E-Book, Englisch, 208 Seiten
ISBN: 978-1-5015-0650-5
Verlag: De Gruyter
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
- Specific indicators of threats so that you understand when you might be attacked and what to do if they occur.
- The security mindset and good security practices.
- Assets that need to be protected at work and at home.
- Protecting yourself and your business at work.
- Protecting yourself and your family at home.
- Protecting yourself and your assets on travel.
Autoren/Hrsg.
Weitere Infos & Material
FOREWORD – 1 page ABOUT THE AUTHORS – 1 page ACKNOWLEDGMENTS – 1 page INTRODUCTION – 2 pages - What is this book about?
- Who should read this book?
- Why did the authors write this book?
- Organization of the book
CHAPTERS - Chapter 1—Security Awareness (~15 pages)
This chapter presents why security awareness is essential for everyone. This chapter presents some fundamental concepts and terms used throughout the book. - Chapter 2—Security Process (~15 pages)
This chapter presents the security mind set of identifying assets, threats to those assets, asset vulnerabilities, protections, and risks resulting from protections. - Chapter 3—Security in Your Life (~15 pages)
This chapter presents how you apply the security process to common life scenarios, at work, while traveling, and at home. - Chapter 4—Security Scenarios (~40 pages)
This chapter presents how the Chapter 2 security process is applied to each scenario. Each scenario will walk through a number of common assets, and apply the security process to identify protections that should be applied. - Yourself at Work
- Your Company or Organization
- Yourself on Travel
- Yourself Abroad
- Yourself at Home
- Chapter 5—Looking to the Future (~15 pages)
This chapter presents some of the evolving security threats, trends, and how you can continue to be security aware. APPENDIX – Thinking Like a Security Officer (~15 pages) This appendix presents how security people think about common protections in our work, and as a consequence, home life (e.g., locks, gates, passwords, and firewalls) and how they have to balance tradeoffs between protection and usability. GLOSSARY – 3 pages BIBLIOGRAPHY – 3 pages INDEX – 4 pages