Book description
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree in computer science to make it happen!
Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company’s, too). You’ll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.
The book also offers:
- Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target
- Step-by-step instructions on how to create data backups and implement strong encryption
- Basic info that every aspiring cybersecurity professional needs to know
Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Table of contents
- Cover
- Title Page
- Copyright
- Introduction
-
Part 1: Getting Started with Cybersecurity
- Chapter 1: What Exactly Is Cybersecurity?
-
Chapter 2: Getting to Know Common Cyberattacks
- Attacks That Inflict Damage
- Is That Really You? Impersonation
- Messing around with Other People’s Stuff: Tampering
- Captured in Transit: Interception
- Taking What Isn’t Theirs: Data Theft
- Cyberbombs That Sneak into Your Devices: Malware
- Poisoned Web Service Attacks
- Network Infrastructure Poisoning
- Malvertising
- Exploiting Maintenance Difficulties
- Advanced Attacks
- Some Technical Attack Techniques
- Chapter 3: The Bad Guys You Must Defend Against
- Part 2: Improving Your Own Personal Security
-
Part 3: Protecting Yourself from Yourself
- Chapter 7: Securing Your Accounts
-
Chapter 8: Passwords
- Passwords: The Primary Form of Authentication
- Avoiding Simplistic Passwords
- Password Considerations
- Creating Memorable, Strong Passwords
- Knowing When to Change Passwords
- Changing Passwords after a Breach
- Providing Passwords to Humans
- Storing Passwords
- Transmitting Passwords
- Discovering Alternatives to Passwords
-
Chapter 9: Preventing Social Engineering Attacks
- Don’t Trust Technology More than You Would People
- Types of Social Engineering Attacks
- Six Principles Social Engineers Exploit
- Don’t Overshare on Social Media
- Leaking Data by Sharing Information as Part of Viral Trends
- Identifying Fake Social Media Connections
- Using Bogus Information
- Using Security Software
- General Cyberhygiene Can Help Prevent Social Engineering
- Part 4: Cybersecurity for Businesses, Organizations, and Government
- Part 5: Handling a Security Incident (This Is a When, Not an If)
-
Part 6: Backing Up and Recovery
-
Chapter 14: Backing Up
- Backing Up Is a Must
- Backing Up Data from Apps and Online Accounts
- Backing Up Data on Smartphones
- Conducting Cryptocurrency Backups
- Backing Up Passwords
- Looking at the Different Types of Backups
- Figuring Out How Often You Should Backup
- Exploring Backup Tools
- Creating a Boot Disk
- Knowing Where to Back Up
- Knowing Where Not to Store Backups
- Encrypting Backups
- Testing Backups
- Disposing of Backups
- Chapter 15: Resetting Your Device
-
Chapter 16: Restoring from Backups
- You Will Need to Restore
- Wait! Do Not Restore Yet!
- Restoring Data to Apps
- Restoring from Full Backups of Systems
- Restoring from Incremental Backups
- Dealing with Deletions
- Excluding Files and Folders
- Understanding Archives
- Restoring Using Backup Tools
- Returning Backups to Their Proper Locations
- Restoring to Non-Original Locations
- Never Leave Your Backups Connected
- Restoring from Encrypted Backups
- Testing Backups
- Restoring Cryptocurrency
- Booting from a Boot Disk
-
Chapter 14: Backing Up
-
Part 7: Looking toward the Future
- Chapter 17: Pursuing a Cybersecurity Career
-
Chapter 18: Emerging Technologies Bring New Threats
- Relying on the Internet of Things
- Using Cryptocurrencies and Blockchain
- Cloud-Based Applications and Data
- Optimizing Artificial Intelligence
- Where Was This Laptop Really Made? Supply Chain Risks
- Nothing Is Trustworthy: Zero Trust
- Genius Computers Are Coming: Quantum Supremacy
- Experiencing Virtual Reality
- Transforming Experiences with Augmented Reality
-
Part 8: The Part of Tens
- Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune
- Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches
-
Chapter 21: Ten Ways to Safely Use Public Wi-Fi
- Use Your Cellphone as a Mobile Hotspot
- Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi
- Don’t Perform Sensitive Tasks over Public Wi-Fi
- Don’t Reset Passwords When Using Public Wi-Fi
- Use a VPN Service
- Use Tor
- Use Encryption
- Turn Off Sharing
- Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks
- Understand the Difference between True Public Wi-Fi and Shared Wi-Fi
- Index
- About the Author
- Advertisement Page
- Connect with Dummies
- End User License Agreement
Product information
- Title: Cybersecurity For Dummies, 2nd Edition
- Author(s):
- Release date: April 2022
- Publisher(s): For Dummies
- ISBN: 9781119867180
You might also like
book
Cybersecurity For Dummies
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or …
book
Cybersecurity All-in-One For Dummies
Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Fundamentals of Information Systems Security, 4th Edition
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers …