As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security professional Andrew Peterson addresses several widespread misconceptions about the hacking world so that you can be better prepared to join the fight.
You may believe hackers today are too clever and attacks are too sophisticated for you to do anything, or that your organization isn’t worth a hacker’s time. But that isn’t the case.
All organizations—from small, owner-operated businesses to large, multinational corporations—own data worth stealing and are potential, and even likely, targets for an attack. If you’re ready to take security seriously, you need to involve everyone in the company, including security and non-security professionals alike. This report provides you with an accurate picture, rather than conjecture or half-truths propagated by the media.
Table of contents
Cracking Security Misconceptions
- Misconception #1: Hackers Are Criminals
- Misconception #2: Hackers Must Be Geniuses
- Misconception #3: Hacks Are Sophisticated and Complex
- Misconception #4: Hackers Have No Reason to Attack Me
- Misconception #5: There’s No Money in Hacking
- Misconception #6: Big Organizations Are the Most Secure
- Misconception #7: If I’m Compliant, I’m Secure
- Misconception #8: There’s Nothing I Can Do to Stop Hackers
- A Way Forward
- Title: Cracking Security Misconceptions
- Release date: September 2016
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491956281
You might also like
Tribe of Hackers Red Team
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. …
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
Practical Malware Analysis
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach …
The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile …