Book description
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.
This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim:
- The threats that face every individual and business, all the time.
- Specific indicators of threats so that you understand when you might be attacked and what to do if they occur.
- The security mindset and good security practices.
- Assets that need to be protected at work and at home.
- Protecting yourself and your business at work.
- Protecting yourself and your family at home.
- Protecting yourself and your assets on travel.
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Contents
- Chapter 1: Security Mindset
- Chapter 2: Common Cybersecurity Attacks
- Chapter 3: Protecting Your Computer(s)
- Chapter 4: Protecting Your Passwords
- Chapter 5: Protecting Your Home Network
-
Chapter 6: Smartphones and Tablets
- Smartphone and Tablet Differences
- Protecting Your Smartphone or Tablet
- Addressing Mobile Operating System Vulnerabilities
- Addressing Smartphone or Tablet “Rooting”
- Reducing Smartphone or Tablet Malicious Apps Risk
- Securing Bluetooth and Wi-Fi Networking
- Protecting Your Smartphone and Tablet Location Privacy
- Using SMS-Based Messaging and Authentication Safely
- Using BYOD and Mobile Device Management
- Chapter 7: Protecting Your Web Browsing
- Chapter 8: Protecting Your E-Mail and Phone Calls
-
Chapter 9: Protecting Your Identity, Privacy, and Family Online
- Controlling Your Anonymity Online
- Protecting Your Family Online
- Protecting Your Identity and Credit
- Safely Using E-Mail, Social Media, and Gaming
- Reducing Risk of Online Shopping, Credit Cards, Banking, and Automated Teller Machines
- Protecting Online Medical Privacy
- Understanding Net Neutrality, HIPAA, and GDPR
-
Chapter 10: Protecting Yourself on Travel
- Selecting What to Take When You Travel
- Considering Backups and Contingencies for Travel
- Using Kiosk Computers and Public Internet Connections
- Considering Physical Protection, Personal Safety, and Electricity
- Being Cautious about Conversations and Online Sensitive Data
- Protecting Your Hard Drive and Mobile Media with Encryption
- Reducing the Risk of USB Connections
- Considering Diplomacy, ITAR, EAR, and Security Clearances
- Chapter 11: When Things Go Wrong
-
Chapter 12: Considering Cybersecurity at Work
- Enterprise Cybersecurity Differences
- Enterprise Network Perimeter and Security
- Endpoint Hardening and Encryption
- Identity and Access Management
- Web and E-Mail Protection
- Remote Access to Enterprise IT Resources
- Personnel Cybersecurity Training
- Cybersecurity Operations and Incident Response
- Physical Security and Personnel Protection
- Business Continuity and Disaster Recovery
- Chapter 13: Final Thoughts
-
Appendix A: Common Online Scams
- Common Characteristics of Phishing E-Mails
- Common Subject Lines for Malicious E-Mails
- Watching Out for Scams and Scam Sites
- Antivirus and Tech Support Scams
- Internal Revenue Service (IRS) Scam
- Law Enforcement Scam
- Medicare and Social Security Scams
- Natural Disaster and Charity Scams
- Nigerian Prince Scam
- Appendix B: The Worst Passwords Ever
- Appendix C: Online Security Resources
- Glossary
- Index
Product information
- Title: Understanding Security Issues
- Author(s):
- Release date: December 2018
- Publisher(s): De Gruyter
- ISBN: 9781501506369
You might also like
book
Securing VoIP
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Federated Identity Primer
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …