20,99 €
inkl. MwSt.

Versandfertig in über 4 Wochen
  • Broschiertes Buch

Life has become easier with advancements in information technology and our live have become more and more intertwined with electronic devices and platforms. Virtually everything today is connected one way or the other to electronic media, whether for leisure or work. Use of mobile phones, social media networks, smart devices have become prevalent in every field including healthcare; a good example is the Internet of Things. On the flip-side, the advancements in information technology and our increased connection and dependence on electronic devices has provided an avenue for the bad guys to…mehr

Produktbeschreibung
Life has become easier with advancements in information technology and our live have become more and more intertwined with electronic devices and platforms. Virtually everything today is connected one way or the other to electronic media, whether for leisure or work. Use of mobile phones, social media networks, smart devices have become prevalent in every field including healthcare; a good example is the Internet of Things. On the flip-side, the advancements in information technology and our increased connection and dependence on electronic devices has provided an avenue for the bad guys to wreak havoc on us. They use these platforms to launch attacks against the individuals, organizations, societies and even nation states. There has been increased number of such attacks in recent times, and one thing that is apparent is that many of these attacks was that they employed one of social engineering or the other to be successful, especially in the initiation stages. The emergence of Donald Trump as the President of the United States was greeted with allegation of interference from foreign elements in the US to influence the election turn out. How can such issues be tackled? To avoid falling prey to activities of malicious actors, it is imperative to know how they operate in order to safeguard against their actions. This book is a basic introduction to cyber security focusing on social engineering for those who are new to cyber security issues or just realizing that such exist. The book highlights some social engineering techniques employed by malicious actors to compromise you to improve your understanding of the issues involved to minimize the risk of falling victim to them.