Understanding Security Issues

Book description

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. 

This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim:

  • The threats that face every individual and business, all the time.
  • Specific indicators of threats so that you understand when you might be attacked and what to do if they occur.
  • The security mindset and good security practices.
  • Assets that need to be protected at work and at home.
  • Protecting yourself and your business at work.
  • Protecting yourself and your family at home.
  • Protecting yourself and your assets on travel.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Contents
  6. Chapter 1: Security Mindset
    1. What Do Hackers Want?
    2. What Is at Stake Here?
    3. How Has Malware Evolved?
    4. The Security Mindset
    5. Security Awareness
    6. How Do Security Professionals Think about Security?
  7. Chapter 2: Common Cybersecurity Attacks
    1. What Are the Cyberattackers Trying to Do?
    2. What Is the Value of Hacking You?
    3. What Is the Value of Hacking Your Workplace?
    4. How Do the Cyberattackers Attack?
    5. How Can We Protect Ourselves?
  8. Chapter 3: Protecting Your Computer(s)
    1. Securing Your Operating System
    2. Securing Your Applications
    3. Using Antimalware Protection and Personal Firewall
    4. Limiting Administrative Privileges
    5. Controlling Your PC Camera
    6. Backing Up Your Operating System
    7. Watching for Signs of Compromise
    8. Using Mac and Linux Operating Systems
  9. Chapter 4: Protecting Your Passwords
    1. How Do Cyberattackers Get Your Password?
    2. Do Not Use a Bad Password
    3. Create Good Passwords and Passphrases
    4. Rotate Passwords Regularly
    5. Avoid Sharing Passwords
    6. Change Default Passwords
    7. Safeguard Your Passwords
    8. Understand Password Reset Mechanisms
    9. Use Multifactor Authentication
  10. Chapter 5: Protecting Your Home Network
    1. Checking Your Network Modem, Router, and Firewall
    2. Securing Your Wi-Fi Configuration
    3. Supporting Visitors and Guests
    4. Configuring Multimedia and Gaming Consoles
    5. Protecting Home Internet of Things Devices and Smart Locks
    6. Understanding Remote Access and Running Your Own Servers
  11. Chapter 6: Smartphones and Tablets
    1. Smartphone and Tablet Differences
    2. Protecting Your Smartphone or Tablet
    3. Addressing Mobile Operating System Vulnerabilities
    4. Addressing Smartphone or Tablet “Rooting”
    5. Reducing Smartphone or Tablet Malicious Apps Risk
    6. Securing Bluetooth and Wi-Fi Networking
    7. Protecting Your Smartphone and Tablet Location Privacy
    8. Using SMS-Based Messaging and Authentication Safely
    9. Using BYOD and Mobile Device Management
  12. Chapter 7: Protecting Your Web Browsing
    1. How the Web Works
    2. Using Web Communication Protocols: HTTP versus HTTPS
    3. Avoiding Malicious Sites, Malvertising, and Pop-Ups
    4. Using Web Browser Security and Plug-Ins
    5. Protecting Your Browsing History
    6. Downloading Software Safely
  13. Chapter 8: Protecting Your E-Mail and Phone Calls
    1. How E-Mail Works
    2. Preventing Unauthorized Access to Your E-Mail Account
    3. Recognizing Malicious E-Mail
    4. Recognizing Phishing, Spear Phishing, and Online Scams
    5. Guarding Against Counterfeit E-Mails and Secure E-Mail
    6. Guarding Against Unsolicited Phone Calls
  14. Chapter 9: Protecting Your Identity, Privacy, and Family Online
    1. Controlling Your Anonymity Online
    2. Protecting Your Family Online
    3. Protecting Your Identity and Credit
    4. Safely Using E-Mail, Social Media, and Gaming
    5. Reducing Risk of Online Shopping, Credit Cards, Banking, and Automated Teller Machines
    6. Protecting Online Medical Privacy
    7. Understanding Net Neutrality, HIPAA, and GDPR
  15. Chapter 10: Protecting Yourself on Travel
    1. Selecting What to Take When You Travel
    2. Considering Backups and Contingencies for Travel
    3. Using Kiosk Computers and Public Internet Connections
    4. Considering Physical Protection, Personal Safety, and Electricity
    5. Being Cautious about Conversations and Online Sensitive Data
    6. Protecting Your Hard Drive and Mobile Media with Encryption
    7. Reducing the Risk of USB Connections
    8. Considering Diplomacy, ITAR, EAR, and Security Clearances
  16. Chapter 11: When Things Go Wrong
    1. Being Prepared
    2. Recognizing Dangerous Attacks
    3. Recognizing Account Compromise
    4. Responding to Online Personal Attacks
    5. Locking Down Online Accounts
    6. Resetting Your Compromised Computer or Device
    7. Recovering Lost Data
    8. Reporting Work Cyber Incidents
    9. Understanding the Risks of Being Paperless
  17. Chapter 12: Considering Cybersecurity at Work
    1. Enterprise Cybersecurity Differences
    2. Enterprise Network Perimeter and Security
    3. Endpoint Hardening and Encryption
    4. Identity and Access Management
    5. Web and E-Mail Protection
    6. Remote Access to Enterprise IT Resources
    7. Personnel Cybersecurity Training
    8. Cybersecurity Operations and Incident Response
    9. Physical Security and Personnel Protection
    10. Business Continuity and Disaster Recovery
  18. Chapter 13: Final Thoughts
  19. Appendix A: Common Online Scams
    1. Common Characteristics of Phishing E-Mails
    2. Common Subject Lines for Malicious E-Mails
    3. Watching Out for Scams and Scam Sites
    4. Antivirus and Tech Support Scams
    5. Internal Revenue Service (IRS) Scam
    6. Law Enforcement Scam
    7. Medicare and Social Security Scams
    8. Natural Disaster and Charity Scams
    9. Nigerian Prince Scam
  20. Appendix B: The Worst Passwords Ever
  21. Appendix C: Online Security Resources
  22. Glossary
  23. Index

Product information

  • Title: Understanding Security Issues
  • Author(s): Scott Donaldson, Chris Williams, Stanley Siegel
  • Release date: December 2018
  • Publisher(s): De Gruyter
  • ISBN: 9781501506369