Cybersecurity for Everyone - David B. Skillicorn

Cybersecurity for Everyone

Buch | Hardcover
102 Seiten
2020
CRC Press (Verlag)
978-0-367-64278-5 (ISBN)
59,95 inkl. MwSt
Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issues so they are accessible to anyone from non-technical backgrounds.
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless.

Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.

David B. Skillicorn is Professor at the School of Computing, Queen's University, Canada. He was written extensively about security issues.

Preface

Introduction

How cyberspace works
Encounters with cyberspace

What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace

Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use

Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks

Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures

Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery

Application security
Email
Web traffic
Blockchains

Summary

Index

Erscheinungsdatum
Verlagsort London
Sprache englisch
Maße 138 x 216 mm
Gewicht 349 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen CAD-Programme
ISBN-10 0-367-64278-6 / 0367642786
ISBN-13 978-0-367-64278-5 / 9780367642785
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95