O'Reilly logo

Cyber Security: A practitioner's guide by David Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1 INTRODUCTION

If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.

Richard Clarke, author and former Special Advisor for Cyberspace to the US President

In this chapter, we will examine the fundamentals of data and information, since these lie at the very heart of cyber security. Although the two are frequently used interchangeably, it is important to understand the essential difference between the two. We shall also consider the wider context of cyber security, and provide an overview of the remainder of the book.

BACKGROUND

Anyone born after the late 1980s will have little or no concept of life before mobile phones and the internet. They have grown up accustomed to searching the world-wide ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required