Skip to Main Content
Understanding Security Issues
book

Understanding Security Issues

by Scott Donaldson, Chris Williams, Stanley Siegel
December 2018
Beginner content levelBeginner
208 pages
5h 45m
English
De Gruyter
Content preview from Understanding Security Issues

Chapter 8 Protecting Your E-Mail and Phone Calls

After web browsing, e-mail is probably the next most common use most of us have for our computers, especially at work. But e-mail can be a power for malice, as well as for good. Just as our coworkers and friends use e-mail to easily stay in touch with us, attackers can use e-mail to get to us as well. In fact, most enterprises consider e-mail to be the most common and dangerous technique attackers use to conduct cyberattacks.

In addition to being a path for attackers to target us, our e-mail accounts may also be the cornerstone of our online identities, as well. Websites use e-mail to notify us of account expirations, renewals, password changes, suspicious activity, and e-commerce transactions. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick
Assessing Information Security: Strategies, tactics, logic and framework

Assessing Information Security: Strategies, tactics, logic and framework

Andrew Vladimirov, Konstantin Gavrilenko, Andriej Michajlowski
Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke

Publisher Resources

ISBN: 9781501506369