense is a comprehensive guide that provides an in-depth exploration of essential practices to secure one’s digital life. The book begins with an introduction to cyber hygiene, emphasizing its importance and the foundational concepts necessary for maintaining digital security. It then dives into financial security, detailing methods for protecting financial accounts, monitoring transactions, and compartmentalizing accounts to minimize risks. Password management and multifactor authentication are covered, offering strategies for creating strong passwords, using password managers, and enabling multifactor authentication.

With a discussion on secure internet browsing practices, techniques to avoid phishing attacks, and safe web browsing, this book provides email security guidelines for recognizing scams and securing email accounts. Protecting personal devices is discussed, focusing on smartphones, tablets, laptops, IoT devices, and app store security issues. Home network security is explored, with advice on securing home networks, firewalls, and Wi-Fi settings. Each chapter includes recommendations for success, offering practical steps to mitigate risks.

Topics covered in Cyber Defense include: - Data protection and privacy, providing insights into encrypting information and managing personal data
- Backup and recovery strategies, including using personal cloud storage services
- Social media safety, highlighting best practices, and the challenges of AI voice and video
- Actionable recommendations on protecting your finances from criminals
- Endpoint protection, ransomware, and malware protection strategies, alongside legal and ethical considerations, including when and how to report cyber incidents to law enforcement

Cyber Defense is an essential guide for anyone, including business owners and managers of small and medium-sized enterprises, IT staff and support teams, and students studying cybersecurity, information technology, or related fields.

Edwards Cyber Defense jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


About the Author xiii

Introduction xv

1 Why Cyber Safety Matters Today 1

The Rise of Digital Connectivity 2

The Expanding Threat Landscape 3

Personal Implications of Cyber Insecurity 6

The Importance of Proactive Cyber Safety 8

Recommendations 12

Conclusion 13

Chapter Questions 14

2 Understanding Cyber Safety in the Digital Age 17

Defining Cyber Safety and Security 17

Fundamentals of Digital Literacy 20

Developing Critical Thinking Skills Online 22

The Human Element in Cybersecurity 24

Recommendations 27

Conclusion 28

Chapter Questions 29

3 Understanding and Preventing Identity Theft 31

What Is Identity Theft? 31

Recognizing Signs of Identity Theft 34

Understanding Data Breaches 37

Preventing Identity Theft 40

Responding to Identity Theft and Data Breaches 43

Recommendations 45

Conclusion 46

Chapter Questions 47

4 Protecting Your Accounts with Strong Passwords and MFA 51

The Importance of Strong Passwords 51

Creating and Managing Strong Passwords 54

Understanding MFA 55

Advanced Account Security Measures 57

Protecting Business and Shared Accounts 59

Recommendations 61

Conclusion 62

Chapter Questions 63

5 Email Security Best Practices 67

Understanding Email Threats 68

Recognizing and Avoiding Phishing Attempts 70

Securing Your Email Accounts 73

Safe Email Practices 76

Professional Email Etiquette and Security 77

Recommendations 79

Conclusion 81

Chapter Questions 81

6 Managing Your Digital Footprint and Online Reputation 85

Understanding Your Digital Footprint 85

Monitoring and Controlling Your Online Presence 88

Building a Positive Online Reputation 90

Privacy Considerations 92

Future Implications of Your Digital Footprint 94

Recommendations 95

Conclusion 96

Chapter Questions 97

7 Safe and Professional Use of Social Media 101

Navigating Social Media Platforms Securely 101

Protecting Personal Information 104

Professional Conduct on Social Media 106

Dealing with Social Media Threats 107

Leveraging Social Media Safely 108

Recommendations 110

Conclusion 112

Chapter Questions 112

8 Dealing with Cyberbullying and Online Harassment 115

Understanding Cyberbullying and Harassment 116

Recognizing Signs of Cyberbullying 117

Strategies for Victims 119

Preventing Cyberbullying 121

Supporting Others and Advocacy 123

Recommendations 125

Contents ix

Conclusion 126

Chapter Questions 127

9 Children's Online Safety and Parental Controls 131

The Digital World of Children and Teens 132

Communicating with Children About Cyber Safety 134

Implementing Parental Controls and Monitoring 137

Educating Children on Safe Online Practices 139

Collaborating with Schools and Communities 141

Recommendations 142

Conclusion 143

Chapter Questions 144

10 Avoiding Online Scams and Social Engineering Tricks 147

Understanding Social Engineering 148

Common Online Scams 150

Recognizing Red Flags 152

Protecting Yourself from Scams 155

Educating Others and Staying Informed 158

Recommendations 159

Conclusion 160

Chapter Questions 161

11 Using AI Securely and Protecting Your Privacy 165

The Role of AI in Everyday Life 166

Privacy Concerns with AI Technologies 168

Secure Use of AI-powered Devices and Services 170

Protecting Personal Data in the Age of AI 173

Preparing for Future AI Developments 175

Recommendations 177

Conclusion 178

Chapter Questions 179

12 Securing Your Devices and Wearables 183

Mobile Device Security Essentials 183

Protecting Against Mobile Malware 186

Securing Wearable Devices 187

Physical Security and Theft Prevention 190

Disposal and Recycling of Devices 192

Recommendations 194

Conclusion 195

Chapter Questions 196

13 Managing Software and App Security on All Devices 199

Importance of Software Security 199

Safe Installation and Use of Applications 202

Configuration and Hardening of Software 203

Application Whitelisting and Blacklisting 206

Responding to Software Vulnerabilities 208

Recommendations 210

Conclusion 211

Chapter Questions 212

14 Defending Yourself Against Ransomware and Malware 215

Understanding Malware and Ransomware 215

Preventing Malware Infections 218

Recognizing Signs of Infection 221

Responding to a Malware Attack 223

Mitigating the Impact of Ransomware 225

Recommendations 227

Conclusion 228

Chapter Questions 229

15 How to Stay Safe While Browsing the Internet 231

Secure Browsing Practices 231

Avoiding Malicious Websites and Content 234

Protecting Personal Information Online 236

Mental Health and Digital Well-being 239

Safe Participation in Online Communities 241

Recommendations 243

Conclusion 244

Chapter Questions 244

16 Network Security 247

Securing Your Home Network 248

Protecting IoT Devices 250

Safe Use of Public Wi-Fi Networks 252

Encryption and VPNs 254

Cybersecurity for Remote Work and Home Offices 256

Securing Online Gaming and Virtual Reality Platforms 258

Recommendations 260

Conclusion 261

Chapter Questions 262

17 Safeguarding Your Financial Assets and Secure Online Transactions 265

Secure Online Banking Practices 265

Safe Online Shopping 268

Protecting Against Financial Fraud 270

Understanding Cryptocurrency Security 273

Planning for Financial Security 275

Recommendations 277

Conclusion 278

Chapter Questions 278

18 Protecting Your Data: Backups, Cloud Storage, and Disaster Recovery 281

Importance of Data Protection 282

Effective Backup Strategies 284

Secure Use of Cloud Storage 285

Disaster Recovery Planning 287

Data Disposal and Destruction 290

Recommendations 292

Conclusion 293

Chapter Questions 294

19 Cybercrimes and How to Report Them 297

Understanding Cybercrimes 298

Recognizing When You’re a Victim 300

Reporting Cybercrimes 303

The Investigation and Legal Process 305

Preventing Future Incidents 307

Recommendations 308

Conclusion 309

Chapter Questions 310

20 Preparing for Emerging Cyber Threats 313

Emerging Cyber Threats 313

AI and ML in Cybersecurity 315

Adapting Security Practices 318

Personal Strategies for Future-proofing Security 320

The Role of Individuals in Shaping Cybersecurity 323

Recommendations 325

Conclusion 326

Chapter Questions 326

21 Teaching and Empowering Others in Cyber Safety 329

Sharing Knowledge and Resources 330

Encouraging Safe Practices in the Workplace 332

Supporting Friends and Family 335

Mentoring and Community Involvement 336

Continuing the Journey of Cyber Safety 338

Recommendations 340

Conclusion 341

Chapter Questions 341

Appendix Answers to Chapter Questions 345

Glossary 375

Index 381


Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and a popular voice on LinkedIn.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.