FinUniversity Electronic Library

     

Details

Donaldson, Scott E.,. Understanding security issues / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel. — 1 online resource (1 volume) : illustrations — <URL:http://elib.fa.ru/ebsco/2026757.pdf>.

Record create date: 3/29/2019

Subject: Computer security.; Computer networks — Security measures.; COMPUTERS / Security / General.; Computer networks — Security measures.; Computer security.

Collections: EBSCO

Allowed Actions:

Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Annotation

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.

Document access rights

Network User group Action
Finuniversity Local Network All Read Print Download
Internet Readers Read Print
-> Internet Anonymous

Table of Contents

  • About DeG PRESS
  • Acknowledgments
  • About the Authors
  • Contents
  • Introduction
  • Chapter 1. Security Mindset
  • Chapter 2. Common Cybersecurity Attacks
  • Chapter 3. Protecting Your Computer(s)
  • Chapter 4. Protecting Your Passwords
  • Chapter 5. Protecting Your Home Network
  • Chapter 6. Smartphones and Tablets
  • Chapter 7. Protecting Your Web Browsing
  • Chapter 8. Protecting Your E-Mail and Phone Calls
  • Chapter 9. Protecting Your Identity, Privacy, and Family Online
  • Chapter 10. Protecting Yourself on Travel
  • Chapter 11. When Things Go Wrong
  • Chapter 12. Considering Cybersecurity at Work
  • Chapter 13. Final Thoughts
  • Appendix A. Common Online Scams
  • Appendix B. The Worst Passwords Ever
  • Appendix C. Online Security Resources
  • Glossary
  • Index

Usage statistics

stat Access count: 0
Last 30 days: 0
Detailed usage statistics