Skip to Content
Data Leaks For Dummies®
book

Data Leaks For Dummies®

by Guy Bunker, Gareth Fraser-King
February 2009
Beginner
427 pages
9h 47m
English
For Dummies
Content preview from Data Leaks For Dummies®

Chapter 7. IT Security

In This Chapter

  • Looking out over the threat landscape

  • Getting a grip on some common security threats

  • Looking into the mind and motivations of a data thief

  • Combatting IT security threats

  • Discovering what the cyber-criminal is really after

To say IT security is only worthy of one chapter is underselling it — hugely. There are hundreds of books on the topic in all of its aspects. However we are looking at IT security from a data-leak perspective. We start by looking at the threat landscape, what's out there and coming to get you. If you know where the threats are, you can protect yourself from them. The other key to understanding IT security is to understand the people who are after your information: the data thieves and cyber-criminals. Forewarned is forearmed (there's that refrain again).

Surveying the Threat Landscape

So just what is a threat landscape? No place to camp out, for sure. Basically it's the big picture that encompasses a range of cyber-criminals and the threats they pose. Once that landscape was relatively flat — back in the time of the first viruses and computer attacks. While the first known spam (e-mail sent to people who didn't ask for it) cropped up back in the late 1970s, it wasn't until the mid-'80s that first viruses started becoming known. Figure 7-1 provides an overview of the constant march of computer threats.

Back in the '80s, there was no Internet as we know it today. Academic institutions and big high-tech companies used a forerunner of ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

The Three Traps That Stymie Reinvention

The Three Traps That Stymie Reinvention

Ryan Raffaelli
Coaching for High Performance

Coaching for High Performance

MIT Sloan Management Review
What Successful Project Managers Do

What Successful Project Managers Do

W. Scott Cameron, Jeffrey S. Russell, Edward J. Hoffman, Alexander Laufer

Publisher Resources

ISBN: 9780470388433Purchase book