Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Beschreibung
Introduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371
Introduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371
Details
Erscheinungsjahr: 2022
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 416 S.
ISBN-13: 9781119867180
ISBN-10: 1119867185
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Steinberg, Joseph
Auflage: 2/2022
Hersteller: Wiley-VCH GmbH
Verantwortliche Person für die EU: Wiley-VCH GmbH, Boschstr. 12, D-69469 Weinheim, product-safety@wiley.com
Maße: 234 x 187 x 30 mm
Von/Mit: Joseph Steinberg
Erscheinungsdatum: 10.06.2022
Gewicht: 0,75 kg
Artikel-ID: 120551968

Ähnliche Produkte