Title:
Security awareness : applying practical security in your world
Author:
Ciampa, Mark.
ISBN:
9781111644185
9781111644208
9781133692942
Personal Author:
Edition:
4th Ed.
Publication Information:
Boston, Mass. : Course Technology, [2013], c2014.
Physical Description:
xvi, 238 p. : ill. ; 23 cm.
General Note:
Previous ed.: 2010; first ed.: 2004.
Contents:
Machine generated contents note: ch. 1 Introduction to Security -- Challenges of Securing Information -- Today's Attacks -- Difficulties in Defending against Attacks -- What Is Information Security? -- Understanding Security -- Defining Information Security -- Information Security Terminology -- Understanding the Importance of Information Security -- Who Are the Attackers? -- Cybercriminals -- Script Kiddies -- Spies -- Insiders -- Cyberterrorists -- Hactivists -- Government Agencies -- Building a Comprehensive Security Strategy -- Block Attacks -- Update Defenses -- Minimize Losses -- Send Secure Information -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References -- ch. 2 Personal Security -- Passwords -- Password Weaknesses -- Attacks on Passwords -- Social Engineering Attacks -- Psychological Approaches -- Physical Procedures -- Identity Theft -- Social Networking Risks -- Personal Security Defenses -- Password Defenses --
Contents note continued: Recognizing Phishing Attacks -- Avoiding Identity Theft -- Setting Social Networking Defenses -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References -- ch. 3 Computer Security -- Attacks Using Malware -- Malware That Spreads -- Malware That Conceals -- Malware That Profits -- Computer Defenses -- Managing Patches -- Installing Antivirus Software -- Configuring Personal Firewalls -- Using User Account Control (UAC) -- Creating Data Backups -- Recovering from an Attack -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References -- ch. 4 Internet Security -- How the Internet Works -- The World Wide Web -- E-Mail -- Internet Security Risks -- Mobile Code -- Cookies -- Fraudulent Digital Certificates -- Drive-By Downloads -- Redirected Web Traffic -- E-Mail Risks -- Internet Defenses -- Configuring Web Browser Settings -- E-Mail Defenses --
Contents note continued: Internet Security Best Practices -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References -- ch. 5 Mobile Security -- Mobile Attacks -- Attacks through Wireless Networks -- Attacks on Mobile Devices -- Mobile Defenses -- Wireless Network Security -- Mobile Device Security -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References -- ch. 6 Workplace Security -- Restricting Physical Access -- Access to Facilities -- Access to Systems -- Restricting Data Access -- Security Policies -- Access Control -- Crisis Preparedness -- Protecting against Fires -- Computer Forensics -- Disaster Recovery -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- References.
Copies: