Understanding Security Issues

Buch | Softcover
208 Seiten
2018
De|G Press (Verlag)
978-1-5015-1523-1 (ISBN)

Lese- und Medienproben

Understanding Security Issues - Scott Donaldson, Chris Williams, Stanley Siegel
34,95 inkl. MwSt
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.

Scott E. Donaldson, Johns Hopkins University, USA; Chris K. Williams, Leidos, USA; Stanley Siegel, Johns Hopkins University, USA

FOREWORD – 1 page

ABOUT THE AUTHORS – 1 page

ACKNOWLEDGMENTS – 1 page

INTRODUCTION – 2 pages






What is this book about?





Who should read this book?





Why did the authors write this book?





Organization of the book






 

CHAPTERS






Chapter 1—Security Awareness (~15 pages)




This chapter presents why security awareness is essential for everyone. This chapter presents some fundamental concepts and terms used throughout the book.






Chapter 2—Security Process (~15 pages)




This chapter presents the security mind set of identifying assets, threats to those assets, asset vulnerabilities, protections, and risks resulting from protections.






Chapter 3—Security in Your Life (~15 pages)




This chapter presents how you apply the security process to common life scenarios , at work, while traveling, and at home.






Chapter 4—Security Scenarios (~40 pages)




This chapter presents how the Chapter 2 security process is applied to each scenario. Each scenario will walk through a number of common assets, and apply the security process to identify protections that should be applied.








Yourself at Work





Your Company or Organization





Yourself on Travel





Yourself Abroad





Yourself at Home











Chapter 5—Looking to the Future (~15 pages)




This chapter presents some of the evolving security threats, trends, and how you can continue to be security aware.

APPENDIX – Thinking Like a Security Officer (~15 pages)

This appendix presents how security people think about common protections in our work, and as a consequence, home life (e.g., locks, gates, passwords, and firewalls) and how they have to balance tradeoffs between protection and usability.

GLOSSARY – 3 pages

BIBLIOGRAPHY – 3 pages

INDEX – 4 pages

Erscheinungsdatum
Zusatzinfo 5 Tables, black and white; 20 Illustrations, black and white
Verlagsort Boston
Sprache englisch
Maße 155 x 230 mm
Gewicht 351 g
Themenwelt Kunst / Musik / Theater Design / Innenarchitektur / Mode
Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
ISBN-10 1-5015-1523-3 / 1501515233
ISBN-13 978-1-5015-1523-1 / 9781501515231
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Datenanalyse für Künstliche Intelligenz

von Jürgen Cleve; Uwe Lämmel

Buch | Softcover (2024)
De Gruyter Oldenbourg (Verlag)
74,95
Auswertung von Daten mit pandas, NumPy und IPython

von Wes McKinney

Buch | Softcover (2023)
O'Reilly (Verlag)
44,90