Cover image for Computer security literacy : staying safe in a digital world
Title:
Computer security literacy : staying safe in a digital world
Author:
Jacobson, Douglas.
ISBN:
9781439856185
Personal Author:
Publication Information:
Boca Raton, FL : CRC Press, [2013]

©2013.
Physical Description:
xxiii, 344 pages : illustrations ; 24 cm.
General Note:
Formerly CIP.
Contents:
Machine generated contents note: ch. 1 What Is Information Security? -- 1.1.Introduction -- 1.2.How Much of Our Daily Lives Relies on Computers? -- 1.3.Security Truisms -- 1.4.Basic Security Terminology -- 1.5.Cyber Ethics -- 1.6.The Perception of Security -- 1.7.Threat Model -- 1.8.Security Is a Multidisciplinary Topic -- 1.9.Summary -- Bibliography -- ch. 2 Introduction to Computers and the Internet -- 2.1.Introduction -- 2.2.Computers -- 2.2.1.Hardware -- 2.2.2.Operating Systems -- 2.2.3.Applications -- 2.2.4.Users -- 2.3.Operation of a Computer -- 2.3.1.Booting a Computer -- 2.3.2.Running an Application -- 2.3.3.Anatomy of an Application -- 2.4.Overview of the Internet -- 2.4.1.Protocols -- 2.4.2.Internet Addressing -- 2.4.3.Internet Protocol Addresses -- 2.4.4.Public versus Private IP Addresses -- 2.4.5.Finding an IP Address -- 2.4.6.Domain Name Service -- 2.4.7.Network Routing -- 2.4.8.World Wide Web -- 2.5.Computers and the Internet --

Contents note continued: 2.6.Security Role-Playing Characters -- 2.7.Summary -- Bibliography -- ch. 3 Passwords Under Attack -- 3.1.Introduction -- 3.2.Authentication Process -- 3.3.Password Threats -- 3.3.1.Bob Discloses Password -- 3.3.2.Social Engineering -- 3.3.3.Key-Logging -- 3.3.4.Wireless Sniffing -- 3.3.5.Attacker Guesses Password -- 3.3.6.Exposed Password File -- 3.3.7.Security Questions -- 3.3.8.Stop Attacking My Password -- 3.4.Strong Passwords -- 3.4.1.Creating Strong Passwords -- 3.5.Password Management: Let's Be Practical -- 3.6.Summary -- Bibliography -- ch. 4 Email Security -- 4.1.Introduction -- 4.2.Email Systems -- 4.2.1.Message Transfer Agent -- 4.2.2.User Agents -- 4.2.3.Email Addressing -- 4.2.4.Email Message Structure -- 4.3.Email Security and Privacy -- 4.3.1.Eavesdropping -- 4.3.2.Spam and Phishing -- 4.3.3.Spoofing -- 4.3.4.Malicious Email Attachments -- 4.3.5.Replying and Forwarding -- 4.3.6.To, Carbon Copy, and Blind Carbon Copy -- 4.4.Summary --

Contents note continued: Bibliography -- ch. 5 Malware: The Dark Side of Software -- 5.1.Introduction -- 5.2.What Is Malware? -- 5.3.How Do I Get Malware? -- 5.3.1.Removable Media -- 5.3.2.Documents and Executables -- 5.3.3.Internet Downloads -- 5.3.4.Network Connection -- 5.3.5.Email Attachments -- 5.3.6.Drive-By Downloads -- 5.3.7.Pop-Ups -- 5.3.8.Malicious Advertising -- 5.4.What Does Malware Do? -- 5.4.1.Malicious Adware -- 5.4.2.Spyware -- 5.4.3.Ransomware -- 5.4.4.Backdoor -- 5.4.5.Disable Security Functionality -- 5.4.6.Botnets -- 5.5.Summary -- Bibliography -- ch. 6 Malware: Defense in Depth -- 6.1.Introduction -- 6.2.Data Backup -- 6.3.Firewalls -- 6.3.1.Function of a Firewall -- 6.3.2.What Types of Malware Does a Firewall Protect Against? -- 6.3.3.Two Types of Firewalls -- 6.3.4.Putting a Hole in a Firewall -- 6.3.5.Firewalls Are Essential -- 6.4.Software Patches -- 6.4.1.Patch Tuesday and Exploit Wednesday -- 6.4.2.Patches Are Not Limited to Operating Systems --

Contents note continued: 6.4.3.Zero-Day Vulnerabilities -- 6.4.4.Just Patch it -- 6.5.Antivirus Software -- 6.5.1.Antivirus Signatures -- 6.5.2.Function of Antivirus Software -- 6.5.3.Antivirus Limitations -- 6.5.4.False Positives and False Negatives -- 6.5.5.Sneaky Malware -- 6.5.6.Antivirus Is Not a Safety Net -- 6.6.User Education -- 6.7.Summary -- Bibliography -- ch. 7 Securely Surfing the World Wide Web -- 7.1.Introduction -- 7.2.Web Browser -- 7.2.1.Web Browser and Web Server Functions -- 7.2.2.Web Code -- 7.2.3.HTML: Images and Hyperlinks -- 7.2.4.File and Code Handling -- 7.2.5.Cookies -- 7.3."Http Secure" -- 7.4.Web Browser History -- 7.5.Summary -- Bibliography -- ch. 8 Online Shopping -- 8.1.Introduction -- 8.2.Consumer Decisions -- 8.2.1.Defense in Depth -- 8.2.2.Credit Card versus Debit Card -- 8.2.3.Single-Use Credit Cards -- 8.2.4.Passwords -- 8.2.5.Do Your Homework -- 8.3.Spyware and Key-Loggers -- 8.4.Wireless Sniffing -- 8.5.Scams and Phishing Websites --

Contents note continued: 8.5.1.Indicators of Trust -- 8.6.Misuse and Exposure of Information -- 8.6.1.Disclosing Information -- 8.6.2.Audit Credit Card Activity -- 8.7.Summary -- Bibliography -- ch. 9 Wireless Internet Security -- 9.1.Introduction -- 9.2.How Wireless Networks Work -- 9.3.Wireless Security Threats -- 9.3.1.Sniffing -- 9.3.2.Unauthorized Connections -- 9.3.3.Rogue Router -- 9.3.4.Evil Twin Router -- 9.4.Public Wi-Fi Security -- 9.5.Wireless Network Administration -- 9.5.1.Default Admin Password -- 9.5.2.Service Set Identifier -- 9.5.3.Wireless Security Mode -- 9.5.4.MAC Address Filtering -- 9.5.5.Firewall -- 9.5.6.Power Off Router -- 9.6.Summary -- Bibliography -- ch. 10 Social Networking -- 10.1.Introduction -- 10.2.Choose Your Friends Wisely -- 10.2.1.Access Control -- 10.2.2.Friend Gluttony -- 10.2.3.Relative Privacy -- 10.2.4.Why Do You Want to Be My Friend? -- 10.3.Information Sharing -- 10.3.1.Location, Location, Location -- 10.3.2.What Should I Not Share? --

Contents note continued: 10.3.3.Opt In versus Opt Out -- 10.3.4.Job Market -- 10.4.Malware and Phishing -- 10.4.1.Koobface -- 10.4.2.Applications -- 10.4.3.Hyperlinks -- 10.4.4.Phishing -- 10.5.Summary -- References -- ch. 11 Social Engineering: Phishing for Suckers -- 11.1.Introduction -- 11.2.Social Engineering: Malware Distribution -- 11.2.1.Instant Messages -- 11.2.2.Fake Antivirus -- 11.2.3.Emails -- 11.2.4.Phone Calls -- 11.3.Phishing -- 11.3.1.Phishing Emails -- 11.3.2.No Shame Game -- 11.3.4.Other Types of Phishing -- 11.4.Detecting a Phishing URL -- 11.4.1.Reading a URL -- 11.4.2.Protocol -- 11.4.3.Top-Level Domain Name -- 11.4.4.Domain Name -- 11.4.5.Subdomain Name -- 11.4.6.File Path -- 11.4.7.File -- 11.5.Application of Knowledge -- 11.5.1.Tools of the Trade -- 11.6.Summary -- Bibliography -- ch. 12 Staying Safe Online: The Human Threat -- 12.1.Introduction -- 12.2.The Differences Between Cyberspace and the Physical World --

Contents note continued: 12.3.Consider the Context: Watch What You Say and How It Is Communicated -- 12.4.What You Do on the Internet Lasts Forever -- 12.5.Nothing Is Private, Now or in the Future -- 12.6.Can You Really Tell Who You Are Talking With? -- 12.7.Cameras and Photo Sharing -- 12.8.I Am A Good Person, That Would Never Happen To Me -- 12.9.Is There Anything I Can Do to Make the Internet a Safer Place for My Child? -- Bibliography -- ch. 13 Case Studies -- 13.1.Introduction -- 13.2.Unable to Remove Malware: Help! -- 13.3.Securely Handling Suspicious Email Attachments -- 13.4.Recovering from a Phishing Attack -- 13.5.Email Account Hacked? Now What? -- 13.6.Smart Phones and Malware -- 13.7.Hey! You! Get Off My Wireless Network -- 13.8.Bad Breakup? Sever Your Digital Ties -- 13.9."Display Images Below"? The Meaning Behind the Question -- 13.10.Phishing Email Forensics -- 13.11.It's on the Internet, So It Must Be True -- 13.12.Buying and Selling Online -- Bibliography --

Contents note continued: ch. 14 Moving Forward with Security and Book Summary -- 14.1.Introduction -- 14.2.After the Completion of the Book -- 14.3.Defense-In-Depth Tasks -- 14.4.Chapter Summaries -- ch. 1 Introduction -- ch. 2 Computers and the Internet -- ch. 3 Passwords -- ch. 4 Email -- ch. 5 Malware -- ch. 6 Malware Defense -- ch. 7 Securely Surfing the Web -- ch. 8 Online Shopping -- ch. 9 Wireless Internet Security -- ch. 10 Social Networking -- ch. 11 Social Engineering: Phishing for Suckers -- ch. 12 Staying Safe Online: The Human Threat -- ch. 13 Case Studies.
Abstract:
"Preface Approach Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. Breaking this traditional model, "Computer Security Literacy: Staying Safe in a Digital World" instead seeks to educate the reader at the user layer and focuses on practical topics that one is likely to encounter on a regular basis. It has long been recognized that the user is in fact the weakest link in the security chain. So why not effect change by providing practical and relevant education for the normal user of information technology? As it turns out, we, the user, often have the greatest impact in the security of our computer and information as a result of the actions that we do or do not perform. This text provides practical security education to give the reader context to make sound security decisions. The outcomes of this book are as follows. The reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security concepts - State computer security best practices - Describe the strengths, weaknesses, and limitations of security mechanisms and concepts - Give examples of common security threats, threat sources, and threat motivations - Explain their role in protecting their own computing environment and personal and confidential information - Discuss current event topics and read security articles in the popular press - Assess computing actions in the context of securit"--
Added Author:
Copies: