CHAPTER 13

Case Studies

13.1    INTRODUCTION

Security concepts and principles are often best understood when presented in the context of real-life situations. In this chapter, to illustrate practical security best practices, many of the key topics discussed throughout the book are applied and presented as case studies related to situations you might typically encounter in your everyday use of computer security. Although these case studies are based on actual events, the fictitious characters of Alice and Bob have been cast into the star roles.

13.2    UNABLE TO REMOVE MALWARE: HELP!

Alice is using her computer and notices an unfamiliar application on the task bar that keeps displaying pop-up messages indicating that her computer is ...

Get Computer Security Literacy now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.