Book description
Helping average computer users make sound security decisions, this book focuses on practical security topics users are likely to encounter on a regular basis so that they better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics-including social engineering, email, and online shopping-and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms such as antivirus software and firewalls protect against the threats of hackers and malware.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- About the Authors
- CHAPTER 1 WHAT Is INFORMATION SECURITY?
- CHAPTER 2 INTRODUCTION TO COMPUTERS AND THE INTERNET
- CHAPTER 3 PASSWORDS UNDER ATTACK
- CHAPTER 4 EMAIL SECURITY
- CHAPTER 5 MALWARE: THE DARK SIDE OF SOFTWARE
- CHAPTER 6 MALWARE: DEFENSE IN DEPTH
- CHAPTER 7 SECURELY SURFING THE WORLD WIDE WEB
- CHAPTER 8 ONLINE SHOPPING
- CHAPTER 9 WIRELESS INTERNET SECURITY
- CHAPTER 10 SOCIAL NETWORKING
- CHAPTER 11 SOCIAL ENGINEERING: PHISHING FOR SUCKERS
-
CHAPTER 12 STAYING SAFE ONLINE: THE HUMAN THREAT
- 12.1 INTRODUCTION
- 12.2 THE DIFFERENCES BETWEEN CYBERSPACE AND THE PHYSICAL WORLD
- 12.3 CONSIDER THE CONTEXT: WATCH WHAT YOU SAY AND HOW IT IS COMMUNICATED
- 12.4 WHAT YOU DO ON THE INTERNET LASTS FOREVER
- 12.5 NOTHING IS PRIVATE, NOW OR IN THE FUTURE
- 12.6 CAN YOU REALLY TELL WHO YOU ARE TALKING WITH?
- 12.7 CAMERAS AND PHOTO SHARING
- 12.8 I AM A GOOD PERSON, THAT WOULD NEVER HAPPEN TO ME
- 12.9 IS THERE ANYTHING I CAN DO TO MAKE THE INTERNET A SAFER PLACE FOR MY CHILD?
- BIBLIOGRAPHY
-
CHAPTER 13 CASE STUDIES
- 13.1 INTRODUCTION
- 13.2 UNABLE TO REMOVE MALWARE: HELP!
- 13.3 SECURELY HANDLING SUSPICIOUS EMAIL ATTACHMENTS
- 13.4 RECOVERING FROM A PHISHING ATTACK
- 13.5 EMAIL ACCOUNT HACKED? NOW WHAT?
- 13.6 SMART PHONES AND MALWARE
- 13.7 HEY! YOU! GET OFF MY WIRELESS NETWORK
- 13.8 BAD BREAKUP? SEVER YOUR DIGITAL TIES
- 13.9 “DISPLAY IMAGES BELOW”? THE MEANING BEHIND THE QUESTION
- 13.10 PHISHING EMAIL FORENSICS
- 13.11 IT’S ON THE INTERNET, SO IT MUST BE TRUE
- 13.12 BUYING AND SELLING ONLINE
- BIBLIOGRAPHY
-
CHAPTER 14 MOVING FORWARD WITH SECURITY AND BOOK SUMMARY
- 14.1 INTRODUCTION
- 14.2 AFTER THE COMPLETION OF THE BOOK
- 14.3 DEFENSE-IN-DEPTH TASKS
-
14.4 CHAPTER SUMMARIES
- Chapter 1: Introduction
- Chapter 2: Computers and the Internet
- Chapter 3: Passwords
- Chapter 4: Email
- Chapter 5: Malware
- Chapter 6: Malware Defense
- Chapter 7: Securely Surfing the Web
- Chapter 8: Online Shopping
- Chapter 9: Wireless Internet Security
- Chapter 10: Social Networking
- Chapter 11: Social Engineering: Phishing for Suckers
- Chapter 12: Staying Safe Online: The Human Threat
- Chapter 13: Case Studies
- GLOSSARY
- APPENDIX A: READING LIST
- APPENDIX B: BASICS OF CRYPTOGRAPHY
- APPENDIX C: WEB SURFING SECURITY TECHNOLOGIES
Product information
- Title: Computer Security Literacy
- Author(s):
- Release date: April 2016
- Publisher(s): Chapman and Hall/CRC
- ISBN: 9781000755626
You might also like
book
Computer Security Basics, 2nd Edition
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …