Staying Safe in a Digital World
E-Book, Englisch, 368 Seiten
ISBN: 978-1-4398-5619-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware.
While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world.
Zielgruppe
Professionals in information technology and computer security; students in computer security literacy courses; corporations and government organizations interested in security training for employees.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
What Is Information Security?
Introduction
How Much of Our Daily Lives Relies on Computers?
Security Truisms
Basic Security Terminology
Cyber Ethics
The Perception of Security
Threat Model
Security Is a Multidisciplinary Topic
Introduction to Computers and the Internet
Introduction
Computers
Operation of a Computer
Overview of the Internet
Computers and the Internet
Security Role-Playing Characters
Passwords under Attack
Introduction
Authentication Process
Password Threats
Strong Passwords
Password Management: Let’s Be Practical
Email Security
Introduction
Email Systems
Email Security and Privacy
Malware: The Dark Side of Software
Introduction
What Is Malware?
How Do I Get Malware?
What Does Malware Do?
Malware: Defense in Depth
Introduction
Data Backup
Firewalls
Software Patches
Antivirus Software
User Education
Securely Surfing the World Wide Web
Introduction
Web Browser
"HTTP Secure"
Web Browser History
Online Shopping
Introduction
Consumer Decisions
Spyware and Key-Loggers
Wireless Sniffing
Scams and Phishing Websites
Misuse and Exposure of Information
Wireless Internet Security
Introduction
How Wireless Networks Work
Wireless Security Threats
Public Wi-Fi Security
Wireless Network Administration
Social Networking
Introduction
Choose Your Friends Wisely
Information Sharing
Malware and Phishing
Social Engineering: Phishing for Suckers
Introduction
Social Engineering: Malware Distribution
Phishing
Detecting a Phishing URL
Application of Knowledge
Staying Safe Online: The Human Threat
Introduction
The Differences between Cyberspace and the Physical World
Consider the Context: Watch What You Say and How It Is Communicated
What You Do on the Internet Lasts Forever
Nothing Is Private, Now or in the Future
Can You Really Tell Who You Are Talking with?
Cameras and Photo Sharing
I Am a Good Person, That Would Never Happen to Me
Is There Anything I Can Do to Make the Internet a Safer Place for My Child?
Case Studies
Introduction
Unable to Remove Malware: Help!
Securely Handling Suspicious Email Attachments
Recovering from a Phishing Attack
Email Account Hacked? Now What?
Smart Phones and Malware
Hey! You! Get off My Wireless Network
Bad Breakup? Sever Your Digital Ties
"Display Images Below"? The Meaning behind the Question
Phishing Email Forensics
It’s on the Internet, So It Must Be True
Buying and Selling Online
Moving Forward with Security and Book Summary
Introduction
After the Completion of the Book
Defense-in-Depth Tasks
Chapter Summaries
Glossary
Appendix A: Reading List
Appendix B: Basics of Cryptography
Appendix C: Web Surfing Security Technologies
A Summary and Bibliography appear at the end of each chapter.