0

Cybersecurity For Dummies

eBook

Erschienen am 16.03.2022, 2. Auflage 2022
20,99 €
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9781119867197
Sprache: Englisch
Umfang: 416 S., 18.72 MB
E-Book
Format: PDF
DRM: Adobe DRM

Beschreibung

Explore the latest developments in cybersecurity with this essential guide

Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecureand it doesnt take a degree in computer science to make it happen!

Cybersecurity For Dummiesis the down-to-earth guide you need to secure your own data (and your companys, too). Youll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.

The book also offers:Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a targetStep-by-step instructions on how to create data backups and implement strong encryptionBasic info that every aspiring cybersecurity professional needs to know

Cybersecurity For Dummiesis the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.

Autorenportrait

Joseph Steinberg is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP®, ISSAP®, ISSMP®, and CSSLP®. Joseph has written several books on cybersecurity, including the previous edition ofCybersecurity For Dummies. He is currently a consultant on information security, and serves as an expert witness in related matters.

Inhalt

Introduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

Informationen zu E-Books

„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.