Chapter 3
Bad Guys and Accidental Bad Guys: The Folks You Must Defend Against
IN THIS CHAPTER
Clarifying who the “good guys” are and who the “bad guys” are
Understanding the different types of hackers
Discovering how hackers make money from their crimes
Exploring threats from nonmalicious actors
Defending against hackers and other ways of mitigating against risks
Many centuries ago, the Chinese military strategist and philosopher, Sun Tzu, wrote
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.
If you know neither the enemy nor yourself, you will succumb in every battle.
As has been the case since ancient times, knowing your enemy is critical for your own defense.
Such wisdom remains true in the age of digital security. While Chapter 2 covers many of the threats posed by cyber-enemies, this chapter covers the enemies themselves:
- Who are ...
Get Cybersecurity For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.