Details

Cybersecurity For Dummies


Cybersecurity For Dummies


2. Aufl.

von: Joseph Steinberg

20,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 16.03.2022
ISBN/EAN: 9781119867197
Sprache: englisch
Anzahl Seiten: 416

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Explore the latest developments in cybersecurity with this essential guide</b> <p>Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree in computer science to make it happen! <p><i>Cybersecurity For Dummies </i>is the down-to-earth guide you need to secure your own data (and your company’s, too). You’ll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised. <p>The book also offers: <ul> <li>Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target</li> <li>Step-by-step instructions on how to create data backups and implement strong encryption</li> <li>Basic info that every aspiring cybersecurity professional needs to know</li></ul><p><i>Cybersecurity For Dummies </i>is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
<p>Introduction 1</p> <p><b>Part 1: Getting Started with Cybersecurity 5</b></p> <p>Chapter 1: What Exactly Is Cybersecurity? 7</p> <p>Chapter 2: Getting to Know Common Cyberattacks 23</p> <p>Chapter 3: The Bad Guys You Must Defend Against 49</p> <p><b>Part 2: Improving Your Own Personal Security 69</b></p> <p>Chapter 4: Evaluating Your Current Cybersecurity Posture 71</p> <p>Chapter 5: Enhancing Physical Security 93</p> <p>Chapter 6: Cybersecurity Considerations When Working from Home 105</p> <p><b>Part 3: Protecting Yourself from Yourself 115</b></p> <p>Chapter 7: Securing Your Accounts 117</p> <p>Chapter 8: Passwords 135</p> <p>Chapter 9: Preventing Social Engineering Attacks 151</p> <p><b>Part 4: Cybersecurity for Businesses, Organizations, and Government 173</b></p> <p>Chapter 10: Securing Your Small Business 175</p> <p>Chapter 11: Cybersecurity and Big Businesses 201</p> <p><b>Part 5: Handling a Security Incident (This Is a When, Not an If) 217</b></p> <p>Chapter 12: Identifying a Security Breach 219</p> <p>Chapter 13: Recovering from a Security Breach 239</p> <p><b>Part 6: Backing Up and Recovery 259</b></p> <p>Chapter 14: Backing Up 261</p> <p>Chapter 15: Resetting Your Device 289</p> <p>Chapter 16: Restoring from Backups 299</p> <p><b>Part 7: Looking toward the Future 321</b></p> <p>Chapter 17: Pursuing a Cybersecurity Career 323</p> <p>Chapter 18: Emerging Technologies Bring New Threats 337</p> <p><b>Part 8: The Part of Tens 351</b></p> <p>Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353</p> <p>Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359</p> <p>Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367</p> <p>Index 371</p> <p> </p> <p>ntroduction 1</p> <p><b>Part 1: Getting Started with Cybersecurity 5</b></p> <p>Chapter 1: What Exactly Is Cybersecurity? 7</p> <p>Chapter 2: Getting to Know Common Cyberattacks 23</p> <p>Chapter 3: The Bad Guys You Must Defend Against 49</p> <p><b>Part 2: Improving Your Own Personal Security 69</b></p> <p>Chapter 4: Evaluating Your Current Cybersecurity Posture 71</p> <p>Chapter 5: Enhancing Physical Security 93</p> <p>Chapter 6: Cybersecurity Considerations When Working from Home 105</p> <p><b>Part 3: Protecting Yourself from Yourself 115</b></p> <p>Chapter 7: Securing Your Accounts 117</p> <p>Chapter 8: Passwords 135</p> <p>Chapter 9: Preventing Social Engineering Attacks 151</p> <p><b>Part 4: Cybersecurity for Businesses, Organizations, and Government 173</b></p> <p>Chapter 10: Securing Your Small Business 175</p> <p>Chapter 11: Cybersecurity and Big Businesses 201</p> <p><b>Part 5: Handling a Security Incident (This Is a When, Not an If) 217</b></p> <p>Chapter 12: Identifying a Security Breach 219</p> <p>Chapter 13: Recovering from a Security Breach 239</p> <p><b>Part 6: Backing Up and Recovery 259</b></p> <p>Chapter 14: Backing Up 261</p> <p>Chapter 15: Resetting Your Device 289</p> <p>Chapter 16: Restoring from Backups 299</p> <p><b>Part 7: Looking toward the Future 321</b></p> <p>Chapter 17: Pursuing a Cybersecurity Career 323</p> <p>Chapter 18: Emerging Technologies Bring New Threats 337</p> <p><b>Part 8: The Part of Tens 351</b></p> <p>Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353</p> <p>Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359</p> <p>Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367</p> <p>Index 371</p> <p> </p> <p>ntroduction 1</p> <p><b>Part 1: Getting Started with Cybersecurity</b><b> 5</b></p> <p>Chapter 1: What Exactly Is Cybersecurity? 7</p> <p>Chapter 2: Getting to Know Common Cyberattacks 23</p> <p>Chapter 3: The Bad Guys You Must Defend Against 49</p> <p><b>Part 2: Improving Your Own Personal Security</b><b> 69</b></p> <p>Chapter 4: Evaluating Your Current Cybersecurity Posture 71</p> <p>Chapter 5: Enhancing Physical Security 93</p> <p>Chapter 6: Cybersecurity Considerations When Working from Home 105</p> <p><b>Part 3: Protecting Yourself from Yourself</b><b> 115</b></p> <p>Chapter 7: Securing Your Accounts 117</p> <p>Chapter 8: Passwords 135</p> <p>Chapter 9: Preventing Social Engineering Attacks 151</p> <p><b>Part 4: Cybersecurity for Businesses, Organizations, and Government </b><b>173</b></p> <p>Chapter 10: Securing Your Small Business 175</p> <p>Chapter 11: Cybersecurity and Big Businesses 201</p> <p><b>Part 5: Handling a Security Incident (This Is a When, Not an If)</b><b> 217</b></p> <p>Chapter 12: Identifying a Security Breach 219</p> <p>Chapter 13: Recovering from a Security Breach 239</p> <p><b>Part 6: Backing Up and Recovery</b><b> 259</b></p> <p>Chapter 14: Backing Up 261</p> <p>Chapter 15: Resetting Your Device 289</p> <p>Chapter 16: Restoring from Backups 299</p> <p><b>Part 7: Looking toward the Future</b><b> 321</b></p> <p>Chapter 17: Pursuing a Cybersecurity Career 323</p> <p>Chapter 18: Emerging Technologies Bring New Threats 337</p> <p><b>Part 8: The Part of Tens</b><b> 351</b></p> <p>Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353</p> <p>Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359</p> <p>Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367</p> <p>Index 371</p>
<p><b>Joseph Steinberg</b> is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP<sup>®</sup>, ISSAP<sup>®</sup>, ISSMP<sup>®</sup>, and CSSLP<sup>®</sup>. Joseph has written several books on cybersecurity, including the previous edition of <i>Cybersecurity For Dummies</i>. He is currently a consultant on information security, and serves as an expert witness in related matters.</p>
<p><b>Cybersecurity made easy</b></p> <p>These days, cybersecurity is for everyone. <i>Cybersecurity For Dummies</i> helps you protect your personal information and lock down your business data. In this updated edition, you get the latest facts about what happens to the stuff you put online. Work from home securely and avoid misinformation. Make sure your photos, passwords, and other important stuff are safe from hackers. And if your info should happen to fall into the wrong hands? We explain how to identify the problem and what to do about it. Let Dummies be your digital defender. <p><b>Inside… <ul><li>Safeguard against cyberattacks</li> <li>Determine your cybersecurity strengths and weaknesses</li> <li>Make your personal and business data more secure </li> <li>Recover from a security breach</li> <li>Learn about careers in the growing field of cybersecurity</li></b></ul>

Diese Produkte könnten Sie auch interessieren:

Penetration Testing For Dummies
Penetration Testing For Dummies
von: Robert Shimonski
PDF ebook
19,99 €
Ransomware Protection Playbook
Ransomware Protection Playbook
von: Roger A. Grimes
PDF ebook
18,99 €
Hacking For Dummies
Hacking For Dummies
von: Kevin Beaver
PDF ebook
20,99 €