Jacobson / Idziorek | Computer Security Literacy | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 368 Seiten

Jacobson / Idziorek Computer Security Literacy

Staying Safe in a Digital World
Erscheinungsjahr 2012
ISBN: 978-1-4398-5619-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Staying Safe in a Digital World

E-Book, Englisch, 368 Seiten

ISBN: 978-1-4398-5619-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.

Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware.

While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world.

Jacobson / Idziorek Computer Security Literacy jetzt bestellen!

Zielgruppe


Professionals in information technology and computer security; students in computer security literacy courses; corporations and government organizations interested in security training for employees.

Weitere Infos & Material


What Is Information Security?

Introduction

How Much of Our Daily Lives Relies on Computers?

Security Truisms

Basic Security Terminology

Cyber Ethics

The Perception of Security

Threat Model
Security Is a Multidisciplinary Topic

Introduction to Computers and the Internet

Introduction

Computers
Operation of a Computer
Overview of the Internet
Computers and the Internet

Security Role-Playing Characters

Passwords under Attack

Introduction

Authentication Process

Password Threats
Strong Passwords
Password Management: Let’s Be Practical

Email Security

Introduction

Email Systems
Email Security and Privacy

Malware: The Dark Side of Software

Introduction

What Is Malware?

How Do I Get Malware?
What Does Malware Do?

Malware: Defense in Depth

Introduction

Data Backup

Firewalls
Software Patches
Antivirus Software
User Education

Securely Surfing the World Wide Web

Introduction

Web Browser
"HTTP Secure"

Web Browser History

Online Shopping

Introduction
Consumer Decisions
Spyware and Key-Loggers

Wireless Sniffing

Scams and Phishing Websites

Misuse and Exposure of Information

Wireless Internet Security

Introduction

How Wireless Networks Work

Wireless Security Threats

Public Wi-Fi Security

Wireless Network Administration

Social Networking

Introduction

Choose Your Friends Wisely
Information Sharing
Malware and Phishing

Social Engineering: Phishing for Suckers

Introduction

Social Engineering: Malware Distribution
Phishing
Detecting a Phishing URL
Application of Knowledge

Staying Safe Online: The Human Threat

Introduction

The Differences between Cyberspace and the Physical World

Consider the Context: Watch What You Say and How It Is Communicated

What You Do on the Internet Lasts Forever

Nothing Is Private, Now or in the Future

Can You Really Tell Who You Are Talking with?

Cameras and Photo Sharing

I Am a Good Person, That Would Never Happen to Me

Is There Anything I Can Do to Make the Internet a Safer Place for My Child?

Case Studies

Introduction

Unable to Remove Malware: Help!

Securely Handling Suspicious Email Attachments

Recovering from a Phishing Attack
Email Account Hacked? Now What?

Smart Phones and Malware

Hey! You! Get off My Wireless Network

Bad Breakup? Sever Your Digital Ties

"Display Images Below"? The Meaning behind the Question

Phishing Email Forensics

It’s on the Internet, So It Must Be True

Buying and Selling Online

Moving Forward with Security and Book Summary

Introduction

After the Completion of the Book

Defense-in-Depth Tasks
Chapter Summaries

Glossary

Appendix A: Reading List
Appendix B: Basics of Cryptography
Appendix C: Web Surfing Security Technologies

A Summary and Bibliography appear at the end of each chapter.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.