Donaldson / Williams / Siegel | Understanding Security Issues | E-Book | sack.de
E-Book

E-Book, Englisch, 208 Seiten

Donaldson / Williams / Siegel Understanding Security Issues

E-Book, Englisch, 208 Seiten

ISBN: 978-1-5015-0650-5
Verlag: De Gruyter
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: - The threats that face every individual and business, all the time.
- Specific indicators of threats so that you understand when you might be attacked and what to do if they occur.
- The security mindset and good security practices.
- Assets that need to be protected at work and at home.
- Protecting yourself and your business at work.
- Protecting yourself and your family at home.
- Protecting yourself and your assets on travel.
Donaldson / Williams / Siegel Understanding Security Issues jetzt bestellen!

Weitere Infos & Material


FOREWORD – 1 page ABOUT THE AUTHORS – 1 page ACKNOWLEDGMENTS – 1 page INTRODUCTION – 2 pages - What is this book about?
- Who should read this book?
- Why did the authors write this book?
- Organization of the book
CHAPTERS - Chapter 1—Security Awareness (~15 pages)
This chapter presents why security awareness is essential for everyone. This chapter presents some fundamental concepts and terms used throughout the book. - Chapter 2—Security Process (~15 pages)
This chapter presents the security mind set of identifying assets, threats to those assets, asset vulnerabilities, protections, and risks resulting from protections. - Chapter 3—Security in Your Life (~15 pages)
This chapter presents how you apply the security process to common life scenarios, at work, while traveling, and at home. - Chapter 4—Security Scenarios (~40 pages)
This chapter presents how the Chapter 2 security process is applied to each scenario. Each scenario will walk through a number of common assets, and apply the security process to identify protections that should be applied. - Yourself at Work
- Your Company or Organization
- Yourself on Travel
- Yourself Abroad
- Yourself at Home
- Chapter 5—Looking to the Future (~15 pages)
This chapter presents some of the evolving security threats, trends, and how you can continue to be security aware. APPENDIX – Thinking Like a Security Officer (~15 pages) This appendix presents how security people think about common protections in our work, and as a consequence, home life (e.g., locks, gates, passwords, and firewalls) and how they have to balance tradeoffs between protection and usability. GLOSSARY – 3 pages BIBLIOGRAPHY – 3 pages INDEX – 4 pages


Scott E. Donaldson, Johns Hopkins University, USA; Chris K. Williams, Leidos, USA; Stanley Siegel, Johns Hopkins University, USA


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.